The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
We have developed an iterative method for solving absolute value equation Ax–|x| = b, where A ∈ Rn×n x ∈ Rn and b ∈ Rn. The convergence of the proposed method is argued. Some examples are given to illustrate the implementation and efficiency of the method.
Cipher text-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. However, when CP-ABE is used to control outsourced data sharing, it confronts two obstacles. Firstly, the data owner must trust the attributes authority, secondly, the issue of attribute revocation of CP-ABE schemes, which suffers from such problems as different...
WCF (Windows Communication Foundation) developed by Microsoft is a unified programming model for building SOA and it is highly extensible. The extensibility provides the ability to change the product more easily over time and the flexibility to custom WCF for fitting specific requirements of applications. The extensible characteristics are what make WCF a strong distributed application platform. In...
An heterogeneous distributed system using middleware to finish the visit to each other between P2P and Web Service system is brought forward, and the safety and veracity of visit the service must be ensured. The blue print of middleware is to adding the function of visit Web Service onto the basic function of peer. The middleware provides the service accepting and disposal of request to the Web Service,...
Network security situation perception is to predict the probability of attacks, may occur in the future, by a variety of predicting methods, by recent network attacking data obtained from IDS (Intrusion Detection System). Neural Network model has many features, high degree of fault tolerance, associability, self-organizing and self-learning ability, and strong nonlinear mapping and generalization...
With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations...
Abstract-To study the effect of Xiaoyaosan on changes of behaviors (the open field test, elevated plus maze test and Y-maze test) in chronic immobilization stress (CIS) rats. Methods: 28 male Sprague-Dawley rats were randomly divided into control group, model group and Xiaoyaosan group. CIS was used to induce stress in rats of model group and Xiaoyaosan group, 3 h a day for 21 days. Xiaoyaosan was...
A major challenge facing grid applications is the appropriate handling of failures. Data replication is a key technique of data grid, from which, we can get better access performance. It is a fault-tolerant approach, but at the same time bringing some hidden trouble for security, so security and fault-tolerance should be colligated to research. Combining data replication with security, we propose...
Rootkits Trojan virus, which can control attacked computers, delete import files and even steal password, are much popular now. Interrupt Descriptor Table (IDT) hook is rootkit technology in kernel level of Trojan. The paper makes deeply analysis on the IDT hooks handle procedure of rootkit Trojan according to previous other researchers methods. We compare its IDT structure and programs to find how...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sublayer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
The privacy/security regulation of HIPAA has addressed many of the rights and obligations of both the patient and the health information system. Emergency treatment, however, still presents problems as we do not have an exact definition to apply. By employing cryptographic techniques, we provide a novel model which can confirm several essentials in HIPAA. In particular, we have discussed how the new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.