8,812 research outputs found
A Mobile Secure Bluetooth-Enabled Cryptographic Provider
The use of digital X509v3 public key certificates, together with different standards
for secure digital signatures are commonly adopted to establish authentication proofs
between principals, applications and services. One of the robustness characteristics commonly
associated with such mechanisms is the need of hardware-sealed cryptographic
devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled
tokens or dongles. These devices support internal functions for management and storage
of cryptographic keys, allowing the isolated execution of cryptographic operations, with
the keys or related sensitive parameters never exposed.
The portable devices most widely used are USB-tokens (or security dongles) and internal
ships of smart cards (as it is also the case of citizen cards, banking cards or ticketing
cards). More recently, a new generation of Bluetooth-enabled smart USB dongles appeared,
also suitable to protect cryptographic operations and digital signatures for secure
identity and payment applications. The common characteristic of such devices is to offer
the required support to be used as secure cryptographic providers. Among the advantages
of those portable cryptographic devices is also their portability and ubiquitous use, but,
in consequence, they are also frequently forgotten or even lost. USB-enabled devices imply
the need of readers, not always and not commonly available for generic smartphones
or users working with computing devices. Also, wireless-devices can be specialized or
require a development effort to be used as standard cryptographic providers.
An alternative to mitigate such problems is the possible adoption of conventional
Bluetooth-enabled smartphones, as ubiquitous cryptographic providers to be used, remotely,
by client-side applications running in users’ devices, such as desktop or laptop
computers. However, the use of smartphones for safe storage and management of private
keys and sensitive parameters requires a careful analysis on the adversary model assumptions.
The design options to implement a practical and secure smartphone-enabled
cryptographic solution as a product, also requires the approach and the better use of
the more interesting facilities provided by frameworks, programming environments and
mobile operating systems services.
In this dissertation we addressed the design, development and experimental evaluation
of a secure mobile cryptographic provider, designed as a mobile service provided in a smartphone. The proposed solution is designed for Android-Based smartphones and
supports on-demand Bluetooth-enabled cryptographic operations, including standard
digital signatures. The addressed mobile cryptographic provider can be used by applications
running on Windows-enabled computing devices, requesting digital signatures.
The solution relies on the secure storage of private keys related to X509v3 public certificates
and Android-based secure elements (SEs). With the materialized solution, an
application running in a Windows computing device can request standard digital signatures
of documents, transparently executed remotely by the smartphone regarded as a
standard cryptographic provider
The significance of video evidence analysis in the investigation of murder cases against the police
The researcher attempts to establish the significance of video evidence analysis in the investigation of murder cases against the police. The evidence obtained could be crucial and admissible in court and ultimately resulted in the successful prosecution of an accused person. In order for investigators to conduct an effective investigation, it is important that they become familiar with the application of video evidence, its purpose, benefits and shortfalls.
In order to achieve the intended goals and objectives of video evidence, the investigators should know how to collect, package, process and analyse video evidence.
The clarification and processing of the crime scene of video evidence as well as the identification of a suspect at the scene of crime is very much important and without video evidence it would be difficult to convict an accused person in a court of law.Police PracticeM. Tech. (Forensic Investigation
Inventory of long and short term future needs of food chain users for future functions of internet
vokKVIKA
Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research
This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing
Data Mining Approach for Target Marketing SMEs in Nigeria
Presently, in addition to the lack of funds experienced by SMEs in
Nigeria, the main challenges experienced by SMEs (Small and Medium
Enterprises) in Nigeria has to do with them not being able to understand and
the apply marketing concept. Also there are a lot of resources being wasted in
marketing campaign which does not target anybody in particular. This study is
therefore focused on finding the target market of SMEs using the K-means
clustering technique in combination with sentiment analysis, also known as
opinion mining. The study also aims at recommending the best medium to
market these SMEs as discovered from the output of the analysis. The result of
this research will give positive direction to improving the profit of small and
medium business through target marketing. Also, this study is not trivial
because it will help to reduce marketing cost through target marketing. The
study also helps to discover the opinion of the populace on the small and
medium business and the medium through which they can be targeted. This
discovery will definitely form solid foundation for further marketing action and
improve their profit
- …