The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wireless local area network commonly uses WEP (Wired Equivalent Privacy) encryption technology. Although it has encryption mechanism, but the WEP encryption mechanism has serious structural design deficiencies. In this article, we focus on the IEEE 802.11, hacker attack methods and WEP wireless networks to carry out instructions. Furthermore, the DoS / DDoS attacks also have become the most serious...
This paper presents a new image content protection method. In the image scrambling for encryption, the Arnold transform often used. But Arnold transform is given only one form and it is an open form, so reducing it security. In this paper, a species that contains a lot of transform sets is presented, we call it as FAN transform. Since the type of the FAN transformation is infinite, it will increase...
With the popularity of logistics commerce and the development of enterprise information management technology, the application of Managements Information System based on network becomes more and more extensive. On this open condition of logistics commerce, the need of security of management information system accordingly is higher than before. The paper firstly introduces the actuality and preventing...
Data encryption is an effective means of preventing the saetred of database during data storage and transmission. The idea of encryption is based on certain algorithm to transforme raw data (i.e. plain text) into a format that can not be directly identified (i.e. cipher text), thus the person who does not know the decryption algorithm can not obtain the data content.
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its validity.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.