The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The functional vulnerability of Supervisory Control and Data Acquisition (SCADA) Network is investigated in this paper. To describe the functional behavior of SCADA network, a simple dynamic model is used. Then, two SCADA networks with typical structure are reproduced according to the ones in the real world. The functional behaviors of two SCADA networks are investigated, which show that the star...
Information system based on the demand-driven, function-oriented and software life cycle, inevitably had to make excessive abstraction of the richness of the data and application, and then unable to deal with the rapid demand changes, business innovations and organizational changes. In this paper, a user-based query network (UBQN) design is proposed, which designs an interactive Q & A system by...
With the development of IP broadband system, the network transfer from a trusted network to a non-trusted network. The security is an important topic in network research and development. This paper introduces some security methods in access network, just like ATM DSL network, EPON system. An comparison has been done aimed at these security methods.
With the sustainable development of China's economy, China's securities market would play more and more important role in the global securities market. However, as an emerging market, the speculative psychology and short-term investing behavior in China's securities market is very obvious, therefore, it is of important theoretical and practical significance to research on behavioral finance features...
From the Pecking Order Hypothesis, the partiality of enterprise should see the internal fund as the main capital source for investing. Second is the debt, new stock financing is the last one. However, the financing practice of China's listed company just is in opposition to the theory, that is to say, the companies in China depend on the external financing even more than that of the other countries,...
Abstract-A novel steganography algorithm CRCsteg based on CRC method is proposed. CRCsteg exploits the 1-1 and onto mapping from x^j-1 to {R(x)}\{0} over GF(2^k), s.t.1 ?? j ?? 2^k-1 and k = deg(R) +1, to embed the positive integer j into 2^k-1 bits cover stream. The new method has similar performance with previous matrices embedding schemes, and much simpler embedding/extracting codes and computation,...
Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user's control. However, trusted platform module (TPM) with only limited storage...
Compared with mature capital market of developed countries, China's security market is a typical emerging market, no matter the market scale, trade-off frequency or the quantity and operating capability of listed companies, all have a gap with those of mature capital market. In addition, the laws and regulation about China's security market are not perfect and the working personnel have many irrational...
Access network is the last mile of the network, so there are different access ways. How to effectively recognize the access end station and manage them is the hot pot in research field. This paper discusses a novel auto adaptive access network method and gives the system software structure.
The presented mobile DRM are short of an efficient payment protocol to guarantee that participants can engage in the exchange without the risk of suffering a disadvantage. Even the latest DRM standard of the open mobile alliance (OMA) did not give a detailed transaction scheme in mobile DRM. In general, the fair payment approaches in mobile DRM rely on the service of an external trusted third party...
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, signed integer exponential-Golomb coded (SE) encryption algorithm and context-adaptive variable length coding (CAVLC) encryption algorithm are proposed during the process of the entropy coding. In order to maintain the format compliance, the signs of motion vector...
From the viewpoint of risk the power system security and reliability under the environment of electricity market were researched. Because in competitive electricity market the power generation companies, power grid companies and load service entities belong to different economic bodies respectively, so that in the system operation, planning and design the consideration of the factors impacting system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.