The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decades went by since Mark Weiser published his influential work on how a computer of the 21st century would look like. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology market. While this technological evolution resulted in many benefits to our society, it has also posed, along the way, countless challenges that...
For all sound reasons, more and more organizations are deploying their databases to the cloud as a viable option as part of their nowadays system architecture. Since we cannot be sure that our database access would never be compromised, data encryptions of various forms and levels have become the utmost techniques used to prevent malicious parties, internal or external, from inspecting an organization's...
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that...
Proximity-based mobile social networks (PMSNs) are a novel type of social networks, where mobile users can choose potential friends in vicinity by comparing the similarity degree between their private attributes and make new connections through the WiFi/Bluetooth interfaces on their mobile devices. Since users' personal attributes usually contain some sensitive information, users may have increasing...
Proximity-based mobile social networks (PMSNs) are becoming increasingly popular in recent years with the explosive growth of mobile devices, where a user can find a best matching friend in vicinity through profile matching. However, the matching process calls for the publication of users' personal information, which conflicts with users' growing privacy concerns about revealing their profiles to...
Making new social interactions with other users in vicinity is a crucial service in Proximity-based Mobile Social Networks (PMSNs), where a user can find a best matching friend directly through the Bluetooth/WiFi interfaces built in her mobile device. In existing work for such services, users have to publish their interests to do the matching. However, it conflicts with users' growing privacy concerns...
This paper chose the WM-G-MR-09 chip, designed and implemented WiFi communication module, set up a real mobile network environment base on Windows CE operating system platforms and IEEE 802.11b wireless network interface. Achieved AODV (Ad-Hoc on-demand Distance Vector) routing algorithm module by calling the API in an adding routing function module. The validation and testing for the algorithm module...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
We propose an efficient quantum secret sharing scheme with orthogonal product states in the 3×3 Hilbert space. Different from Hsu and Li's scheme [Phys. Rev. A 71, 022321 (2005)], this scheme utilizes a novel distribution strategy which sends the qutrits of basis states and superpositions to two separated observers respectively. The theoretical analysis shows that the intrinsic efficiency for qutrits...
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID(Radio Frequency Identification), this paper proposed a new ticketing system based on C/S architecture and two-dimensional(2-D) barcode on mobile...
In this paper we investigate how bimolecular automatons encrypt information. Biomolecular automaton based on DNA computing is a kind of nano-computer. This DNA computing model is different from the original DNA computing for it can realize the basic functions of automaton. Having both advantages of DNA computing and electrical computing, biomolecular automaton can improve the practicability of DNA...
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305(2006)], proposed by Lee, Lim and Yang, recently were indicated to be insecure against the authenticator Trentpsilas attacks [Phys. Rev. A 75, 026301(2007)]. In this paper, two novel efficient protocols of quantum direct communication with authentication are presented by utilizing four kinds of Pauli operations...
OAEP is widely accepted because of its provable security and practicability. However, there was a twist in the security proof in the random oracle model. Shoup revealed a flaw in the original security proof by Bellare and Rogaway. In this paper, a revision of the security proof is presented to fix the flaw. Furthermore, compared with some existing improved prove methods, the revised proof is applicable...
As a new auto-identifying technique, RFID has been widely applied to supply-chain and retailing. However the specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers , the traditional methods become helpless. Here we present and analyze an improved hash key technique based on multiple readers.
Association rules mining is one of the most important and fundamental problems in data mining. Recently, in need of security, more and more people are studying privacy- preserving association rules mining in distributed database. This paper addresses a secure mining algorithm of association rules, which builds a globe hash table to prune item-sets and incorporate cryptographic techniques to minimize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.