The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme...
Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus...
We analyze the security of asymmetric group key agreement (ASGKA) protocol in the universal composability (UC) framework. An ideal functionality that is suitable for ASGKA protocol is proposed. And we show that the ASGKA protocol securely realizes the proposed ideal functionality that can resist attacks by malicious insiders. The UC framework allows the protocols to guarantee their security under...
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
Central utility services are increasingly networked systems that use an interconnection of sensors and programmable logic controllers, and feed data to servers and human-machine interfaces. These systems are connected to the Internet so that they can be accessed remotely, and the network in these plants is structured according to the SCADA model. Although the physical systems themselves are generally...
In this research, a new method for discrimination of varieties of rice by means of near infrared spectroscopy (NIRS) was developed. First, the characteristic spectrums of rice were got through principal component analysis (PCA). The result of the analysis suggests that the reliabilities of first 4 principal components are more than 99.338%. The 2-dimontional plot was drawn with first and second principal...
In parallel computing, the memory requirement is an important problem, and in parallel software development, it is vital to optimize the memory management strategy. Programmers need to know the memory optimizing degree. But, the parallel programs' performance evaluation metric speedup only refers to computing time, without considering the memory cost when executing programs. In this paper, the relationship...
In the optimizing work of parallel program, especially in the realm of massively parallel computing, the parallel computing time and space must be concurrently carefully considered to cut down the computing time as much as possible, because lots of poor parallel space strategies would impact negative effects on computing time. Although, sometimes we have no choice but to sacrifice the space for the...
In the instruction of computer courses, some students copy other's source code as themselves. In order to detect this plagiarism accurately, researchers did a lot. In this paper, we described a source code plagiarism detection technology based on AST, this technology can detect the plagiarism accurately when the position of functions is changed by plagiarist. At first, transforming the programs to...
How to manage local area network (LAN) scientifically and effectively is an important question in remote control area. Remote control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. This paper introduces the design and implementation of an intelligent, real-time controlling management system which has already been deployed in real...
How to management local area network (LAN) scientifically and effectively is an important question in remote control area. Remote Control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. An intelligent, real-time controlling management system was designed and implemented. The key control functions of network communication, remote...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.