The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. More and more research institutes and organizations use this approach to find security vulnerabilities in binary code. However, the existing binary level dynamic test generation approaches and tools are not retargetable, and can only find vulnerabilities in binaries for a specific ISA. This...
A novel watermarking technique based on iamge features and neural network is proposed. The watermark is the fusion of a binary copyright symbol and image feature label which is gotten by analyzing the image fractal dimension. Then the watermark is pretreated by Arnold transform in order to increase the security, and embedded into the multiwavelet transform domain. At the same time, the back propagation...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties (integrity, confidentiality, and authentication) through open XML standards. End-to-end message security assures the participation of non-secure transport intermediaries in message exchanges, which is a key advantage for Web-based systems and service-oriented architectures...
Security protocols provide the basic guarantee to open network of secure communications, but practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic design approach of network security protocols based on the evolutionary algorithm and BEN logic and illustrates the approach can automatic design large-scale security protocols, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.