RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • GSM Verification Based Secure E-Voting Framework

        Sujit Biswas 보안공학연구지원센터(IJUNESST) 2015 International Journal of u- and e- Service, Scienc Vol.8 No.1

        Application of computer technology in human life is increasing geometrically. People are depending on this global network technology (internet) for shopping, banking, education etc. For this technological world people live different cities for their personal jobs. At that pur-poses they do not want to come back to their own constituency only to apply their vote. Elec-tronic voting (evoting) can be a viable alternative to solve this problem. In this paper, new evoting architecture has been proposed which ensure voter’s annomity. By implementing this architecture any voter can employ their vote from anywhere of the world. This architecture will also allow traditional voting besides electronic voting ensuring security and unique vote per voter. In this architecture cryptographic techniques has been proposed to overcome the security threats, also ensure voter’s anonymity. Considering security issue two step security has been proposed in this framework.

      • Android Permissions Management at App Installing

        Sujit Biswas,Wang Haipeng,Javed Rashid 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.3

        Android based smartphone users’ privacy has been a hot issue recently in public concerns due to various instances of security attacks and privacy leakage on Android platform. Android existing security has been built upon a permission based mechanism which restricts critical resources accesses of third-party Android applications. This permission based security system is widely assessed for its major control of application permissions and critical management of permissions by developers, marketers, and end-users. Considering the critical management of permissions some previous research papers proposed automatic permission management tools. But those automatic tools never assessed end user’s expectation about permissions perfectly. This paper presents a tool, SDroid (Secured anDroid) that assesses the best permissions management based on end users opinion. SDroid evaluates requested permissions and allow users selectively grant permissions considering his/her knowledge level depending on the opinion.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼