The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, power analysis attacks have caused increasingly serious security threats on cryptographicalgorithm, to solve this problem different researcher has put forward many solutions, and among them the fixed value masking technology is one of the mostly used due to its lower cost and faster speed. Both theoretical and practical results have shown that the masking method has a good resistance...
Integer overflow vulnerability is very difficult to locate and patch. From experience speaking the more complicate the integer operation the more error-prone the program. So in this paper, we come up with a new method to leverage static integer operation attributes to predict integer overflows based on machine learning technique. The static integer operation attributes consist of sink, integer operation...
Due to resolving the key escrow problem and public key authentication problem, certificateless public key cryptography has drawn many attentions from numerous scholars and experts in recent years and becomes a hotspot for cryptography research. Most recently, the scholars of He and Du proposed a forward secure certificateless proxy blind signature scheme. Through the security analysis on the forward...
With the development of information technology, data become an important part of people's life and work. However, data may become lost over time from mobile devices. Thus, data recovery is a necessary way to acquire data, especially missing data. In this paper, we propose a method to recover data from YAFFS2 through analyzing the recoverability of missing data. We will also present some results from...
As the rapid development of social media, now massive data are produced every day. We need to know about users' view and comment on a hot event so that the government and relevant departments can control and guide public opinion, and people can have a correct understanding of the event. So it is necessary to analyze these data. While it is difficult to dig out sufficient information from these data...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.