The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is difficult on many networks: either the volume of data is so large as to make packet inspection intractable, or privacy concerns forbid packet capture...
To improve the ability of system providing service when encounter malicious invasion, a new model of tolerance invasion system is given based on dynamic threshold encryption. The real-time detection of the model is realized by the Collaboration between servers and hosts. The sensitive data in the system apply dynamic threshold encryption, and can change their share with the distribution. The model...
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key management schemes. With the lower cost of computation...
For long-lived and sensitive secrets, it is insufficient to apply the classic cryptography as well as ( ) threshold cryptosystem. Only proactive secret sharing can properly protect them, where the shares are periodically renewed without changing the secret. Hence, the adversary willing to learn the secret needs to break up or more shareholders in the same time period. If the time period and the threshold...
Secure routing is the key to assure wireless sensor networks working in order, and the classical security mechanisms, such as encryption and authentication can only prevent the outside attacks. In order to defeat the attacks of the inside malicious or captured nodes, in this paper, the trust technology and node??s location information are employed in the process of routing. At the same time, for prolonging...
Secure routing is a guarantee for wireless sensor networks working normally. The classical security mechanisms, such as encryption and authentication can only prevent the outside attacks and is helpless to inside attacks. In order to defeat the inside attacks and realize secure and efficient routing in static wireless sensor networks, we make three contributions in this paper. The first is to build...
In this paper, the security of electronic commerce and the security methods are introduced firstly. Then, the history of Java security architecture and its design principles are described. After that, partial implementation of elliptic curve cryptosystem developed with Java is discussed. In the end, the advantages of electronic commerce systems developed with Java language and Java security architecture...
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-HelIman are getting more and more unsafe, and Elliptic Curve Cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides Elliptic Curve Cryptosystem into several layers, every of which corresponds a class...
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-Hellman are getting more and more unsafe, and elliptic curve cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides elliptic curve cryptosystem into several layers, every of which corresponds a class...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.