The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
By analyzing AAA service log data of one main ISP in China, we found that the variations of authentication success ratio (ASR) exhibit counter-intuitive behavior. The ASR is actually higher during peak hours than off-peak hours. To account for this paradox and explain ASR variations in general, an analysis mechanism is proposed. It has the ability to separate ASR variations into systemic changes over...
In-home IoT devices play a major role in healthcare systems as smart personal assistants. They usually come with a voice-enabled feature to add an extra level of usability and convenience to elderly, disabled people, and patients. In this paper, we propose an efficient and privacy-preserving voice-based search scheme to enhance the efficiency and the privacy of in-home healthcare applications. We...
This paper presents a novel access control scheme for personal health record(PHR) data in cloud computing. The scheme utilizes attribute-based encryption(ABE), hash function and symmetric encryption to realize a fine-grained, multi- privilege access control to PHR. The patients can share their PHR with medical staff from various departments with different privileges securely. The experimental results...
The Internet of Things (IoT) is an extension and expansion of the Internet which is extensively deployed in the healthcare field. With the proliferation of Personal Health Devices (PHDs), there is a significant incompatibility issue where devices use special data transfer protocols and can only communicate with special healthcare providers from the same manufacturer, thus interoperability and network...
Data access control is a challenging issue in cloud storage. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a potential cryptographic technique to address the above issue, which is able to enforce data access control based on users' permanent characteristics. However, in some scenarios, access policies are associated with users' temporary conditions (such as access time and location) as...
This paper argues that the decentralization feature of Peer-to-Peer (P2P) overlay is more suitable for Volunteer Computing (VC), compared to the centralized master/worker structure in terms of performance bottleneck and single point of failure. Based on the P2P overlay Chord, this paper focused on the design of a workload balancing protocol to coordinate VC. The goal of the protocol was to maximize...
Anycast is a new communication service for the transmission of data from a source node to (any) one member in a group of designated recipients in a network. Using anycast services may considerably simplify some applications. In this paper, an anycast routing algorithm based on parallel evolutionary algorithm (ARBPEA) is proposed. According to the formulation of anycast routing problem, the initial...
With the constantly emerging of new ways to release information on the internet, together with the rise of several other technologies such as cloud computing and the internet of things, data is explosively growing at an unprecedented speed, manifesting the coming of the era of big data. Facing the challenge of large-scale, demand diversity and real-time processing for big data, the efficient processing...
Software defined infrastructure greatly reduces the deployment cost of distributed applications. Many distributed applications employ message oriented middleware (MOM) for the integration of heterogeneous components and to achieve scalability and fault tolerance. The structure of a distributed application can be very complex. In addition, the asynchronous message delivery model of MOM further complicates...
It is well-known that localization in Wireless Sensor Networks (WSNs) is costly. However, after deploying and localizing the sensors, sensors may be moved from their original location by the depredation of the enemy or natural phenomena. In such cases, moved sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Network security is being payed more and more attention nowadays, especially in the protection of enterprise intranet security has become the current research focus. This paper provides a method of monitoring illegal extra-connection of enterprise terminal devices based on flexible policy configuration, in the process, all the terminals that access to corporate intranet hosts and other devices will...
We report on a quantum key distribution (QKD) experiment where a client with an on-chip polarisation rotator can access a server through a telecom-fibre link. Large resources such as photon source and detectors are situated at server-side. We employ a reference frame independent QKD protocol for polarisation qubits and show that it overcomes detrimental effects of drifting fibre birefringence in a...
This paper introduces based on 51 MCU Ethernet interface hardware circuit design and software implementation. Describes how to transplanting ZLIP protocol into the C8051F120 micro controller to debug and run, Experimental results show that the Ethernet system operated normally, better real-time data transmission and stability. This design provides a easy and low cost method of network interface design,...
SSL protocol realize identity authentication through verifying both sides' certificate, but there are still some drawbacks. Through applying attribute certificate and improving SSL handshake process, we can improve the function of the SSL identity authentication, let SSL apply more widely.
Push-to-Talk over Cellular (PoC) system is ideal for group communication in many cooperative work environments because of its wider coverage and more flexibility than traditional trunk communication systems. The long session-setup-delay is an important problem that must be solved before the commercial application of PoC system. Many research works have been done to solve it in some mobile networks,...
With the development of Internet and Multimedia Technology, to meet the demand of call center distributed deployment and the multimedia information integrated access and unified service and the need to reduce the manpower cost, the softswitch-based Panorama Call center technology has already become the hotspot in the call center industry. This article elaborates the design of softswitch-based Panorama...
It has been proven that the batch renewal process is the least biased choice of traffic process given the infinite sets of measures of the traffic correlation, (i.e. indices of dispersion, covariances or correlation functions) in the discrete time domain. The same conclusion is expected to hold in the continuous time domain. That motivates the study and comparison of similar queues, fed by batch renewal...
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. The two attack model can be prevented by ensuring that cloaking regions satisfy ksharing property or l-diversity property, however, when the overall POI (point of interests)distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.