The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud&client computing uses both cloud resources and user-terminal resources, resulting in more efficiency then traditional cloud computing. But when implemented with Mobile agent technology, the mobile agents which moved to user terminal nodes are faced with single point attacks or co-attacks. We propose a safe and efficient task allocation algorithm, which not only ensures the subtasks'...
High security level network is always physically isolated from other networks, but also has difficulty in information transmission. Net Gap keeps different networks cut, and transmitted information from high security network to low. It uses QR code to carry data, and keeps information transfer unilaterally. MD5 algorithm is used in digital signature and RSA arithmetic is used encoding and decoding...
This paper proposes a new public key signature scheme based on multivariate quadratic polynomials over a finite field with odd prime characteristic. This signature scheme has a very simple internal transformation, allowing for efficient signature generation and verification. The security of the scheme is analyzed in detail. The result indicates that the new signature scheme can withstand all known...
In this paper a new non-interaction mobile agent detecting protocol is proposed by combining with onion itinerary technology and identity-based. Lastly the security performance of the new protocol is analyzed.
Key derivation function (KDF) is used to generate security key in LTE network. For MD5 and SHA1 algorithms in LTE networks shortage, this paper presented an approach KDF based on HMAC-SHA-256(Hashed Message Authentication Code, Secure Hash Algorithm) algorithm. HMAC_SHA is a secure cryptographic hash function-based message and shared key authentication protocols. It can effectively prevent data being...
LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties...
In order to realize the full rang of information security, a variety of network equipment, safe equipment have been applied to deal with all aspects of information security and protection by many enterprise. These devices, systems produce a lot of security event log in the network security protection, and these event log data format are different, and different safety equipment may generate the same...
Aggregated multicast is the main method to solve the problem of lacking labels in MPLS network. Achieving the aggregation of multicast tree must have an effective multicast group-tree matching algorithm. Which problem of the group-tree matching algorithm solves is that the multicast group can match the multicast tree perfectly. We analyze the previous multicast group-tree matching algorithm, and summarize...
Harmful text information filtering is a typical pattern recognition problem of small sample, the prediction result of classifier was biased towards the class with more samples, because of the samples that including the harmful information were difficult to gain. Construct virtual samples is an effective means to solve the problem of pattern recognition in the small sample, using the up-sampling method...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.