8,812 research outputs found

    A Mobile Secure Bluetooth-Enabled Cryptographic Provider

    Get PDF
    The use of digital X509v3 public key certificates, together with different standards for secure digital signatures are commonly adopted to establish authentication proofs between principals, applications and services. One of the robustness characteristics commonly associated with such mechanisms is the need of hardware-sealed cryptographic devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled tokens or dongles. These devices support internal functions for management and storage of cryptographic keys, allowing the isolated execution of cryptographic operations, with the keys or related sensitive parameters never exposed. The portable devices most widely used are USB-tokens (or security dongles) and internal ships of smart cards (as it is also the case of citizen cards, banking cards or ticketing cards). More recently, a new generation of Bluetooth-enabled smart USB dongles appeared, also suitable to protect cryptographic operations and digital signatures for secure identity and payment applications. The common characteristic of such devices is to offer the required support to be used as secure cryptographic providers. Among the advantages of those portable cryptographic devices is also their portability and ubiquitous use, but, in consequence, they are also frequently forgotten or even lost. USB-enabled devices imply the need of readers, not always and not commonly available for generic smartphones or users working with computing devices. Also, wireless-devices can be specialized or require a development effort to be used as standard cryptographic providers. An alternative to mitigate such problems is the possible adoption of conventional Bluetooth-enabled smartphones, as ubiquitous cryptographic providers to be used, remotely, by client-side applications running in users’ devices, such as desktop or laptop computers. However, the use of smartphones for safe storage and management of private keys and sensitive parameters requires a careful analysis on the adversary model assumptions. The design options to implement a practical and secure smartphone-enabled cryptographic solution as a product, also requires the approach and the better use of the more interesting facilities provided by frameworks, programming environments and mobile operating systems services. In this dissertation we addressed the design, development and experimental evaluation of a secure mobile cryptographic provider, designed as a mobile service provided in a smartphone. The proposed solution is designed for Android-Based smartphones and supports on-demand Bluetooth-enabled cryptographic operations, including standard digital signatures. The addressed mobile cryptographic provider can be used by applications running on Windows-enabled computing devices, requesting digital signatures. The solution relies on the secure storage of private keys related to X509v3 public certificates and Android-based secure elements (SEs). With the materialized solution, an application running in a Windows computing device can request standard digital signatures of documents, transparently executed remotely by the smartphone regarded as a standard cryptographic provider

    The significance of video evidence analysis in the investigation of murder cases against the police

    Get PDF
    The researcher attempts to establish the significance of video evidence analysis in the investigation of murder cases against the police. The evidence obtained could be crucial and admissible in court and ultimately resulted in the successful prosecution of an accused person. In order for investigators to conduct an effective investigation, it is important that they become familiar with the application of video evidence, its purpose, benefits and shortfalls. In order to achieve the intended goals and objectives of video evidence, the investigators should know how to collect, package, process and analyse video evidence. The clarification and processing of the crime scene of video evidence as well as the identification of a suspect at the scene of crime is very much important and without video evidence it would be difficult to convict an accused person in a court of law.Police PracticeM. Tech. (Forensic Investigation

    Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research

    Get PDF
    This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing

    Data Mining Approach for Target Marketing SMEs in Nigeria

    Get PDF
    Presently, in addition to the lack of funds experienced by SMEs in Nigeria, the main challenges experienced by SMEs (Small and Medium Enterprises) in Nigeria has to do with them not being able to understand and the apply marketing concept. Also there are a lot of resources being wasted in marketing campaign which does not target anybody in particular. This study is therefore focused on finding the target market of SMEs using the K-means clustering technique in combination with sentiment analysis, also known as opinion mining. The study also aims at recommending the best medium to market these SMEs as discovered from the output of the analysis. The result of this research will give positive direction to improving the profit of small and medium business through target marketing. Also, this study is not trivial because it will help to reduce marketing cost through target marketing. The study also helps to discover the opinion of the populace on the small and medium business and the medium through which they can be targeted. This discovery will definitely form solid foundation for further marketing action and improve their profit
    corecore