9,471 research outputs found

    Secured e-payment system based on automated authentication data and iterated salted hash algorithm

    Get PDF
    Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used VB.Net C# environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption

    A survey of potential architectures for communication in heterogeneous networks

    Get PDF
    An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities-of-Service so a Quality-of-Service Framework is needed to help applications and services deal with this new environment. In addition, since these networks must work together, future mobile systems will have an open, instead of the currently closed, architecture. Therefore new mechanisms will be needed to protect users, servers and network infrastructure. This means that future mobile networks will have to integrate communications, mobility, quality-of service and security. This paper provides an overview of potential architectures for communication in future networks. Our study shows that only a number of these architectures support this integration

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    Smart Cities and Positive Energy Districts: Urban Perspectives in 2020

    Get PDF
    Since their creation eight years ago, the EERA Joint Programmes and their participating institutions have accumulated important knowledge on specific topics of the programmes they carried out. This includes Smart Cities and Positive Energy Districts, which are not only crucial topics tackled by EERA Joint Programme in the Smart Cities Workplan, but also in H2020 as well as Horizon Europe or national calls, focusing on innovative solutions based on interdisciplinary approaches, which are needed to face the highly complex challenges in coming years, from sustainable urban development to emergencies in cities due to the COVID-19 pandemic. The foreword of EERA JP in SC Special Issue 1|2018 highlighted the aim of the Special Issues series, which was, and still is, to support the growth of research networks in the EC framework. According to this, our ambition is to publish the most promising research and innovation projects which EERA JPonSC partners, and others, set up in the framework of H2020 Programme, to drive the attention to the fact that EERA JP on SC is one of the strong voices in research in Europe, capable of highlighting and integrating different solutions and points of view

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue President\u27s Message Business Relationship Management: Does Your organization Need It? Predict Your organization\u27s ICT Future by Making lt Happen Safeguarding Campus Networks in an loT World What the Year 2020 Holds tor the Digital Campus Collaborating for Success The Campus of the Future: 2020 and Beyond The lnternet of Things, Higher Education, and lT: How Do We Fit ln? 201 6 institutional! Excellence Awar

    Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

    Get PDF
    In software-defined networks (SDNs), the abstracted control plane is its symbolic characteristic, whose core component is the software-based controller. The control plane is logically centralized, but the controllers can be physically distributed and composed of multiple nodes. To meet the service management requirements of large-scale network scenarios, the control plane is usually implemented in the form of distributed controller clusters. Cluster management technology monitors all types of events and must maintain a consistent global network status, which usually leads to big data in SDNs. Simultaneously, the cluster security is an open issue because of the programmable and dynamic features of SDNs. To address the above challenges, this paper proposes a big data analysis-based secure cluster management architecture for the optimized control plane. A security authentication scheme is proposed for cluster management. Moreover, we propose an ant colony optimization approach that enables big data analysis scheme and the implementation system that optimizes the control plane. Simulations and comparisons show the feasibility and efficiency of the proposed scheme. The proposed scheme is significant in improving the security and efficiency SDN control plane
    • …
    corecore