The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is used for the messages from private vehicles and identity-based signature for public vehicles and RSU, further more, it employs batch message-processing...
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that unobtrusively support to contextual data collecting, information sharing and security privacy controlling. In this paper, we motivate a human-centric design for such an infrastructure to support context-aware applications. A novel peer to peer based semantic...
The ocular artifact correction based on Linear Combination and Regression method is widely used in electroencephalographic (EEG) processing. Its main idea is to subtract a fraction of the recorded electro oculography (EOG) from the EEG signal to remove the overlapped EOG noise from EEG. But traditional regression method ignored the EEG signals mixed in the recorded EOG, and thus the overcorrection...
This paper first introduces the characteristic set of tripartite key agreement protocols. Then the relationship between the characteristic set and the security of a tripartite key agreement protocol is discussed. Because all present tripartite key agreement protocols are insecure, new protocols based on digital certification are proposed. The security and efficiency of the new protocols are discussed.
Traditional temporal logic regards protocols as close system to analyze. In order to overcome the shortcoming of traditional temporal logic, an game-based analysis method is inducted. This method is applied to formal analyze a fair contract signing protocol, and then some defects of the protocol are found. An improvement protocol is proposed which fixes the flaw by adding some extra time limit information...
With the existing Cognitive Radio Networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusion and spectrum allocation by classifying users and spectrum bands reasonably. The analysis shows that the sub-spectrum sensing scheme can save energy and defense SSDF attacks effectively.
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
With the increasing number of aircraft, the airlines and civil aviation organization are relying on ACARS (Aircraft Communications Addressing and Report System) for air traffic and control. Unfortunately, automated information exchange between aircraft and ground entity also increase the system vulnerability and may severely impacts the safety of a flight. This paper introduce a End-to-End architecture...
Electronic payment systems are increasingly in need of improvement as they constitute the base for electronic commerce which is rapidly dominating much trade and particularly retail. One such system that allows payments of low value is known as micro payment system the main requirement for which is naturally `low cost of transaction'. Pay word is a micro payment system which uses hash chains and achieves...
Mobile platform is the foundation to protect the security of mobile application. How to design and implement the trusted and effective mobile platform is the problem need to be resolved. On the basis of comprehensive study of trusted computing technology and the threats to 3G network, the architecture of trusted mobile platform based on mobile trusted module is proposed, and. a predicate logic based...
In this paper we apply Machine Learning (ML) techniques on static features that are extracted from Android's application files for the classification of the files. Features are extracted from Android's Java byte-code (i.e.,.dex files) and other file types such as XML-files. Our evaluation focused on classifying two types of Android applications: tools and games. Successful differentiation between...
The security concerns in 3G network, especially the core network, is far from being satisfied. As the most important protocol in the 3G core network, GPRS Tunnel Protocol (GTP) is quite vulnerable to attacks in the flat, full IP environment. Solving such a problem properly is very urgent and important for the operation of 3G network. In this paper, we discus the security issues in GTP, and propose...
Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information...
The scattering number of a noncomplete connected graph G is defined by s(G) = max{ω(G - X) |X| : X ⊂ V(G), ω(G -X) ≥ 2}, where ω(G - X) denotes the number of components of G - X. This parameter can be used to measure the vulnerability of networks. If an interconnection network is modelled as a graph, then the scattering number shows not only the difficulty to break down the network but also the damage...
In this paper, our main goal is to investigate chromaticity of the general multipartite graphs. A method to find chromatically unique multipartite graphs is obtained. By the method, we give some chromatically unique multipartite graphs.
Formal methods are effective in improving the safety and reliability during the development of software. PVS (Prototype Verification System) provides an integrated environment for development and analysis of formal specifications. It consists of a higher order logical specification language integrated with support tools and a powerful theorem prover. In this paper, we specify and verify the design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.