The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the vulnerability of computer system, Internet worm is still greatly threatenning network security. It is found that the spread of worm regularly change because of the different space distributions of hosts and this phenomenon is defined as diurnal pattern. Based on diurnal pattern, two worm propagation models, namely simple diurnal forced model and complicated diurnal forced one, are constructed...
Fair Multi-Party Certified Mail Protocol is a value service to deliver important data over internet with guaranteed receipt for each successful delivery. Therefore, the protocol needs to be Confidential, Non-repudiation and Fairness. This paper pointed out potential security concern for a current protocol, and also came out an offline third party fair multi-party certified Mail Protocol based on signcryption...
In the design of PKI certificate server, the application Held, deployment scope and consumer requirements are often considered synthetically in order to select a compatible structure pattern. At the same time, to support future technology development and possible change in system requirements well, the certificate server structure needs have some good characteristics like flexibility and extensibility...
DSO is a kind of nifty mechanism used for dynamic linking/loading shared objects. It provides a way to build and load a piece of program code at run-time into the address space of an executable program. When Apache is selected to construct PKI bottom server framework, DSO can be used to create server functional modules. The advantage of DSO object shared and dynamically loaded rest with developing...
We proposed a worm detection and defense system named bot-honeynet in this paper, which combines the best features of honeynet, anomaly detection and botnet. The combination of honeynet and anomaly detection system offers a tradeoff between false positive and false negative rates. The control mechanism of botnet can help our system control all the honeypots in the bot-honeynet. Bot-honeynet is designed...
In this paper, a user can login a certain system with a anonymous ID generated by Key Generate Center (KGC) and perform data signing operation. Other Members in the group, even KGC, can not reveal the real identity of the user from his anonymous ID. When doubt appears, the user can submit evidence information to KGC to prove his legality. The scheme is constructed from ID-based Blind Parameters Signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.