The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By analyzing the information embedding and retrieving process, we combine the encrypting algorithm with chaotic mapping using the logistic mapping and system time random factor generator to realize the encryption of dynamic key to resolve the algorithm security and key sensitive problem. By modifying the digital image color or bit plane of color component and adjusting the sensitive-less important...
Urban Computing (UrC) which process based on interactive among all objects involves all elements of users/space as computing target. That is, UrC can support better conditions than ubiquitous computing by using user/space information. However, user can't to be safe using without security processing in any computing environment. Although there are many security skills, there are difficult to adapt...
The paper analyzes the security of IEEE 802.11. Based on the discussion of IEEE 802.11 security requirement, the three security technologies-SSID (Service Set Identifier), MAC(Media Access Control), WEP(Wired Equivalent Privacy) in WLAN standard IEEE802.11 are introduced, especially the encrypting algorithm and the integrity check algorithm in WEP. The security flaws caused by RC4 algorithm, key management,...
An encrypting algorithm based on RBF neural network is presented. The clear-text is regarded as RBF target vector. RBF network is trained with random input vector, and the trained results are regarded as the cryptograph. With the feature that the input vector of RBF neural network can be any random value, there are the infinite kinds of ways to build the input vector, so the cryptograph cannot be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.