The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
The quality of water resources has a direct impact on the daily life of mankind and the sustainable development of society. However, with the rapid development of national industrialization, the current industrial wastewater discharge and improper handling have become more and more serious, especially for the growing domestic water pollution today, it is an urgent need for an efficient water quality...
Stereo-electroencephalographic (SEEG) depth electrodes were used to record neural activity from deep brain structures in this study. By localizing all the electrodes into the individual brain, we found that areas that are inside of central sulcus occurred obvious hand-movement-related modulation when the subjects were performing different hand motion tasks. Then, an asynchronous brain-computer interface...
To build a simple picture of M2M communication under service-oriented M2M architecture, a key innovation underlines the enablement of M2M device abstraction and semantics support. However, state of the art structures of M2M devices/software lack common M2M Service Layer for interoperability. Devices/software rely heavily on specific API implementation-oriented data services and the data definition...
Video telephony has recently gained its momentum and is widely adopted by end-consumers. But there have been very few studies on the network impacts of video calls and the user Quality-of-Experience (QoE) under different network conditions. In this paper, we study the rate control and video quality of Skype video calls. We first measure the behaviors of Skype video calls on a controlled network testbed...
The mobile e-commerce protocols often have more complex structures than authentication protocols. Strand space model (SSM) is an intutive, highly efficient formal analysis method. In this paper, the strand space model is described and expanded, and the confidentiality, authentication and fairness of KSL protocol are analyzed by strand space formal methods. The analysis shows KSL is unfair and an improvement...
Asynchronous sequential circuit or protocol design requires formal verification to ensure correct behavior under all operating conditions. However, most asynchronous circuits or protocols cannot be proven conformant to a specification without adding timing assumptions. Relative Timing (RT) is an approach to model and verify circuits and protocols that require timing assumptions to operate correctly...
As IT systems proliferate to support business processes, users and system administrators are faced with an increasingly complicated interface to accomplish their job functions, some uniform identity authentication systems are developed to integrate different application systems in recent years. However, most of them only can integrate C/S systems. Thus, a new uniform identity authentication system...
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business process logic. Traditional workflow management models have obvious shortcomings in describing complex workflows. Such complexity is due not only to the complicated dependencies among tasks,...
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together,...
Asynchronous circuit design can result in substantial benefits of reduced power, improved performance, and high modularity. However,asynchronous design styles are largely incompatible with clocked CAD,which has prevented wide-scale adoption. The key incompatibility istiming. Thus most commercial work relies on custom CAD or untimeddelay-insensitive design methodologies. This paper proposes a newmethodology,...
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Rubin logic has been extended to analyze electronic commerce...
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. BAN-like logic is one of the main techniques for analysis of authentication protocols, but protocols idealization is...
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Considered the properties of electronic commerce protocols,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.