The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper Puts forward a novel feedback chaotic block cipher algorithm based on external key control. The prominent advantage of the algorithm is that the cipherkey of the system is composed of 128-bit external keys. The system parameters, initial conditions and iterations of the chaotic system generate dynamically in line with the ciphertext feedbacks. In this way, the randomness and complexity of...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties (integrity, confidentiality, and authentication) through open XML standards. End-to-end message security assures the participation of non-secure transport intermediaries in message exchanges, which is a key advantage for Web-based systems and service-oriented architectures...
Security protocols provide the basic guarantee to open network of secure communications, but practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic design approach of network security protocols based on the evolutionary algorithm and BEN logic and illustrates the approach can automatic design large-scale security protocols, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.