The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the widespread availability of connected smart devices, Internet of Things (IoT) is becoming the world's largest computing platform. These large-scale, heterogeneous and resource-constrained devices bring many significant new challenges to the design of efficient and reliable IoT systems. Security is one of the most crucial ones that need to be effectively addressed for the wide adoption of IoT...
With the development of the equipment, general quality characteristics (GQCs) are getting more and more important. This paper mainly focuses on the procedure and several methods for identification of GQCs.
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
Aiming at improving the Property-Based Attestation without Trusted Third Party, some modifications were put forward. The attestation model was modified, and the Pedersen Commitment Scheme was used again to hide the configuration of platform, so that the privacy leakage problem which then brings the computing complexity can be solved. The protocol is applicable to the case without Property Certification...
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In...
Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Establishing secure communication between two sensors nodes is of typical defense against eavesdropping, therefore in-volveing the key agreement. In this paper, we present a key agreement scheme without the trusted third parties (TTP) by exploiting the special characteristics of...
A comprehensive study has been performed to compute the voltage stability margin for Tri-State South Colorado area using EPRI power system voltage stability region (PSVSR) program. We determined the critical cut-sets to separate the weak region from the rest of the transmission network, calculated the voltage stability boundaries in cut-set state space, and investigated remedial action schemes.
Aiming directly at the frequently used digital signature technologies, which are weak to Substitution Attack and Homeostasis Attack, this article performs the hash transformation on messages before signature. Using the method proposed by J. Seberry, a hash round function is constructed, which simultaneously satisfies the characters of balance, high nonlinearity, strict avalanche criterion and realization...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
Dynamic security region (DSR) gives power system engineers systematic and global information about the feasible operation region. This paper is a result of an investigation into the use of DSR concept and its effective application in bulk power systems. It particularly concerns with developing a software-based tool for the transient stability monitoring in the on-line operation environment. A practical...
Based on Cheng-Liu-Wang identity-based signature scheme and Baek-Zheng pairing-based verifiable secret sharing scheme, a new secure monitoring scheme using identity-based threshold signcryption scheme for wireless sensor networks is proposed. The goal of this scheme is to provide a confidential and authenticated transmission channel for monitoring messages sent by nodes to BS over an insecure wireless...
The conventional security mechanism based on cryptography and authentication is not sufficient for countering all types of security problems resulting from internal malicious nodes and wrong act resulting from hardware breakdown and resources loss. The construction of a reputation based trustworthy sensor networks has recently become a hot point of making up for the shortcoming of conventional security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.