The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applying Flexsim system simulation software to build the simulation model of logistics sorting system. Before the introduction of automatic sorting equipment and technology in the sorting system, through the establishment of the Flexsim simulation model to simulate, analyze and evaluate the design scheme.
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension, aim to provide strong confidentiality and integrity assurances for applications. Recent work, however, raises serious concerns about the vulnerability of such systems to side-channel attacks. We propose, formalize, and explore a cryptographic primitive called a Sealed-Glass Proof (SGP) that models computation...
This paper presents a new method of power payment based on USBKEY, it combine USBKEY hardware security methods and visualization software to provide a quick and easy secure measure of online payment method, meanwhile the integration of CARD Writer will operate electric card at the time when online payment complete, so users who use electric cards will be able to pay electricity bills indoors.
Internet of Things (IOT) is experiencing a super-fast growing phase. Wireless Sensor Networks (WSN), as the “five sense organs” and teleneuron of IOT, is developing fast along. Owing to the application-oriented characteristics of WSN, WSN applications may differ enormously in implementation methods. The WSN developers may have to rewrite the code for each and every application. Along with the increasing...
Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach...
This paper presents the first computer aided software analysis tool based on HOOMT (High Order Object-oriented Modeling Technique), which provides facilities for structured object-oriented analysis by integrating structured analysis and object-oriented analysis. It contains a graphical user interface for HOOMT-based modeling, supports modeling information management, and provides functionalities for...
After an analysis of some critical limitations of current challenge-response based email anti-spam techniques, the paper describes a solution to the deadlock problem and a way to dramatically improve the speed of the challenge-response process. It involves generating and maintaining email lists of trusted senders, and a backward-compatible extension to the SMTP protocol. In the end, the paper describes...
Software reliability models are used to estimation and prediction of software reliability. Existing models either use black-box approach that based on test data during software test phase or white-box approach that based on software architecture and individual component reliability, which is more suited to assess the reliability of modern software system. However, most of the reliability models based...
Thanks to their intuition and directness, semi-formal graph notations, such as UML, FBD and ER-diagram, have been widely used in every stage of software development to compose a comprehensive specification. But on the other hand, because of the lack of precise definition of semantic, it results in some problems, for example, the inconsistencies of those notations are very difficult to be checked and...
Component-based software reliability analysis typically takes the reliability of component as an invariable property of component itself, disregards the fact that it changes when the component context it interacts changes due to a different operational profile of the system. This paper introduces a subdomain-based analysis approach to characterize the component into path-based architectural reliability...
This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing platform. Then, we introduce the notion of Hardware Integrity Measurement (HIM), which is similar to the software integrity measurement required by the...
Software processes are highly people-dependent and knowledge transfer-centric compared to traditional manufacturing processes. Different people are responsible for different types of knowledge transformation according to the skill set and expertise they master. This adds a great deal of complicated factors in resolving the scheduling problem in software development and maintenance process planning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.