http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
GSM Verification Based Secure E-Voting Framework
Sujit Biswas 보안공학연구지원센터(IJUNESST) 2015 International Journal of u- and e- Service, Scienc Vol.8 No.1
Application of computer technology in human life is increasing geometrically. People are depending on this global network technology (internet) for shopping, banking, education etc. For this technological world people live different cities for their personal jobs. At that pur-poses they do not want to come back to their own constituency only to apply their vote. Elec-tronic voting (evoting) can be a viable alternative to solve this problem. In this paper, new evoting architecture has been proposed which ensure voter’s annomity. By implementing this architecture any voter can employ their vote from anywhere of the world. This architecture will also allow traditional voting besides electronic voting ensuring security and unique vote per voter. In this architecture cryptographic techniques has been proposed to overcome the security threats, also ensure voter’s anonymity. Considering security issue two step security has been proposed in this framework.
Android Permissions Management at App Installing
Sujit Biswas,Wang Haipeng,Javed Rashid 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.3
Android based smartphone users’ privacy has been a hot issue recently in public concerns due to various instances of security attacks and privacy leakage on Android platform. Android existing security has been built upon a permission based mechanism which restricts critical resources accesses of third-party Android applications. This permission based security system is widely assessed for its major control of application permissions and critical management of permissions by developers, marketers, and end-users. Considering the critical management of permissions some previous research papers proposed automatic permission management tools. But those automatic tools never assessed end user’s expectation about permissions perfectly. This paper presents a tool, SDroid (Secured anDroid) that assesses the best permissions management based on end users opinion. SDroid evaluates requested permissions and allow users selectively grant permissions considering his/her knowledge level depending on the opinion.