The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is becoming increasing difficult to implement an effective DDoS Defense System, because (1) the raising sophistication of DDoS attack requires more complex analysis to detect, (2) internet traffic grows bigger and bigger which needs more powerful system to monitor. Taking advantages of the great improvement in multi-core technology, a multi-core based DDoS detection system (MIFDDS) is proposed...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
Through introducing the development and current situation of remote meter reading system at home and abroad, the application of the GPRS wireless communication technology in remote meter reading system was illustrated. Aiming at the key section-network architecture, the network structure of data transmission based on GPRS, several access modes the data center server connecting to Internet, communication...
“Network Information System” has emerged as an important research field. Researchers in computer science have successfully developed some network technologies includes security solutions, information query protocols, and data management services. However, along with the development of wireless network technology, there is a need of solution for efficient information interaction re-scheduling in the...
The control function of configuration software is researched and developed based on the application of laboratory project in this paper. A program of the fuzzy control algorithm is designed and simulated. Then the designed fuzzy control algorithm is embedded to the InTouch of the configuration software by the DDE communication protocol. The results show that the dynamic data exchange between InTouch...
Networking is an important concept in the field of computing in the contemporary world. While networking equipment are readily available on the market, people in need of computer networks however often turn to other trained and qualified networking personnel to set up their required local area network. The fact that a network can physically and logically be represented and configured in different...
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce...
With the development of Internet, the efficient network management of heterogeneous network devices from different vendors becomes more and more difficult. The Network Configuration Protocol (NETCONF) is presented as a new solution. But it can't be widely used in current networks soon because most devices are based on Simple Network Management Protocol (SNMP) and Command Line Interface (CLI). Therefore...
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users...
An energy-aware data gathering protocol called EADGP that maximizes the network lifetime for wireless sensor networks is proposed in this paper. EADGP introduces a novel distributed hierarchical clustering method. In order to reduce energy consumption and realize load balance, a new cost metric and a metric-mapping function is presented during the cluster head selection phase. Unlike traditional energy-based...
Low-energy electron and diatomic molecule scattering mode are important issues in physics study. As the research object is becoming increasingly complex, the traditional sequential computing method is unable to meet the requirements of large-scale computation. Based on above-mentioned background, this article proposed a parallel computing method about static potential model in a multi-cluster environment...
This paper construes the structure of SNMP deeply, 000 provides a solution to rapid development based on Windows platform, puts forward a theoretical frame of SNMP program in VC 6.0 environment.
As the quantum cryptography is the ultimate solution for information security. Quantum cryptography describes the ultimate way for key distribution. Unlike many of the classical cryptosystems in use today, whose security often draws on unproven assumptions about the computational complexity of mathematical problems, the security of quantum cryptography is based on the laws of physics. The Quantum...
The traditional authentication for grid is based on PKI framework, using standard X.509 certificates. But with the growing scale of the grid, certificate management would become an encumbrance. However, certificateless-based signature scheme can overcome these problems for its certificate-free feature, and make authentication more efficient. In this paper, a certificateless-signature-based authenticated...
This paper designs and implements an automatic network system utilizing UPnP, wireless network and power line carrier technology. We connect home media device and home gateway device via wireless network to build media service subsystem, and connect home applications and home gateway via power line carrier network to make power control subsystem. Then we convert both subsystems into UPnP virtual devices,...
An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behaviour as specified in attack descriptions (referred to as signatures). Many studies report that IDSs have problems accurately identifying attacks. Therefore, it is important to precisely...
Time synchronization is extremely important for wireless sensor networks. Since the sensors have very limited energy resources and it is very difficult to change batteries for the sensor nodes, energy efficiency is one of primary importance for a sensor network. To prolong the lifetime of a sensor network, we proposed a cluster based on demand time synchronization in wireless sensor networks(COD)...
The paper presents a method that helps improving the automatic generation of medical computer-based protocols. The new methods act as a wrapper for the expert system allowing the access to different types of databases. This new concept integrates the HL7 CDA technology to transmit the data. The information that is transmitted from one module of the connector to another is structured concerning the...
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically changed during the verification which can...
As organizations become larger and larger, a worldwide enterprise may involve many regional branches, and also form partnerships with other organizations. Therefore it becomes necessary to implement authentication systems which are capable of working across multiple security domains or internet domains. We proposed an effective scheme which can implement virtual identity federation by establishing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.