The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
EPCglobal network was designed aiming at sharing information and increasing interoperability, effectiveness and visibility of the supply chain networks via RFID-enable technologies, open architecture, and item-level data query. Since the network needs to manage billions of nodes, machines and users with sensitive information stored in distributed heterogeneous databases from multiple parties, a secured...
This paper studies the decision behavior of workers and characteristics of retirement age in social security system. Based on overlapping-generation model and Markov decision process, this paper constructs a dynamic decision model for social security system. In this model, workers choose their optimal retirement age taking into account the current social security system. In addition, this paper analyzes...
Body Sensor Networks (BSNs) provide continuous body health monitoring and analysis of physiological parameters. A high degree of security and privacy protection for BSN is extremely required. In this paper, a highly flexible authentication and key establishment protocol based on ECG signals and fuzzy commitment, namely ESKE, is proposed. The uniqueness of ECG signals guarantees that ESKE can provide...
Radio Frequency Identification (RFID) is emerging as a popular technology for automatic data collection and identification, which can be broadly applied to nearly everywhere, such as library, mass transit, healthcare, E-passport, and supply chains. However, it also brings many security vulnerabilities and threats. Much of the early research in RFID security has been predominately focused on studying...
With the rapid development of Internet, it is an important task to ensure that college students accessing the Internet in a healthy way. This paper discusses the monitoring of user behavior by means of SNORT software in order to establish a campus network security monitoring system.
Access control with identity authentication becomes crucial for critical circuit breaker operation in the substation automation system. According to IEC 61850, the implementation of access control policy depends on a virtual access view. But the standard only defines a concept to resolve the access control problem; neither the virtual access view nor the password verification procedure has proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.