The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In information systems, data in an object may illegally flow into another object if transactions read and write the objects. A transaction illegally reads an object if data in objects which the transaction is not allowed to read are stored in the object. In addition, it is specified data in which object is allowed to flow to other objects. A suspicious object is an object which is not allowed to flow...
To transmit secure message, a controlled quantum secure direct communication protocol is proposed based on five-particle cluster state and EPR pair entanglement swapping. The sender and the controller own their EPR pair sequences respectively. The sender sends one photon of the EPR pair he owns to controller. The controller performs local unitary operation randomly on one photon of the EPR pair he...
A group of wireless devices with the ability to sense physical events (sensors) or to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In WSANs, sensors gather information about the physical events, while actors perform appropriate actions upon the environment, based on the sensed data shared by sensors. In order to provide effective sensing...
Rechargeable sensor networks have been studied as candidates for next-generation wireless sensor networks. However, rechargeable sensor nodes cannot always communicate with other nodes, because they typically do not receive a stable supply of power. To cope with this problem, we propose a dynamic synchronization protocol that allows the synchronization of transmission and reception in rechargeable...
Smart grids use intelligent transmission and distribution network to delivery electricity. This approach aims to improve the electric system's reliability, security, and efficiency through two-way communication of consumption data and dynamic optimization of electric-system operations, maintenance, and planning. The smart grid, in fact, incorporates many resources, applications and enabling technologies...
In distributed systems, a group of multiple processes are cooperating with each other by exchanging messages in networks. A process is considered to be a sequence of events in a finite state machine model. Here, it is significant to decide on which event causally precedes another event for a pair of events in a system. In the famous happened-before relation among events, events are ordered on the...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
In distributed applications, a group of multiple process are cooperating with each other by exchanging messages in underlying networks. A message sent by each process has to be delivered to every process in a group. In this paper, we discuss a protocol for reliably, efficiently transmitting messages to every operational process in a group. We assume that each process can send messages to only neighboring...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
The remote desktop environment is attracting interest as a way to strengthen security and support mobile access or telework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the users' operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity of remote desktop environments makes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.