The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper first discusses the classic methods of covert communication to traverse the firewall devices which control the network communication. And based on the analysis of IPSec protocol architecture, that the worse of network compatibility of IPSec is got. So the new IPSec over HTTP protocol based on IPSec tunnel and HTTP tunnel is exposed including its structure and procedure. The soft structure...
Internet has become the universal information communications infrastructure. VPN is commonly used to implement communications over different branch intranets. IPSec is a suit of protocols that adds security to communications at the IP layer, and it is a popular technology to implement VPN. On the basis of analysis on the insufficiency of traditional IPSec systems, a multi-link aggregate IPSec model...
E-voting based on the Internet has been recently performed in a wide region. There isn't any spatial restriction that a voter has to go to a certain polling place, but an e-voting using the Internet has to gather the computer in which the internet connection is possible. This voting method requires an access account for the e-voting through the beforehand report of a voter. To minimize these disadvantages,...
With the right length of the shared key the steganography method based on the error-correcting codes is perfectly secure. By modifying the part of the codeword of the Reed-Solomon codes according to the error map we can embed the secret information into the RS codeword as there is a mapping code between secret information and codeword error map. The steganography capacity of the RS codes is dependent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.