The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Keyboard is the main input device of computer systems. Electromagnetic waves will be emitted while the keys are stroked. These waves may reveal the keystroke information, and it brings about information security problems. Electromagnetic compromising emanations of PS/2 keyboard are studied through laboratory test and mechanism analysis. The testing probe is placed under the control circuit to test...
Keyboard is the main input device for computer systems. Electromagnetic waves will be emitted while the keyboards' working since they contain electronic components. These waves may generate electromagnetic interference, do harm to the operator's health and even reveal keystroke information thus bring information security problems. Focusing on the emanations concerned with information security, two...
This paper studies Chinese e-commerce development and its characteristics under the environment of Chinese foreign trade. It indicates the advantages and disadvantages of the foreign trade and e-commerce. It also finds and determines its external opportunities and challenges, in order to facilitating the e-commerce advantages of China's foreign trade, cope with various challenges and seize the opportunities...
To solve the problem of cheating in the reconstructing process of visual cryptography, a verifiable visual cryptography was proposed by adding a verifier to common visual cryptography scheme (VCS). This scheme can be used in any access structure and can check every share to prevent attackers from spoiling and grabbing the secret information.
A modified threshold visual cryptography scheme (k, l, n)-VCS is proposed, which is used to analyze the relationship between the pixel expansion and the range of the participants?? number. Based on (k, l, n)-VCS, a more precise definition of multi-secret sharing visual cryptography scheme is given, and a new method is presented. Experimental results demonstrate that both pixel expansion and relative...
Since there is eavesdropping and MITM attack during establishing encryption key between two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves cryptography and interlock protocol. This scheme can defend two kinds of attacks mentioned above. It provides bidirectional authentication for two devices and key integrity verification by exchanging the keyspsila Hash-value...
A new method of realizing fingerprint authentication on Smartcard has been presented. Based on SOC, this method puts the pre-processing algorithm, which is the most time-wasting process, out of card. It not only decreases the complexity of realizing fingerprint authentication on Smartcard, but also ensures the security of fingerprint information due to the original fingerprint image has been transformed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.