The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addressed the insecurity and the inefficiency of privacy preserving association rule mining in vertically partitioned data. We presented a privacy preserving maximal frequent itemsets mining algorithm in vertically partitioned data. The algorithm adopted a more secure vector dot protocol which used an inverse matrix to hide the original input vector, and without any site revealing privacy...
Certified e-mail protocol is a fair exchange of a message for a receipt between two potentially mistrusting parties over the network. A number of certified e-mail protocols have been studied in recent years. However, most of those protocols employ certificate-based cryptography and full trusted third party, which may not be suitable for wireless networks with limited resources such as power, computation...
The BSP network parameters are usually measured by one-sided communication functions in BSPlib standard, which can't reflect the communication performance of the message passing parallel machines effectively. Furthermore, the one-sided operation is becoming more and more popular with high-performance communication as the release of MPI-2 version. This paper further investigates the implementation...
With the development of computer science, desktop virtualization technology is more and more popular. In virtualized desktop, it is a very significant research to share periphery devices in the client-end computer seamlessly. We implement a device sharing mechanism to extend the universal serial bus in client-end host to the network for server-end host using transparently. This virtual device bus...
Running multi-OS on a physical machine is the major method to improve the utilization of computer. With the widely use of virtualization technology in cloud computing, the efficiency of inter-domain communication becomes the key factor for performance of distributed applications especially for some network-intensive applications. The communication synchronous mechanism used by traditional VMM is based...
The biggest problem to be solved in grid computing is data transmission and communication efficiency and stability. For computing grid composed of small local area network(LAN), this problem can be solved by properly building LAN with the use of IPv4 network or high-speed computing network such as Infiniband. However, when the computing resources are distributed in different physical regions, data...
This essay proposes a new cross heterogeneous domain authentication model mainly based on PKI, and designs the details of authentication processes in different situations. The model achieves cross domain authentication between PKI domain and Kerberos domain effectively, and supports mutual authentications. Theoretical analysis shows that the proposed scheme has good compatibility, expansibility and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.