The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduced an improved LZW algorithm of data comp- ression. In view of Chinese text charac- teristic, in this paper, the expansion to the dictionary was carried on, and the first level database of Chinese was added, with some second level of Chinese charac- ters space reserved to improve the dictionary memory method as well as the renewal way which was improved by experiments to the improvements...
In this paper, the trait code identify technique pointed to structure hide and software trait codes in image information hiding is discussed. Trait layering ideas are proposed according to the multi-segment and multi-choice traits. Based on these ideas, trait codes are divide into segments and fragments. Identify algorithm using trait codes search engine to parse trait database is developed to broadens...
The paper expounds the progress made in the block cipher analysis techniques and summarizes the current situation of the block cipher analysis at home and abroad. Furthermore, the paper introduces and compares several common analysis techniques such as differential cryptanalysis, linear cryptanalysis, integral analysis, interpolation attacks, related key attacks, algebraic attacks, side channel attacks,...
The rapidly increasing series of Internet-scale disrupted threat is a pressing problem for every organization that utilizes the network. Many research institutions focus on collaborative security, of which collaborative intrusion detection is an important component. Sharing data among widely distributed intrusion detection systems is essential. To this end, IDWG (intrusion detection working group)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.