The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Racetrack memory (RM, also known as DWM (domain wall memory)) is an emerging memory technology that has many advantages such as low power, high density, and low access latency. Recent studies have shown that it is promising to architect RM as last level cache (LLC). Given that a RM track consists of m domains (for storing m bits data) and n access heads (1≤n<m), one RM access often requires multiple...
Web attacks are increasing and the scale of malicious URL continues to expand with the rapid development of the Internet, so that the network security situation is increasingly grim. In this case, this paper studies the URL multi-classification problem, which is a continuation of the reference [1] and follows the data sets and most of feature selection methods in it. Firstly, different types of URL...
We focus on effective request distributing for locally or globally distributed Secure Sockets Layer (SSL) reverse proxies in a Web system. We assume a system consisting of a front-end request distributor and several back-end SSL reverse proxy nodes, each has its own queue for caching requests. The proposed two request distribution strategies SSLSARD-D and SSLSARD-W are both composed of a back-end...
With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of security protections. Also, SEIEEE1588's author has gathered the advantage of both NTP and IEEE1588 protocol raise a security enhanced IEEE1588 protocol for deep-space environment (SEIEEE1588)...
Nowadays, the application of RFID technology has grown rapidly which leads to a large increase in related research. Low Level Reader Protocol (LLRP) is an interface protocol between Client and Readers, and it is an important part in RFID systems, however, few security-related research has done in this field. Against the issue, this paper proposes a secure mechanism of LLRP to keep the RFID systems...
In recent years, mobile Online Social Networks (mOSNs) have gained more and more popularity. Compared with traditional social networks, mOSNs allow user's location to come into play. Thus, location sharing becomes a fundamental component of mOSNs, and many opportunities for location-based services arise which have a high value for the users. At the same time, the need to share location information...
The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents...
Large scale wind farms connected at the end of power grid will probably greatly impact the power grid. The analysis of maximum power injection of wind farm is important issue in the planning and operation of wind farm. Under the static security constraints and transient stability constraints, this paper presents a particle swarm optimization for determining wind power penetration limit in power system...
It is proved that combination networks can achieve unbounded network coding gain measured by the ratio of network throughput with network coding to that without network coding in peer-to-peer file sharing system. On the other side, network coding allows the polluted packet generated by a malicious node to corrupt the packets transmission of the entire network. One polluted packet will prevent the...
Underwater acoustic communications have found applications in many fields with great developments. Thus, the demand for security of such communications is rapidly growing. Two parties in the communication, after authentication, generally use a secure symmetric key to encrypt all the data they transmit. Thus, an efficient key generation algorithm is in urgent need to guarding the privacy of the communication...
Efficient authenticated multi-party key agreement is both an open problem and one of the fundamental cryptographic primitives that has to be tackled for deploying secure e-commerce in the real world. In this paper, by taking one third of the order of a generator a basic version of a multi-party key agreement scheme is proposed based on the matrix-based ECC (Elliptic Curve Cryptog-raphy) by Climent...
Efficient authenticated key exchange is the most important part of a security system that employs cryptographic techniques in World Wide Web-based applications. In this paper, an ECC (Elliptic Curve Cryptography) version of Hughespsilas key-exchange protocol is proposed based on the matrix-based ECC by Climent et al. The basic security of the proposed scheme is based on the ECDLP (Elliptic Curve Discrete...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.