The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The transistor density of microprocessors continues to increase as technology scales. Microprocessors designers have taken advantage of the increased transistors by integrating a significant number of cores onto a single die. However, a large number of cores are met with diminishing returns due to software and hardware scalability issues and hence designers have started integrating on-chip special-purpose...
The existing security defense systems, which have limitations in many ways, can not adapt to the needs of the future network defense. In allusion to this problem, an intelligent security defense scheme and its intelligent security functions are designed. In order to packing the mainly functions in the form of component, a security function component model is designed. Finally, this paper gives a realization...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this contribution, we briefly survey previous works regarding...
As the absence of a centralized control in mobile ad hoc networks (MANET), the tradition public key infrastructure (PKI) model is not fully applicable in MANET scenarios. In this paper, we have implemented a fully distributed Certificate Authority (CA) which based the Identity-Based Encryption (IBE) combined with distributed secrete sharing algorithm [1], and integrated it with an OLSR MANET. With...
Cellular networks and ad hoc networks have been widely deployed to provide many different services for mobile users. Due to their complementary properties, integrating networks of cellular networks and ad hoc networks are about to employed in commercial applications. Hence, secure authentication systems are vital to support this architecture. In this study, we propose a secure authentication scheme...
SIISAM is a multilayered, Web-service-based architecture model designed to guide construction of a secure, interoperable, and extensible information system that allows smooth interoperation of legacy applications. A pilot e-government system in China built using the model has achieved its targets in both functionality and performance.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.