The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
App Store Analysis studies information about applications obtained from app stores. App stores provide a wealth of information derived from users that would not exist had the applications been distributed via previous software deployment methods. App Store Analysis combines this non-technical information with technical information to learn trends and behaviours within these forms of software repositories...
The rapid-iteration, web-style update cycle of Android helps fix revealed security vulnerabilities for its latest version. However, such security enhancements are usually only available for few Android devices released by certain manufacturers (e.g., Google's official Nexus devices). More manufactures choose to stop providing system update service for their obsolete models, remaining millions of vulnerable...
GNU Libc (GLIBC) is the standard C runtime library of most Linux distributions for PC and servers. There used to be many memory corruption exploit techniques against ptmalloc, the default heap allocator of GLIBC. But the widely deployment of mitigations like NX and ASLR on modern operating systems and continuous patching to ptmalloc effectively obsolete most of these techniques. We believe security...
Rapid development of cloud storage services produces a tremendous amount of user data outsourcing to cloud servers. Therefore, it is easy to generate data multi-replica, which is able to improve data availability and users' experience. However, when the management of data is poor, the sensitive information will be disclosed more easily. This may bring serious security and privacy challenges for both...
Wireless sensor networks are designed for outdoor environment surveillance and require benign coverage, steady working status and long lifetime, moreover, they require efficient security services for rigorous applications. Most security schemes are designed to work efficiently only when bidirectional links exist. So do most key establishment protocols for WSNs. Traditional key establishment schemes...
The establishment of pair-wise key between two nodes in wireless sensor network is a big challenge. We propose a protocol PWKEP including three contributions: 1) Achieve secure key exchange protocol with mutual authentication. 2) Propose a modular approach for design of secure authenticated key exchange protocols. 3) Adopt elliptic curve Diffie-Hellman key exchange and argue reasonable energy consumption...
Hybrid hard drives (HHD) are coming up with potential high viability in mobile computing. It's quite necessary to put forward an efficient secure scheme for hybrid hard drives. NAND Flash of HHD is made full use as a container and a buffer for metadata. We propose an efficient combined scheme based on Galois/Counter Mode (GCM) to protect hard disk data by authenticated encryption, and build a secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.