The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Covert channels via the widely used TCP/IP protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in TCP/IP protocols and propose a new effective method to detect the existence of hidden information in TCP initial sequence numbers (ISNs), which is known as one of the most difficult covert channels to be detected. Our method uses phase space...
with the deployment and appLication of Internet of Things, sensor network middleware has become an increasingly important factor to faciLitate the programmer task and bridge the gap between the appLications and the underlying hardware. Current state-of-the-art middleware for sensor networks lack attention for integrating services into a generic architecture and present inflexibiLity that make them...
Covert channels via the widely used TCP/IP protocols have become a new challenge issue for network security. In this paper, we propose an effective method to detect the existence of hidden information in TCP ISNs (Initial Sequence Numbers), which are known as the most difficult covert channels to be detected. Our method uses phase space reconstruction to characterize dynamic nature of ISNs. A statistical...
Webpage based information hiding technology uses a webpage as the cover object. The research of this area has led to several different techniques, which can be broadly classified into embedding invisible characters based, switching the uppercase-lowercase states of letters in tag based, and altering the order of attributes based. Based on the attributes order, a scheme of information hiding is presented...
In space with the increasing need of humankind to geographical information, the published geographical information based on Internet was supplied for the inquiry and retrieval by the user all over the world and WebGIS which supplies GIS service had become one of the important development direction and content of GIS. At moment, WEBGIS of GIS was one of the hottest topics with quickly development....
The complex network model is the research foundation of complex network, so it is important to evaluate and select model objectively .There is no effective evaluation way up to now. An evaluating method using cloud model is proposed to decrease randomness and fuzziness existing in conventional evaluation. The results of simulating experiments prove that such uncertainty is solved well.
Some problems of file uploading always come across at developing of Web site. In this paper we introduced a way of uploading file which edited with VB.NET in the experimental systems. We emphasized to discuss the theory of uploading file which edited by VB.NET, to achieve the key factor of file uploading based on Web mode , principally to comprehend devising project and assaying theory and editing...
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the Internet. However, how to authenticate each other and agree on a session key has not been efficiently solved. In 2007, Wang and Zhang proposed a key agreement protocol and a new authentication and key agreement mechanism for SIP. In this paper, we prove that Wang and Zhang's key agreement protocol...
The target selection algorithm of passive worms makes them difficult to detect, and therefore they threaten the Internet greatly. Modeling the propagation of passive worms can provide profound insight into the passive worm behavior. In this paper we present a mathematical model named as the passive worm propagation (PWP) model. Based on the two-factor model, it represents the propagation of passive...
With the development of e-commerce, electronic payment systems based on the Web have become a research hotspot. Most current payment models are based on the single bank, and e-cash has a lack of transparency and interoperation generally. Therefore, we put forward a distributed electronic payment system model based on bank union. It adopts a two-level secure architecture to guarantee the security of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.