Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
When implementing data encryption and decryption in a symmetric cryptosystem, secure distribution of the secret key to legitimate nodes can be a challenge. In this paper, we consider establishing secret keys using the common wireless channel, with particular emphasis on the spatial and temporal correlations of the channel coefficients. Specifically, we investigate the influence of channel correlation...
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
In this paper, the value-relevance of the Chinese stock market investment and accounting information is studied from three aspects of the stock price, stock value and stock risk. It is found that, in terms of the value-relevance of the Chinese stock market and accounting information, the accounting information released by listed companies did pass information to the stock market in China, making the...
Recent security methods propose to generate secret keys from Ultra Wide Band (UWB) channels. These solutions rely on the reciprocity and spatial channel correlation principles. This work aims at presenting empirical studies on the aforesaid properties. First, we verify the UWB reciprocity for different multipath scenarios. In these experiences, the reciprocity is always valid independently of distance...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace...
In order to reveal the incentive functions of enterprise informationization (EI) construction during the process of knowledge transformation, the structure equation modeling (SEM) is used in this paper. By model deduction, research design and model verification, the SEM can effectively reveal the correlation between informationization construction and knowledge transformation in Chinese Enterprises...
Over the years, the notion of transactions has become synonymous with providing fault-tolerance, reliability and robustness to database systems. The idea then is to extend the same transactional guarantees to new and evolving paradigms, such as Web services. To achieve this, we first need to adapt the transactional mechanisms to the distinguishing characteristics of Web services, mainly composability,...
This paper presents a model of intelligent content filtering model to resolve the current network security audit system in filtering the information deficiency. First of all, in accordance with the characteristics of network security audit system, as well as the advantages and disadvantages of content filtering methods commonly, this paper choose suitable filter method, and then, optimize the filter...
The problems related to security for network systems are relative to the design of network architectures, which is typically based on open standards. Monitoring tools based on pattern recognition or behavioral analysis is typically used to ensure network security. SNORT is one such tool which is based on pattern recognition. SNORT alerts system administrators whenever it receives packets of information...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.