The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of Internet technology, we are now in the era of big data. More and more people are used to posting their thoughts and feelings online. Especially, analyzing the information that can reflect the emotional tendency of the audience plays an important role to the performance unit. There is no doubt that good user reviews are an intangible asset for a performance or a movie and free...
With the continuous development of information construction, the application of digital campus system is increasing, the network scale expanding gradually, access control, and information security problem increasingly prominent. The original decentralized independent certification, the independent authorization, the independent account management model has been unable to meet the current and future...
With the increasing number of applications for security in small devices and short lived transactions services, and the encryption algorithm which we need is faster, more convenient, and more secure. TEA is one of them. In this paper, there are four experiments with 64 and 128 bit size key TEA. The results of the experiments proving that TEA cannot defend Bitsum Attack. The reason is in TEA the bitsum...
Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies,...
The information security technology is one of the key technologies support for the new media of radio and television industry. Video encryption is a computationally intensive and data intensive work. The traditional centralized data encryption system is not enough to cope with the huge amounts of data encryption. It's capacity also difficult to achieve linear growth of data. Famous for allocation...
HB-MAP (HB-mutual authentication protocol) is a mutual ultra-light-weight authentication protocol we have proposed before. In this paper, we present an HB-MAP simulation model. This model is based on the OPNET modeler and includes three parts, namely, the network model, the node model, and the process model. The simulation results are obtained mainly in the aspects of running time, queuing delay,...
With the popularity of the mobile internet, the thin client terminals play an important role in our daily life. Because the thin client terminals have limited computation ability, the light-weight authentication scheme is a urgent problem to be solved. In this paper, we propose a novel mutual lightweight authentication protocol called HB-MAP. In the protocol the client just need store a small amount...
A 200MHz 10-bit pipeline analog-to-digital converter (ADC) that includes a novel multiplying digital-to-analog converter (MDAC) architecture is presented. The proposed MDAC architecture minimizes the feedback penalty, resulting more than 75% power reduction and 50% output noise reduction than those traditional architectures. The proposed MDAC dramatically reduces the settling time and operates much...
The piracy tracking is a important task in copyright protection system for the digital work. The traditional copyright protection system could not prevent the badness customer copying and reselling the digital work and could not prevent the badness author replacing the customer's fingerprint. In this paper, a novel secure scheme is proposed for the piracy tracking. In this scheme, a secure copyright...
For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs....
Mobile multimedia broadcast is a result of the development of the digital TV under the trend of network convergence. In this paper, according to the requirement of authentication and authorization, the particularities of mobile multimedia broadcast are analyzed. The problems of traditional conditional access and digital right management in mobile multimedia broadcast are shown. A new scheme of authentication...
In broad TV network, the broadcasting will coexist with interactive services in a single set-top-box (STB) device and the traditional unidirectional conditional access system (CAS) in DVB can't be adapted to the variation. The dual-CAS is designed based on a double layer security scheme proposed in this paper to implement the authentication and access control, key updates between servers and STBs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.