The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The introduction of verifiable computation came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted servers and also to the growing desire of weak clients to outsource computational tasks to more powerful computation services like in cloud computing. Verifiable computation enables a computer to offload the computation of some function, to other perhaps...
Distributed machine learning algorithms play a significant role in processing massive data sets over large networks. However, the increasing reliance on machine learning on information and communication technologies makes it inherently vulnerable to cyber threats. This work aims to develop secure distributed algorithms to protect the learning from adversaries. We establish a game-theoretic framework...
There is a growing need for government agencies to monitor suspicious communication links to prevent crimes and terror attacks. In this paper, we study a legitimate surveillance scenario where a legitimate monitor aims to intercept the suspicious communication between a transmitter and a receiver over fading channels. The legitimate monitor can eavesdrop (decode) the information of the suspicious...
With a large number of sensors and control units in networked systems, the decentralized computing algorithms play a key role in scalable and efficient data processing for detection and estimation. The well-known algorithms are vulnerable to adversaries who can modify and generate data to deceive the system to misclassify or misestimate the information from the distributed data processing. This work...
Twitter is an extremely popular social networking platform. Most Twitter users do not disclose their locations due to privacy concerns. Although inferring the location of an individual Twitter user has been extensively studied, it is still missing to effectively find the majority of the users in a specific geographical area without scanning the whole Twittersphere, and obtaining these users will result...
In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs). The IRs are served with best- effort secrecy data and the ERs harvest energy with minimum required harvested power. To enhance physical- layer security and yet satisfy...
Intelligent System (IS) technologies have shown encouraging potential in facilitating very fast power system dynamic security assessment (DSA) in recent years. In general, the development of the IS consists of four stages. This paper conducts a comprehensive and detailed review on each stage and classifies the methods involved in the stages. The classification highlights the differences between the...
This paper describes the concept of wisdom networks. First, we overview some related intelligent networks and propose the wisdom network. Then, the analysis of wisdom node is outlined. And then, the architecture of wisdom network is proposed. Open research issues for the realization of wisdom network are also discussed.
With the widespread use of electronic health record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructure for facilitating EHR sharing and EHR integration. In this paper we discuss important concepts related to EHR sharing and integration in healthcare...
Extensible Firmware Interface (EFI) is a new interface applied for platform firmware and the operating system. Due to providing extensibility and customization, EFI is also a new technology instead of the conventional Basic Input-Output System (BIOS). However, the issue of building trusted EFI BIOS becomes increasingly important. The key of establishing trusted EFI BIOS is based on the trust transition...
Universal network and pervasive service is one kind of new network architecture. In this architecture, in order to guarantee the security of access network and terminal, terminal access control and access network authentication must both be implemented. Terminal unified access control method based on identifier realizes unified access control of various terminals, authentication of authentication...
The promulgation of regulation fair disclosure of itself is a kind of information, having impact on the behavior of the securities market participants. Taking advantage of SME board listing of companies regulation fair disclose guidelines, adopting the event study method, this paper empirically tested whether it had influenced the stock return of China's Shenzhen SME board. In this paper, the phenomenon...
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper presents...
Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel protocol by cooperation between two kinds of agents -Task Agent and ACK Agent. Task Agent moves freely in the net to complete some task...
Spyware is a kind of malicious code that is installed on victims' machines without their content. They spy on the users' behavior and compromise their privacy, while transmitting sensitive information to some remote servers. Current anti-spyware tools are similar to anti-virus products in that they identify known spyware by comparing the binary image to a database of signatures. Unfortunately, these...
The malicious code has characteristic of various types, and its ability of hiding increases quickly. In this paper, according to the analysis of hiding technology of malicious programs, it proposed a new idea of detecting malware based on the raw data. Finally, the results are given, which are compared with the current security detection scanners. It is a beneficial attempt of this method in detecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.