The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with the advent and popularity of cloud computing, Internet of Things, and bring your own device, the trust requirement for terminal devices has increased significantly. An untrusted terminal, a terminal that runs in an untrustworthy execution environment, may cause serious security issues for enterprise networks. With the release of Software Guard Extension, Intel has provided a promising way...
Trusted computing, which can effectively increase the credibility of information system, has made great achievements and is in continuous development. For country who is going to strengthen network construction like China, it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive...
This paper presents an electronic documents anonymous appraisal protocol using the unconditional anonymous of proxy ring signature and differentiating of the original signature and the proxy signature. The security analysis of the protocol shows that it has a good anonymity and capability of coalition-resistance. This protocol can reduce the possibility which the declarer pulls strings for someone...
In order to solve the problem that encryption files can not benefit from the data deduplication technology, a novel encryption scheme is proposed. According to the method, the basic encryption unit is transformed from the file to the chunks; and the chunk contents are used to generate the symmetric keys, which ensure the determinate mapping between plaintext and ciphertext of data. The data can be...
The distributed intrusions detection system based on remote procedure call (RPC) has revealed the disadvantages that the quantity of data transmission is large, the performance of real time is poor, the dynamic configuration and cross-platform are hard to realize and so on, which have not been able to satisfy the need of the security of network. This paper introduces the technology of mobile agent...
In order to improve the performance of Netfilter firewall framework of Linux while packets are being matched under the stateful inspection, the thesis, which is based on the analysis of the mechanism of stateful inspection firewall and the data structure of Netfilter connection tracking hash table, puts forward a matching algorithm of connection tracking based on IP flow. The algorithm, through revising...
In order to connect the block cipher into stream cipher mode, the middleware about output of the block cipher was designed according to flexible and scalable principle. The byte wise operation can be paralleled to more large scale such as 32 bit wise or 16 bit wise. Secure of this design was demonstrated by the block cipher algorithm itself and the complexity of mask algorithm. The middleware model...
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. In the paper, we describe some typical examples of type flaw attack and give a type flaw attack that was found on the GDOI protocol. We then analyze the limitations of recent tagging technique of preventing type flaw attack. Finally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.