The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Cyber Physical Systems (CPSs), traditional security mechanisms such as cryptography and access control are not enough to ensure the security of the system. In a CPS, security is violated through complex interactions between the cyber and physical worlds, and, most insidiously, unintended information leakage through observable physical actions. Information flow analysis, which aims at controlling...
The key to computer security is the notion of information flow. Information flow occurs either explicitly or implicitly in a system. In cyber-physical systems (CPSs), complicated interactions occur frequently between computational components and physical components. Thus, detecting and quantifying information flow in these systems is more difficult than it is in purely cyber systems. In CPSs, failures...
Online medicine sale is an important form of pharmaceutical enterprises in developing e-commerce. As the particularity of the medicine compared to other products, how the customer judge the quality of the medicine sold by online pharmacies have received special attentions. The paper analyzes the process of transactions between online pharmacies and customers using the method of signaling game and...
It is an important factor for the honeypot decoy system to accurately analyze on intrusion information and precisely locate them. As there are some conflict and cooperation relationship among the collected data by honeypot system, it needs to fuse the honey information so that normal decision can be made for intrusions. The paper regarded the fusion process of honeypot information as game process...
As the quantum channel being susceptible to be interfered by noise, the reconciliation in a quantum communication is so important. Though its security is high, the efficiency of protocol binary is low because it needs to repeat the algorithm many times for the even-digit mistakes not being able to be founded. This article will focus on an improvement of protocol binary with the Message-digest Algorithm...
This paper presents a new method which ensures the validity and availability of the essential services in SCADA systems using the real-time monitor and the simulation monitor. The real-time monitor is responsible for monitoring the states and critical control commands of systems, estimating whether there are faults and risk in systems based on security rules. The simulation monitor is responsible...
A method is proposed for enhancing SCADA systems survivability using exogenous isomorphic real-time monitor and simulation monitor. The formal definition of monitors is given. The fundamental principles of attack resistance, malicious operation detection and fault prediction are introduced, which are accomplished by using cooperation between the real-time monitor and simulation monitor. The real-time...
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, signed integer exponential-Golomb coded (SE) encryption algorithm and context-adaptive variable length coding (CAVLC) encryption algorithm are proposed during the process of the entropy coding. In order to maintain the format compliance, the signs of motion vector...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.