The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 1979, secret sharing scheme was first proposed by Shamir. In a secret sharing scheme, each participant receives a secret share in such a way that only authorized subsets can reconstruct the secret. Compare with Shamir's scheme, Juan and Huang proposed an efficient secret sharing scheme from room square in 2005. Their scheme gave a practical algorithm to reduce the computation complexity by using...
The authentication key agreement scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these...
Summary form only given. These years the cooperation between industrial companies and universities are under significant changes. The dialogues have been held regularly to increase understanding and discuss the cooperation framework. The large number of students from software institutes in China has done 10 month - 1 year internship programs in companies. These programs intensify the cooperation....
This paper describes an easy adapted method of improving test coverage and effectiveness in an on-going industrial project by introducing and applying 'test type' into test case design and execution. It presents comparison results of the number of system test item, effectiveness of test cases, and defect detection percentage between two increments in a real-world telecom project. It argues the importance...
Nowadays, technologies are providing the mobile terminals with much more powerful computational abilities. Such improvement made it possible to run many complex applications on mobile devices. However, many of these new applications are also resources demanding. Lacking sufficient resources would cause performance failures and impact negatively on the users' quality of experience. In order to improve...
Java Cards are embedded systems, very often implemented as smart cards. They are used in banking, e-government, telecommunication, and ticketing. Due to these use cases they have to provide a wide range of security mechanisms and a high performance in relation to the available hardware cost. One of these security features is the transaction mechanism. It ensures that data in persistent memory stays...
Preparation of test data that adequately tests a given piece of code is very expensive and effort intensive. This paper presents a tool AutoGen that reduces this cost and effort by automatically generating test data for C code. AutoGen takes the C code and a criterion such as statement coverage, decision coverage, or Modified Condition/Decision Coverage (MCDC) and generates non-redundant test data...
This paper presents a complete framework for Verilog-based fault injection and evaluation. In contrast to existing approaches, the proposed solution is the first one based on the Verilog programming interface (VPI). Due to standardization of the VPI, the framework is-in contrast to simulator command based techniques-independent from the used simulator. Additionally, it does not require recompilation...
An AMF configuration is a logical organization of resources, components and service units (SUs) grouped into service groups (SGs), for providing and protecting services defined as service instances (SIs). The assignment of SIs to SUs is a runtime operation performed by the availability management framework (AMF) implementation. However, ensuring the capability of the provisioning and the protection...
Dynamic testing is still the most used quality assurance technique in the automotive industry. There is a need to automate the testing process as much as possible. In this work we focus on the automatic generation of test cases from requirement specifications. To embed the approach as close as possible into existing workflows we start with natural language like specifications, as requirements are...
To find out the critical phase in the software environment that may be responsible for more defects than other phases involves the selection of a suitable decision making method for realizing the goal. Among analytical hierarchy process (AHP), fuzzy AHP and analytical network process (ANP), the latter is regarded as a viable alternative, which yields a holistic framework in the selection of the most...
In this paper, we focus on the matching of parameter type and order for integration testing. From the unit testing, we can obtain two outputs: 1)Interface net that describes ports to receive parameters and to send parameters; 2)Mapping table that describes the mappings between parameters coming in and parameters going out. To analyze the interface net and mappings precisely, we propose a forward slicing...
Web service composition is a distributed model to construct new Web service on top of existing primitive or other composite Web services. However, current service technologies, including proposed composition languages, do not address the reliability of Web service composition. Thus it is hard to predict the system reliability. In this paper, we propose a method to compute system reliability based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.