The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, cloud computing technology and its layout have been increasingly improved, but its application in water resources informatization is just the beginning. Therefore, it is necessary to study on the construction of water information cloud. Taking the present situation of Nanjing water resources as the background, this paper proposes a four-layer architecture of Nanjing water information cloud...
With the development of cloud computing and mobile Internet, the issues related to big data have been concerned by both academe and industry. Based on the analysis of the existed work, the research progress of how to use distributed file system to meet the challenge in storing big data is expatiated, including four key techniques: storage of small files, load balancing, copy consistency, and de-duplication...
To meet the new requirements drove by nowadays E-commerce for the signature schemes, a new threshold signature scheme is proposed from bilinear pairings based on improved short signature scheme, which realizes a single signing member can accomplish signature efficiently. The analysis shows that the scheme serves properties of non-masquerading and auditing, the members can be added and revoked dynamically...
In the most of the existing threshold scheme, a group member can't accomplish signature independently. To this limitation, we propose a new type threshold signature scheme based on Strong-RSA assumption. The prominent trait is that it realizes signing independently and forward security at the same time. The analysis indicated that the scheme has auditability; security problems such as external attack,...
Due to the dynamic and anonymous nature of open environments, it is critically important for agents to identify trustful cooperators which work consistently as they claim. In the e-services and e-commerce communities, trust and reputation systems are applied broadly as one kind of decision support systems, and aim to cope with the consistency problems caused by uncertain trust relationships. However,...
In this paper, we introduce an m-commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce...
Fault tolerance schemes can be used to increase the availability and reliability of network service systems. One aspect of such schemes is failover - the reconfiguration of available resources and restoration of state required to continue providing the service despite the loss of some of the resources and corruption of parts of the state. Most of the techniques used for increasing the availability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.