Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Online social media has become one of the most important ways people communicate, while how to find valuable information from huge amounts of data becomes a key problem. We present a novel topic extraction method that employs topic value of each words and social model attributes as additional features based on the multi-document summarization. The experimental results show that the multi-document...
In Journal of Systems Engineering and Electronics, Maet al. proposed a broadcast group-oriented encryption secure against chosen cipher text attack scheme, later they proposed several other chosen cipher text secure group-oriented encryption schemes, based on this scheme, they also proposed a group-based proxy re-encryption scheme secure against chosen cipher text attack. However, in this paper we...
As the communication capabilities are implemented in ever smaller devices with less and less computational capabilities and limited energy source, there is a need for lightweight cryptographic solutions. In this paper we describe lightweight solution for probabilistic authentication of computationally restricted devices. The solution relies on 4-bit lightweight hash, generated with help of substitution...
Nowadays, the exploding number of functionally similar Web services has led to a new challenge of selecting the most relevant services using quality of service (QoS) aspects. Traditionally, the relevance of a service is determined by computing an overall score that aggregates individual QoS values. Users are required to assign weights to QoS attributes. This is a rather demanding task and an imprecise...
This paper introduces the permanent security notation. And then by combining the computational security of the classical cryptography and the theoretical security of the one-time-pad quantum cryptography, this paper provides a permanent secure QKD protocol. The protocol authenticates the both parties for two times and could get a quantum state effective rate at 100% in an ideal environment. In addition,...
PRINT cipher is a lightweight block ciphers dedicated to integrated circuit (IC) printing, proposed by Lars Knudsen et al. at CHES 2010. Interestingly, PRINT cipher discards the key schedule part and keeps all its round keys identical. This unconventional design guarantees its modest space requirement. In this paper, however, we will show how to make use of its identical round key to mount a terrifically...
We introduce a model for secure managing virtual infrastructure in IaaS Cloud which called Trusted Private Virtual Data center (TVPDc). It can offer centralized management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. Additionally, we propose a hierarchical management framework and a TVPDc establishment and deployment protocol...
Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is an important class of ABE, where cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which...
Traditional VaR method has many defects in measuring portfolio risk, this paper modifies BDSS model and gets revised BDSS model -- La-VaR model based on relative price. For fitting the sequences of the rate of return and relative price, this paper adopts Gaussian-kernel function with good smoothness and Copula-kernel model to portray marginal distribution and correlation structure. Afterwards sequence...
In this paper, a novel biometric authentication scheme is proposed, which combines zero-knowledge proof, - protocols and bit commitment scheme. The remote server compares biometric template using committed values, this can keep privacy of user's biometrics. To the best knowledge of us, this is the first scheme which uses - protocols as a basic tool to implement biometric authentication. Compared with...
Network attacks and defense, as a core lesson in the field of the information security, introduce a kind of educational method called situational teaching which separate attacking roles as well as defending ones apart dividing this course into 12 subjects: scanning, network sniffing, password cracker, spoofing attacks, DOS (Denial of Services), buffer overflows, Web attacks, SQL (Structured Query...
Multiple Independent Levels of Security (MILS) is a high-assurance architecture which protects information sharing at different security levels. MILS ensures mutual independence and prevents the spread of the error effectively between partitions. However, in some specific applications, there exists enormous amount of information interaction and sharing between partitions, the process of which has...
Sharing information is one of the most important parts of social activities. However, sharing information can leak users' information. Removing all direct identifiers is not enough. Sweeney proposed an approach that applying k-anonymity to protect users' identities from linking attack. Sweeney`s algorithm finds out the optimal anonymized dataset through minimal distortion metric. Other authors proposed...
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport etc.) on a single device. However, despite the initial fervour for the multi-application smart card initiative, there were no wide spread adoption of this...
Along with the development of the Internet, university network system has a lot of potential safety problems. Information security level protection system has been included in the state council of the People's Republic of China concerning the strengthening information security work among the opinion ". In information system adopt to enforce the protection of classification of development idea...
In this paper, we present a two-party key agreement protocol, which is secure in standard model. By using the Goldreich-Levin hardcore predicate, we reduce the security of our scheme to Computational Bilinear Diffie-Hellman assumption, and a proof is given. Furthermore, with the consistency of messages exchanged publicly verifiable, our scheme achieves most of the known security attributes.
Trusted chain technology provides a good opportunity to guarantee software and data integrities on cloud computing platforms. However, trusted chain on current virtualization computing platforms expose some problems, such as non-continuous, difficult to evolve or customize, insecure to transmit for remote attestation. To address these issues, this paper proposes a new approach to construct, protect...
Due to the limitation of energy, the router protocol of wireless sensor network (WSN) must minimize energy consumption to extend the network lifetime. By analyzing the hierarchical routing low energy adaptive clustering hierarchy (LEACH) in WSN, a protocol is proposed to improve of setting up cluster and data transmission route. A timer is introduced to make sure of electing the optimal sensor node...
We consider the eigenvalue problem of a class of non-compact linear operators given as the sum of a multiplication and a integral operators. A product integration method is used to approximation based on numerical integration of the weakly singular kernel integral operator. It is shown that entries of the corresponding matrix of this method can be evaluated exactly. The convergence of the method is...
In this paper, improved Logistic models are given, which are called Logarithm Logistic Models. Based on U.S. Census data, the parameters of the models were estimated by applying the Least Squares Method. The experiments show that the prediction value of the new models is much closer to the actual value than the classical Logistic model. Finally, through analyzing the rationality of the maximum population...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.