The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gesture-based lock plays an important role in many Android applications to prevent unauthorized access. Unfortunately, application developers tend to abuse some features provided by Android platform and neglect their influence on the security. This may result in fatal vulnerabilities which can be exploited to bypass gesture-based lock. In this paper, we focus on the vulnerabilities of gesture-based...
Named Data Networking (NDN) is a clean slate Internet paradigm that embeds some security primitives in its original design, which is being considered as one of the promising candidates for next-generation Internet architecture. However, it may suffer from some emerging threats such as Interest Flooding Attacks (IFA), which means corresponding security management mechanisms need to be designed to improve...
In this paper, considering the development of China's socialist market economy and the actual situation of our army's civil-military integration system, the development of the socialist market economy and the building of our army's equipment maintenance system are creatively combined closely, the risks of the construction of civil-military integration equipment maintenance support system are analyzed,...
Network security has become an increasingly important yet challenging issue in present production networks. State-of-the-art solutions cannot meet the overall requirements of high-efficiency security, due to the complicated configuration demands, heavy network traffic and ever-increasing network scale. In this paper, we present Live Sec, a scalable and flexible security management architecture, which...
Security in control system is an important issue. To safety-related system it is more critical. A safety-security communication measure to counteract nature or intend data modification is proposed, which based on refining characters of data with MD5 approach. And to some low speed network a 2-refine approach is introduced which based on MD5 and CRC. A confidential communication to secure all the data...
Modern networks are increasingly becoming content aware to improve data delivery and security via content-based network processing. Content-aware processing at the front end of distributed network systems, such as application identification for datacenter load-balancers and deep packet inspection for security gateways, is more challenging due to the wire-speed and low-latency requirement. Existing...
The traditional network design puts little emphasis on security and management of the transport layer mechanisms. However, new applications requiring security such as on-line bank and on-line shopping emerge sharply. Besides, various new applications induce the problem of management for pricing, reliability and resource distribution. Hence, a secure and manageable transport layer mechanism is significant...
Along with the advance of the smart grid, more and more new energy is introduced into the power system, especially wind power. Their natural characteristics like stochastic capacity and intermittent fluctuation produce an impact on the power grid's operation security. This paper takes many uncertain factors into account such as the variation of loads and generator outages. In this paper, a Beta distribution...
IP multimedia subsystem (IMS) is considered as the main solution for the next generation multimedia rich communication. The hotspot topic of IMS has motivated many researches on the performance modeling and analysis based on SIP. In order to analyze expected performance characteristics of IMS more precisely, we proposed our novel work which is the first study to accurately describe SIP signaling in...
This paper presents an approach based on energy control for thermal generating unit economical dispatch considering transmission safety, energy and emission constraints. With integration of safety or emission constraints, many algorithms are varied with years. This paper converts a multi-objective model to a single object model with emission using nonlinear model. The framework include: unit economic...
Healthcare is an information intensive industry. Pervasive computing, as the third wave of computing technology and when applied to healthcare systems, could potentially revolutionize next generation medical applications and significantly improve the quality of healthcare services. Healthcare information is very sensitive and security, privacy, and trust have been critical issues in health care and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.