The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to investigate the status and the effect of the implementation of the essential medicine policy, it analyzed the similarities and differences of the supply situation in the central area Hubei province and the developed region Guangdong province of China. According to the generic name, dosage form, specifications, price hanging on the net of the essential medicine commonly used as well as...
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
This paper suggests using FCM to investigate the problem of credit risk evaluation of listed companies by referring to some domestic and abroad researches of fuzzy cognitive map and credit risk. Firstly, the present research status of FCM is briefly introduced. Then, this paper completely studies the basis theory and inner inference mechanism of FCM, and the Active Hebbian Learning (AHL) algorithms...
This paper proposes an elliptic curve based message source authentication mechanism for multicast. When a new sender signs a message and multicasts it to the receivers, the receivers need not consult the group manager for getting the public key of the sender. Hence the denial-of-service attack is avoided. Therefore, our scheme enjoys both efficiency and security compared to current schemes.
The key technology of mobile value-added services is to design protocol, which can meet the poor computing power as well as being security. This paper proposes an Advanced-RPC protocol by adding hash function with key to the Lowe modified BAN concrete Andrew Secure RPC. The new protocol mends some undesirable properties in the old one, enhances forward security, and improves the running efficiency...
Near Term Digital Radio (NTDR) networks, which follow the cluster based design principles, are developed specifically to use in ad hoc settings. A major challenge in the design of these networks is their vulnerability to security attacks, due to unreliable wireless media, host mobility and lack of infrastructure. In this paper, we propose an elliptic curve secure communication scheme for NTDR networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.