Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the current electronic industry, embedded systems have become essential components in most electronic devices. The fast growth mobile devices have been used in every sector and brought wide applications in many aspects of our society. These devices involve in internet connections, wireless communications and even cloud computing, which increases the necessity of both hardware and software securities...
This paper proposes two systems, Driving Security Determination and Assistance Overtaking System and Intelligent System, to analyze the performance of the right-most rule on multi-lane traffic flow. Driving Security Determination and Assistance Overtaking System (DSDAOS) is established to analyze the relationship between security, speed limit and traffic flow while Intelligent System (IS) is theoretically...
This paper puts forward an analytic factor neuron model which combines reasoning machine based on the cloud generator with the Factors Neural Network theory. The factor neuron model is realized based on mobile intelligent agent and malicious behavior perception technology. Therefore, it, compared with the traditional security defense technology, has strong flexibility, mobility, scalability and other...
Intrusion detection technology has developed over more than 30 years from the host-based to network-based and has become the indispensable security technology of information systems. On the basis of the study of the existing intrusion detection systems, this paper reviews the history of intrusion detection technology, and sum up the recent hot-spot problems researched. Then, six technical difficulties...
In order to protect the interactive behavior between nodes in collaborative manufacturing grid environment, a security access control model based on nodes trust was proposed. This model divided trust relationship between grid nodes into trust relation domain and trust relation outside domain, and given out its expressions. Some methods to calculate direct trust value and recommendation trust value...
In recent years, electronic commerce is a hot issue in Chinese economic field. However, E-commerce developments in China there are still many problems, such as inadequate infrastructure and the security of electronic payment can not be assured. The problems have seriously affected the healthy development of e-commerce. Based on the current status of e-commerce development in China, this paper pointed...
IRC botnet can be regarded as a collection of compromised computers (called Zombie computers) running software under the command-and-control infrastructure constructed by the IRC server. The connection between the botnet server and the bots are usually very dynamic. In order to describe a botnet at a finer granularity, the paper proposed a method that identify homologous botnets by extracting communication...
In order to avoid tremendous attack from malicious computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism has been introduced to distinguish humans and computers. Due to the fast development of pattern recognition and artificial intelligence technology, there are increasing safety loopholes concerning traditional 2D static CAPTCHAs, resulting...
Conficker is a worm outbreak recently which form a large botnet and became a huge threat to the security of the internet. In this paper, the redirect technology of domain name was used to monitor the conficker. For it's low killing rate and long-term period of propagation, we built a propagation model of botnet based on conficker monitoring. In the model, we take into account the geography, connectivity...
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger model theory is a hypothesis of artificial immune systems. This hypothesis explains what is malicious from the trend of behaviors in a computer system. This paper presented a novel idea that malicious...
Trusted computing has become a new and challenging research issue in the field of information security. We presented the principle mechanism of TPM (trusted platform module) and TSS (TCG Software Stack), introduced the key components and framework of trusted computing platform, and proposed a new technology named portable TPM, which has an advantage of not requiring to amend computer mainboard compared...
At present, the electronic document in Intranet is not flexible enough in use. We cannot authorize different paragraphs of one document to different persons in file system. Furthermore, there are two security requirements of e-document: (a) The inadvertent disclosure of the commercial confidential information by legal user causes enormous losses. (b) Once the commercial confidential information is...
We propose a public key homomorphism in real domain based on a modified ElGamal. It can encrypt addition, subtraction, multiplication, and division operation in real domain. It solves all problems in Xing et al.psilas method based on Lee et alpsilas homomorphism and can be applied in many applications.
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of payment. TLA is One kind of logic brought forward...
Anonymity is the property of keeping secret the identity of user accessing a certain resource or service, and it is a main approach to protect userpsilas privacy. At present, many solutions of anonymity have been proposed, but they seldom concern how to evaluate the security of an anonymity mechanism. As userpsilas actions are often dynamic and random in the network, this paper proposes a novel conceptual...
By using of chaotic map and block-wise independent technology, a new chaotic fragile watermarking algorithm is proposed in this paper. Firstly, location key is looked as logistic chaotic initial value to iterate and create location matrix, according to this matrix we can generate mapping image and identify the embedding location of watermarking in image blocks. Then watermarking sequence related with...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.