The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network coding improves transmission efficiency by combining packets at relay nodes and thus reduces the number of packets sent to the network. It is a network layer solution to improve network throughput and transmission efficiency. However, a coded packet must be decodable by the destination, otherwise it is a waste of resource to combine them together and to deliver the coded packet. This paper...
Network coding is a network layer technique to 06mprove transmission efficiency. Coding packets is especially ben07ficial in a wireless environment where the dem08nd for radio spectrum is high. However, to fully rea09ize the benefits of network coding two challenging iss10es that must be addressed are: (1) Guaranteeing sep11ration of coded packets at the destination, and (2) Mit12gating the extra...
One of the attacks observed against HTTP protocol is HTTP-GET attack using sequences of requests to limit accessibility of webservers. This attack has been researched in this report, and a novel detection technique has been developed to tackle it. In general, the technique uses entropy-based clustering and application of likelihood analysis to distinguish among legitimate and attacking sequences....
In this paper, we present a formal model and analysis for the security extensions of the Domain Name System (DNSsec) in the interactive theorem prover Isabelle/HOL. Based on the inductive approach of security protocol analysis by Paulson in Isabelle/HOL, we show how the protocol can be modelled and important properties are proved. We prove that origin authentication works securely. In order to illustrate...
One of the attacks observed against HTTP protocol is HTTP-GET attack using sequences of requests to limit accessibility of web servers. This attack has been researched in this report, and a novel detection technique has been developed to tackle it. In general, the technique uses entropy-based clustering and application of Bayes factors to distinguish among legitimate and attacking sequences. It has...
One of the attacks observed against HTTP protocol is HTTP-GET attack using sequences of requests to limit accessibility of web servers. This attack has been researched in this report, and a novel detection technique has been developed to tackle it. In general, the technique uses entropy-based clustering and application of Bayes factors to distinguish among legitimate and attacking sequences. It has...
In consideration of feasibility, searchable encryption schemes in multi-user setting have to handle the problem of dynamical user injection and revocation, especially to make sure that user revocation will not cause security issues, such as secret key leakage. Recently, fine-grained access control using trusted third party is proposed to resolve this issue, however, it increases the management complexity...
This paper proposes format compliant degradation method for Portable Network Graphics (PNG). For PNG degradation, improved prefix method and noise generation method are developed. Security analysis showed proposed scheme is secure, and experiments results showed expected functionality and efficiency.
This paper addresses how to leverage the spatial multiplexing function of MIMO links to improve wireless network throughput. Wireless interference modeling of a half-duplex MIMO node is presented, based on which, routing, spatial multiplexing and scheduling are jointly considered in one optimization model. A linear program-based algorithm is proposed for the joint optimization, and numerical simulation...
In many applications, such as encryption of DateTime field in database, it is desirable to encrypt items from an arbitrarily sized set with the specified format described as “YYYY-MM-DD HH:MM:SS” onto that same set. Unfortunately, conventional block ciphers such as DES, 3DES or AES are unsuitable for this purpose. The solution to it belongs to the format-preserving encryption (FPE) category. In the...
The paper focuses on the field of research on next generational e-Learning facility, in which knowledge-enhanced systems are the most important candidates. In the paper, a reference architecture based on the technologies of knowledge engineering is proposed, which has following three intrinsic characteristics, first, education ontologies are used to facilitate the integration of static learning resource...
From 2000, mobile Learning (m-Learning) and ubiquitous Learning (u-Learning) has been the hottest research topic in e-learning, and now, integrating ubiquitous learning into mainstream of education and train has been the direction in the area, which demand new generational e-learning system. The paper introduces our research efforts in this direction. Based on the key concepts, such as ubiquitous...
In recent years, there are some new directions in learning resource management and sharing research field, which mainly focus on innovative methods to promote sharing and reusing learning resource in modular manner, to create system with capabilities suitable for personalized learning and mobile learning. The feature of adaptive capability becomes more and more important in these systems. These requirements...
Blind Signal Separation (BSS) and Independent Component Analysis (ICA) are emerging techniques of array processing and data analysis that aim to recover unobserved signals or ldquosourcesrdquo from observed mixtures. When the number of independent components is not very many, using ICA algorithm to separate mixed images, the separated images will have a very strong image artifact noise which will...
DubinCore, LOM resource description norm and Sharable Content Object Reference Model (SCORM) standard based on the idea of metadata have solved the sharing problem of static Web resources, by bringing forward description norms of Web resources sharing. However, the modular sharing research of dynamic teaching assistant resources, such as questions and answers database and case database, is almost...
The emergence of ubiquitous learning requires new methods of generating and management of learning materials. In order to meet the needs of learning resources enquiry, resources reorganization and collaborative knowledge building, it calls for a new style of learning content management system in ubiquitous environment, which is the ubiquitous learning content management system (ULCMS). In the new...
The emergence of ubiquitous learning arouses demand of a new style of generating and managing learning resources, which urgently demands a new type of learning content management system (LCMS). Based on the service-oriented architecture, this research will construct a new type of LCMS (bottom-up) to support registration, management and sharing of learning objects (LO). Besides, fitting the upper-oriented...
Password authentication protocol (PAP) is widely used in the wireless fidelity point-to-point protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved. The whole process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.