The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In PKC 2014, Langlois et al. proposed the first lattice-based group signature scheme with the verifier-local revocability. The security of their scheme is selfless anonymity, which is weaker than the security model defined by Bellare, Micciancio and Warinschi (EUROCRYPT 2003). By using the technique in the group signature scheme proposed by Ling et al. (PKC 2015), we propose a group signature scheme...
One-way hash chains have been used to secure many applications over the last three decades. To overcome the fixed length limitation of first generation designs, so-called infinite length hash chains have been introduced. Such designs typically employ methods of asynchronous cryptography or hash based message authentication codes. However, none of the proposed schemes offers perfect forward secrecy,...
Numerous security incidents caused by malwaresand hackers have recently utilized anti-forensic techniquesto bypass analysis and detection. It is critical to build aknowledge base that would help understand such anti-forensictechniques. In this paper, we present a forensic analysis methodto detect an anti-forensic technique which leverages timestampmanipulation in NTFS file system. Our approach analyzeshow...
For security of digital images, an emerging technique is the use of mosaics of an image to construct an entirely different image. This is done by modifying the colour properties of a secret image in accordance with some reference image, i.e., transferring colour between mosaics of images. These mosaics are placed together to give an image that is similar to the reference image. This method is significant...
Electrical transmission grids are planned to be in compliance with redundancy specifications, such as the deterministic (N-1) criterion. Due to increasing power transmission, the grid components experience a higher utilization rate. One essential issue of transmission grid planning is the necessity of the grid enforcement and the dimensioning of its components. Considering a similar level of grid...
The purpose of this study is to investigate factors influencing the satisfaction of e- tax filing website of Small and Medium Enterprises (SMEs) in Bangkok and the vicinity in Thailand. In this study, the researcher uses quantitative approach methodology which adopts Structural Equation Modeling (SEM). The researcher identifies four dimensions which consist of information quality, system quality in...
This paper selected at random 212 Chinese manufacturing companies at the Shenzhen Stock Exchange in 2013 as the research objective in order to study the current situation of the voluntary disclosure. This paper found and summarized the problems of small number, low quality, and accuracy, lack of fixed and standardized forms in the process of the disclosure. Finally based on the study, this paper further...
This paper proposes probabilistic Power System Health Index(PSHI) newly. The paper describes several kind of power system health indices based on two main categories, which are adequacy and security. In adequacy, four kinds of health indices of Frequency, Voltage(154kV, 345kV, and 765kV), Reserve(Operating Reserve Power and Frequency Regulation Reserve Power) and Overload of lines and transformers...
This study is aimed at determining the future share net inflows and outflows by using the characteristics of Exchange Traded Funds (ETF) as variables in a data mining based analytic methodology. The relationship between net flows is closely related to investor perception of the future and past performance of mutual funds. In order to explore the relationship between investor's perception of ETFs and...
In order to solve the prominent problems such as slowness, subjectivity and inclination of human factors in competitive procurement method selection for general equipment maintenance materials, based on five key indexes including confidentiality, security, number of qualified suppliers, fund saving rate and project time limit, this paper presented a new quantitative model for procurement method selection...
With the intensification of human activities and unreasonable development and utilization of land resources, there have been a series ecological problems of land resources in Hubei Province. Based on the Press-State-Response conceptual framework model, this paper developed to build the ecological security assessment index system of the land resource which was regional characteristics, by the use of...
The availability of real-world network traces is a fundamental requirement for networking research. Indeed, real network traces can help to effectively model the network behavior, to identify security attacks, and to validate research results. Unfortunately, network flows are extremely sensitive information; as a consequence, security and privacy concerns discourage the publication of such datasets.
Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.
In this study we analyze behavior of two types of coefficients for determining the suitable number of clusters obtained when fuzzy cluster analysis is applied. First one is Dunn's coefficient which contains membership degrees in its computational formula; second one is the average silhouette width, used primarily for evaluating hard clustering. There have already been attempts to compare different...
Nowadays XBRL plays a more and more important role in daily operation for listed companies. However, there are many different aspects in disclosure regulations between China and America, which may impose a limitation on the pervasive application in China. From the comparative study, this paper intends to summarize the deficiency in XBRL disclosures of China and to provide some niche-targeting advice.
Quality evaluation of e-Learning applications is the area of interest to everyone involved in exploring the value addition of adopting this technology in education. Stakeholders' perception about quality of the e-Learning application environment and authenticity of product quality is a major concern which needs to be addressed. A formal quality assessment framework for e-Learning application environment...
In order to more effectively assess the safety risk of a wind farm project, the evaluation indicators in the life cycle of a project can be divided into quality index, cost index, time index, security index, and sustainable development index. By combining the qualitative with quantitative, the model of principal component analysis (PCA) of the life cycle indicators was established, which can reflect...
Gross National Happiness (GNH) is an index which reflects the quality and satisfaction capacity of the life. Firstly, this paper introduced the concept of GNH. After that, an especial GNH evaluation index system was constructed based on the need-hierarchy theory of Abraham Maslow. And then, we calculated the GNH of China from 2003 to 2007 by TOPSIS and evaluated the GNH comprehensively. In the end...
The paper based on E-Commerce Websites to analyze its operation via operating circumstances, marketing achievements, consuming behaviors, valuing standards, the consumer's gratification and ECW operation, to present evaluating approaches so as to solve the problems from E-Commerce Websites enterprises and perfect E-Commerce Websites operating effects.
Based on the surveys for moral status of China's network marketing, to analyze the moral failure and the causes of network marketing to try to build moral system and evaluation model of network marketing in the harmonious society. And on this basis, establish normative measures for network marketing moral.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.