The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper an efficient and secure range query protocol in two-tiered wireless sensor networks introducing master nodes. Our proposal not only prevents adversaries from gaining sensitive...
Based on brief description of the development of China's history ofindemnificatory housing, this paper focused on the dilemma and the government behavior in the development of indemnificatory housing, getting a conclusion that the local governments' object of pursuit high growth of GDP and the land finance is the main course of the plight. Then the paper analyzed the necessary to address the middle-income...
China's third-party payment market is growing rapidly, but almost all companies incur loss, as they implement a free policy in order to allow the C-C platform they are affiliated to seize more market share. This article believes that the free model is unsustainable, as it is not consistent with the security and credit guarantee function of TPP. The loss and inherent risk in the existing unstable profit...
Development of C-C e-commerce market depends on a healthy and complete credit system, and a healthy and complete credit system should be established on the basis of an active and authentic feedback. However, basing on survey results and the research on psychology and behaviors of evaluators, we find that there is a tendency for them to not give feedback after transaction. Moreover, the defects of...
This paper analyzes two major types of latent risk of the network virtual assets: the network virtual environment risk and the specific assets risk. The network virtual environment risk includes risks of network safety, exchange rate and credit of operators. The specific assets risk includes the liquidity risk caused by specific virtual asset changing into virtual currency and the risk of virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.