The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reflection, which is widely used in practice and abused by many security exploits, poses a significant obstacle to program analysis. Reflective calls can be analyzed statically or dynamically. Static analysis is more sound but also more imprecise (by introducing many false reflective targets and thus affecting its scalability). Dynamic analysis can be precise but often miss many true reflective targets...
User preference plays an important factor in E-commerce websites for advertising and marketing, and the disclosure of user preference could also raise privacy concerns. As one of the largest E-commerce platform, Amazon features a wishlist that allows users to keep track of their desired products. In this paper, we investigate Amazon wishlist, and its possible privacy exposure. To this end, we collect...
Minimization of perceptual and statistical distortions is one of the main challenges facing steganographic schemes. The most common approach to minimizing perceptual distortion is Least Significant Bit embedding. However, the statistical features (e.g., histogram) of the stego-images may be changed significantly even with selection of the regions of interest in the embedding process. This opens security...
With the fast development of Wireless Sensor Networks (WSNs) and RFID technology, many Internet of Things (IOT) applications have been deployed in recent years. Smart home energy management systems form part of the smart grid program and are a fast developing smart home application area. Inadequate security is a big issue in smart home energy management systems. Most security protocols widely used...
Wireless sensor networks (WSNs) have gained much attention in both industry and research communities where they are expected to bring the interaction between humans, environment, and machines to a new level. Due to the resource constraints of sensors nodes, it is infeasible to use traditional key establishment techniques that find use in fixed communication systems. In recent years a number of group...
In this paper we study the characteristics of warrant prices and their formation in China's stock market. We use Hull-White option pricing model (H-W model) to investigate the characteristics of warrant prices, and then adopt the behavior finance theories to study the formation of these characteristics. Our study results show that: all sample warrants have great pricing biases; out-of-the-money warrants...
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform integrates open-source router software, real-time network simulation, and light-weight machine virtualization technologies, and is capable of supporting realistic large-scale routing experiments. The network model used consists...
In this work we propose a random index modulation (RIM) based fragile watermarking scheme for authenticating RGB colour images. To thwart counterfeiting attacks, block-wise dependence neighbourhood is established, under the control of a secret key, and a content-dependent watermark is created by picking a certain number of bits from the dependence neighbourhood after scrambling its members. To minimise...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.