The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we devise a method to detect robbery and violent scenarios for the goal of improving the security of self-service banks. The method first extracts the motion region from the video and denotes this region with a rectangle. Then, the method calculates the optical flow and energy of the rectangular region. The method takes the length and width of the rectangle, the energy, and the orientation...
Chongqing Chaotianmen Yangtze Bridge with the main span of 552m is the steel truss continuous tied arch bridge. Track cross beams of the lower layer and nodes of main truss are connected by high-strength bolts. To verify fatigue security performance of this node connection, large-scale model of 1/2 is applied in node fatigue test. In the 2 million fatigue tests during design life, the high-strength...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
This paper puts forward a design of electronic payment standard based on CNAPS (China National Advanced Payment System). From the perspective of standardizing the electronic payment remittance and improving the security, this standard solves the problem that online payment of B2B e-commerce has low realization rate in China. This paper describes the design of electronic payment mechanisms with CNAPS...
This article introduced the existing third-party mobile payment model, as well as third-party network security payment model and analysis their pros and cons and then concluded a mobile payment model of a combination of the two models - mobile payment model based on third-party security .Then systematically introduced the model structure, made the detailed design of their payment flow and pointed...
This paper puts forward a new thought of application about the third party assure-payment platform in BtoB mode. The third payment platform has often been applied to BtoC and CtoC, as the guarantee of exchange and payment agency, but now the third payment platform has not play a security role fundamentally. The application about the third payment platform in BtoB has some obstacles. This paper discusses...
Sander and Tschudin proposed mobile code protection scheme - evaluation of encrypted functions implemented by homomorphisms based on exponentiation and Goldwasser Micali, but no homomorphisms enable to hide the skeleton and equal coefficient information of a polynomial. To solve the problems, an idea of approximate decryption and a new revised ElGamal are proposed in this paper. Three new public-key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.