The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to rich characteristics and functionalities, PDF format has become the de facto standard for the electronic document exchange. As vulnerabilities in the major PDF viewers have been disclosed, a number of methods have been proposed to tame the increasing PDF threats. However, one recent evasion exploit is found to evade most of detections and renders all of the major static methods void. Moreover,...
Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strong ness property that anyone except the designated verifier cannot check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
This paper presents a wireless digital conference system which adopts dual-mode (white-light LED and infrared light) visible light communications (VLCs) wireless technique, which the downlink communication uses white-light LED transmission and the uplink communication chooses infrared transmission. Compared to traditional RF-based wireless digital conference system, our proposed VLC-based wireless...
Software vulnerabilities are the root cause of computer security problem. How people can quickly discover vulnerabilities existing in a certain software has always been the focus of information security field. This paper has done research on software vulnerability techniques, including static analysis, Fuzzing, penetration testing. Besides, the authors also take vulnerability discovery models as an...
Space based information system security risk evaluation is the important content of the protection of it. Basic on the analysis of the system's structure and those attack it faced, This paper improved the attack tree model, then a new quantitative risk evaluation method was studied here. While the risk evaluation steps was given, the risk value of the leaf node was quantified by the use of the multi-attribute...
This paper studies the decision behavior of workers and characteristics of retirement age in social security system. Based on overlapping-generation model and Markov decision process, this paper constructs a dynamic decision model for social security system. In this model, workers choose their optimal retirement age taking into account the current social security system. In addition, this paper analyzes...
This paper develops a new error concealment algorithm for the whole-frame losses in wireless video transmission based on H.264/AVC. At first, we propose a forward motion vector extrapolation algorithm based on variable-size block motion vector estimation to obtain the motion vector field of the loss frame without yielding the hole problems. Then, we partition the missing frame into several object...
In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vector extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks...
This paper presents a hybrid H.264 video transcoding scheme in order to reduce the bitrate. Firstly, we propose a cascaded pixel-domain architecture to transcode intra frame which can enhance the rate-distortion performance; Then, we propose to transcode inter frame with open-loop architecture, which can improve the transcoding speed; at last, we propose a drift error compensation algorithm for P...
Web service technology aims to enable the interoperation of heterogeneous systems and the reuse of distributed functions in an unprecedented scale and has achieved significant success. There are still, however, challenges to realize its full potential. One of these challenges is to ensure the behavior of Web services consistent with their requirements. Monitoring events that are relevant to Web service...
The main idea of the verifier-based protocol is to mitigate the amount of damage that can be caused by corruptions in the server. Some verifier-based PAKE protocols in the three-party have been suggested by now. In this paper, we present a verifier-based PAKE in the three party based on ECC which is secure against several attacks and provides perfect forward secrecy. Users can share multiple session...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
Role-based access control (RBAC) is recognized as an efficient access control model and its delegation authority has been proved to be flexible and useful for information sharing on distributed environment. In todaypsilas highly dynamic distributed systems, collaboration is necessary for information sharing with others, so a user may want to delegate a collection of permissions, named an ability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.