The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, a variety of privacy events emerges and bring huge losses. With the in-depth application of data mining, big data, cloud computing and other technology, privacy protection issue becomes more and more challenging. Therefore, we propose a privacy protection mechanism for sensitive group information. A reasonable counterfeit data set is constructed based on cloud model for sensitive...
Key Management is a major challenge to achieve security in wireless sensor networks. Considering both wireless sensor node's limited energy and the security requirement for WSN applications, In this paper, We propose a New Group Key Management Scheme with simple hash based authentication method, which develops the random pair-wise key pre-distribution scheme. With grouping design and identity authentication...
In this paper, a random sample surveys are made on the overall awareness level of incentive pay element of some R & D staff in the Beijing-Tianjin high-tech enterprises with a questionnaire survey method. In order to analyze and statistic the survey results, SPSS statistical software is used to summarize the constituent elements of a comprehensive salary, which is divided into inherent pay and...
Collaborative design is one of core processes for networked manufacturing, so how to safely transfer design information in the network has important significance. In order to provide the confidentiality of transmission information on the level of design team in collaborative design system, a new broadcast encryption scheme based on designerpsilas identity is presented. The new scheme is based on broadcast...
Wireless sensor networks routing protocols always neglect security problem at the designing step, while plenty of solutions of this problem exist, one of which is using key management. Researchers have proposed many key management schemes, but most of them were designed for flat wireless sensor networks, which is not fit for cluster-based wireless sensor networks (e.g. LEACH). In this paper, we investigate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.