The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the electric car battery safety early warning ability and decrease the safe accident of electric vehicle charging, the electric vehicle charging safety factors are analyzed, the security early warning index selection ways and methods are studied, and a security early warning evaluation index system is set, the evaluation method of weight for safety index is discussed. Besides,...
In this paper, we study the physical-layer security of amplify-and-forward relaying networks under a spectrum-sharing mechanism over independent non-identically distributed Rayleigh fading channels. Relay selection is presented to select the best relay, which can guarantee the security performance by minimizing the received signal-to-noise ratio at the eavesdropper. In order to guarantee the quality-of-service...
The development of the Internet and telecommunication urges researchers to look for a better way to secure online users' private information. This study is rooted in online user account protection, measuring the effect of QR codes on fear appeals and authentication protection. This study contributes to the extant literature by integrating two theories — protection motivation theory and the theory...
The inherent variability and uncertainty of intermittent generations bring great challenges both to the safe operation of power grid. In this paper, we present a novel stochastic security constraint unit commitment (SSCUC) model that can take into account multi-objective and various probability constraints, especially effective in treating transmission constraint. The model focus on the difficulties...
Data fusion techniques are a promising solution to increase the lifetime of wireless sensor networks, because it allows the reduction of data that needs to be transmitted back to the network sink. However, data fusion schemes are vulnerable to Byzantine attacks. Specifically, a Byzantine (dishonest) data fusion node can send falsified fusion data to mislead the sink. Hence, many witness-based schemes...
This paper develops a model for scheduling large-scale hydrothermal power systems based on the Mixed Integer linear Programming (MILP) technique. The advantage of this model is that the schedules can make coordinated decision for hydro and thermal units, take into full account the hydro unit constraints in achieving overall economy of power system operation. The planning problem is not decomposed...
Abstract: Research on the fair value is always the key problem and also the crucial problem of the world accounting research, especially in the financial crisis. This paper provides data support for the empirical research of the relevance of fair value in China. By analyzing the financial data of listed commercial banks in China in 2006 and 2007 through an empirical method, the changes of explanation...
Since the introduction of numerous IT technologies, formal business cases convince that proper e-HR strategy could lead to cost reductions, improved service and transaction accuracy, etc. However, many difficulties have appeared in the implementation of e-HR. In the relative low level of e-HR, the deficiencies of techniques and skills might be the main barriers in the application of e-HR; during the...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
A survivability information system based on service self-organization is proposed under the precondition of modules redundancy backup. The service self-organization way divides the system into services communications modules, services distribution modules, data storage modules according to service processing flow, the backup modules send its survivability information to the working modules duly, and...
Based on the view point of supply, this paper selected eight variables-rural education, infrastructure, capital investment, etc. as the focused set of rural public goods to establish the analytical framework and model for the priority order selection of the effective supply of rural public goods. Meanwhile, from the perspective of public goods demand, the authors conducted a questionnaire survey to...
Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity...
In this paper, we present the first biometric identity based signature (BIO-IBS) scheme that is fully secure in the standard model. We use biometric information as the identity and construct the user's public key by using a fuzzy extractor. A biometric reading provided by the alleged signer would be enough to verify the signature. The scheme was proven fully secure based on well-exploited q-Strong...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.