Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In information systems, data in an object may illegally flow into another object if transactions read and write the objects. A transaction illegally reads an object if data in objects which the transaction is not allowed to read are stored in the object. In addition, it is specified data in which object is allowed to flow to other objects. A suspicious object is an object which is not allowed to flow...
To transmit secure message, a controlled quantum secure direct communication protocol is proposed based on five-particle cluster state and EPR pair entanglement swapping. The sender and the controller own their EPR pair sequences respectively. The sender sends one photon of the EPR pair he owns to controller. The controller performs local unitary operation randomly on one photon of the EPR pair he...
A group of wireless devices with the ability to sense physical events (sensors) or to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In WSANs, sensors gather information about the physical events, while actors perform appropriate actions upon the environment, based on the sensed data shared by sensors. In order to provide effective sensing...
Rechargeable sensor networks have been studied as candidates for next-generation wireless sensor networks. However, rechargeable sensor nodes cannot always communicate with other nodes, because they typically do not receive a stable supply of power. To cope with this problem, we propose a dynamic synchronization protocol that allows the synchronization of transmission and reception in rechargeable...
Smart grids use intelligent transmission and distribution network to delivery electricity. This approach aims to improve the electric system's reliability, security, and efficiency through two-way communication of consumption data and dynamic optimization of electric-system operations, maintenance, and planning. The smart grid, in fact, incorporates many resources, applications and enabling technologies...
In distributed systems, a group of multiple processes are cooperating with each other by exchanging messages in networks. A process is considered to be a sequence of events in a finite state machine model. Here, it is significant to decide on which event causally precedes another event for a pair of events in a system. In the famous happened-before relation among events, events are ordered on the...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
In distributed applications, a group of multiple process are cooperating with each other by exchanging messages in underlying networks. A message sent by each process has to be delivered to every process in a group. In this paper, we discuss a protocol for reliably, efficiently transmitting messages to every operational process in a group. We assume that each process can send messages to only neighboring...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
The remote desktop environment is attracting interest as a way to strengthen security and support mobile access or telework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the users' operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity of remote desktop environments makes...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.