The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a quantum key distribution (QKD) system, privacy amplification (PA) is an essential procedure that can effectively eliminate the leaked information to an eavesdropper and distill a secret key. The processing speed of the PA algorithm inevitably affects the final key rate of the QKD system. We propose a high-speed PA algorithm based on field-programmable gate array (FPGA), where the matrix multiplications...
Data outsource in the cloud has become inevitable trend nowadays, which significantly motivates the development of range search. Order-preserving encryption (OPE) as the most efficient scheme for range search has received increasing interest in both the industries and the cryptographic communities. However, the state of arts show that current OPE schemes either lack efficiency or suffer from severe...
Various wireless communication technologies have been developed and deployed because of the increasing access requirements. As a result, it brings a great challenge for designing seamless handover authentication protocols in wireless networks, especially in ensuring security and efficiency. The innocent users in wireless networks hope that the Mobile Internet Service Provider can not only provide...
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection of data is necessary for testing programs in order to provide accurate results. At the same time, user privacy should not cease since tracing one's daily logistic movements or behaviour...
The popularity and widely use of cellphone have greatly stimulated the spread of the apps. Meanwhile, security issues are increasing quickly, particularly for Android based devices. In this paper, through analyzing the android permissions system and android API system, we want to find out the relationship between permissions and APIs. Furthermore, we propose an approach to detect message intercepting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.