The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Compared with single-server authentication scheme, the authentication scheme for multi-server environment has a lot of advantages. Such as users needn't to remember various passwords or register for every application server. In 2016, Irshad et al. proposed a three-factor scheme based on chaotic map for multi-server environment. Irshad's scheme has high efficiency and strong robustness. However, after...
Data encryption is an effective way to ensure the data security in the cloud. To make retrieval of such encrypted data easy for multiple users, searchable encryption in the multi-user setting is addressed. However, it introduces a new critical requirement: access control. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is a promising technique to solve this issue, but it also faces several...
Similar with other outsourced services, cloud storage faces the serious issue of user data security. To keep data confidential against unauthorized cloud servers and users, Attribute-Based Encryption (ABE) for access control is widely adopted. However, ABE-based access control schemes are being criticized for their high computation overhead, such as in key generation, decryption and revocation. Considering...
There exists a specific security issue in symmetric searchable encryption that, when doing CKS(Conjunctive Keywords Search), the trapdoors and search results may reveal the relationships between the keywords being searched. For example, if the search result of keywords set A is the superset of keywords set B's, it indicates A is a subset of B by a high chance. Most existing search methods that support...
To keep data confidential against unauthorized cloud servers and users, cryptographic access control mechanisms must be adopted. However, user revocation is a challenging issue since it would inevitably require data re-encryption, and may need user secret key updates. Considering the complexity of fine-grained access control policy and the large number of users in cloud, this issue would become extremely...
A dual routing engine-based routing scheme for large scale optical networks is proposed in this paper. An interpreter-based modeling of the group engine is discussed and a preliminary routing strategy is designed with consideration of scalability and flexibility.
In recent years, GIS(Geographic Information System) develops rapidly, and it is applied in various industries. But the application of GIS in electronic commerce is far behind its application in other areas. Using the programmable interfaces provided by Google Maps, we created an online shopping system which has the map functions to probe the application of GIS in electronic commerce. The system adopts...
It is described the basic knowledge of data mining, SQL Server 2005 data mining platform and its function, and presented advanced structured scheme of data mining based on SQL Server 2005. On this basis, using decision tree algorithm provided by SQL Server implements data mining for an example, and results are forecast to achieve the desired purpose.
As one of the most popular applications in China, Xunlei's excellent performance attracts us to pay more attentions to its system mechanism. The issue of bandwidth theft in Xunlei is one of our focuses. Although its proprietary nature and its use of data encryption hinder our studies of Xunlei to some extent, we analyze and evaluate behaviors of bandwidth theft in Xunlei based on our measurements...
We compared UDP and TCP traffic in several traffic traces collected from different networks and geographical locations, at different times. We find that TCP still dominates in terms of packets and bytes, but UDP is now often responsible for the largest fraction of flows on a given link. A port-based analysis suggests that the recent increase in UDP flows on the traces analyzed stems mainly from P2P...
eDonkey has become the most reliable and popular P2P file sharing software with largest users. But currently it is still a problem that how to find resources you need exactly and quickly. The traditional searching method which is based on keywords cannot fulfill the needs of people. The effective and promising method is semantic searching. Semantic-based study has become one of hot spots in the nature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.