The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Annual reports of Chinese securities companies have become the most significant and reliable source of information for domestic and foreign investors. Semantic annotation of them enhanced information retrieval and improved interoperability. In this paper we first review the major features of annual reports which are tagged PDF format, then propose a novel ontology-based NLP approach to semantic annotate...
For a graph G with perfectly reliable edges and unreliable vertices, we consider the reliability of G for which vertices fail independently of each other with a constant probability p. The reliability of graph G, denoted by Pn(G, p), is defined to be the probability that the induced subgraphs of surviving vertices connected. In this paper, our main goal is to investigate the reliability polynomials...
We put forward the concepts of universal authentication, restrictive authentication and designated authentication. We then revisit a popular signcryption scheme using a technique similar to the one developed in Schnorr's signature, allowing it respects the restrictive authentication property. Comparing with the modification suggested by Baek et al in 2007, which uses a zero-knowledge proof run between...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
This paper studies mobile devices mediated electronic voting system based on the distributed Pailler's encryptions; We apply the standard cut-of-the-choose technique to avoid the computational zero-knowledge proofs and show that the proposed scheme is efficient yet somewhat provably secure in the simulation-based paradigm.
In this paper, we propose a novel intrusion detection (ID) method, distributed court system (DCS), that is applied on OLSR (optimized link state routing) protocol in mobile ad hoc networks (MANETs), to solve link spoofing in topology control (TC) messages. This system performs similar functions as a court in real-life. Network is organized into one-hop clusters, in which each node performs local monitoring,...
Strict Integrity Policy (SIP) of Biba model can maintain the integrity of data in computer systems, but it might deny some non-malicious access requests of subjects and hence decreases the compatibility of applications. An improved SIP with dynamic characteristics is presented, which can increase the compatibility of the software while keeping the integrity as well as SIP can. And the proof is also...
Java applets run on a JVM that check code's integrity and correctness before execution using a module called bytecode verifier. Large memory space requirements of the verification process blocks implementation of a bytecode verifier embedded in the Java smart card. To address this feasibility problem, the paper desinged a new verification algorithm that optimizes the use of Java smart card's memory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.