The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper puts forward a new flipped laboratory mode for the computer network experimental course. In this mode the experiment process is reformed and the experiment course is extended to outside of lab. Different experiment activities are designed according to different experiment categories. The paper presents that what constitute the framework of the mode, how the experiment activities of the...
The sesamoid bones of feet are quite small but they play very important roles in regulating pressure. In this study, 9 male wrestlers from Guangdong Greco-Roman wrestling team served as the subjects. CT scanning image of feet and data have been used to reconstruct the three-dimensional structures of feet, based on which the investigation and measurements of the sesamoid bones and supernumerary bones...
Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party...
To mitigate security problem brought by Android malware, various work has been proposed such as behavior based malware detection and data mining based malware detection. In this paper, we put forward a novel Android malware detection model using data mining techniques. We design an algorithm with two steps. The first step is modeling Android application code into graph structure, called API control...
Android, one of the most popular mobile operating system in recent year, attracts device users by its numerous applications. Google built Google Play Store as its official Android market for Android users to search and install apps. However, with the increasingly growth of the number of apps in Android marketplaces, some undesirable apps began to turn up. Plagiarisms and malware are two main kinds...
In mobile Internet, Location-Based Services (LBSs) as a popular kind of context-aware recommendation systems can recommend Point of Interest (POI) data according to current locations of users. However, the inherent feature leads to leak sensitive location information of users into untrusted LBS providers. This paper aims at the location privacy problem on query prediction which forecasts next locations...
A wireless Ad Hoc network is an infrastructureless self-organizing network. Access control problem of strangers may happen because of its strong openness. Trust management based on policy can dealt with such problem, which can deliver access control policies to strangers through credential-delegation to give them permissions. But the delegation frameworks are somewhat coarse-grained and subjective...
The vehicle collision absorbing system based on magneto-rheological (MR) damper is proposed to cope with the problems of traditional passive vehicle absorbing system. A dynamic model of vehicle collision based on an MR absorber is first constructed. A human simulated sliding mode control (HSSMC) is then formulated according to the characteristics of vehicle collision. Finally, the numerical simulation...
Key agreement protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities and which cannot be predetermined by any party. Recently, the notion of certificateless public key cryptography was introduced to mitigate the heavy certificate management burden in traditional public key infrastructure and...
People's increasingly relying on web applications to manage their digital assets makes web authentication a critical security issue. As most websites today still authenticate a user with only username and password, the authentication credentials can be easily compromised in a vulnerable browsing environment without the owner's notice. Considering the browsing in mobile devices is more secure than...
In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper we propose a...
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the security and privacy of the users. In this paper, we present WebIBC, which integrates public key cryptography into web applications without any browser plugins. The public key of WebIBC is provided by identity based cryptography,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.