The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
In this paper we present and describe all theexperiments and results that are done on "Ambiguous Multi-Symmetric Cryptography" (AMSC). We compare AMSC tosymmetric and asymmetric conventional algorithms includingAES and RSA. We explain AMSC core methods in detailsalong with the experimental setup and execution. Furthermore, we design and implement a real time application as a proofof concept...
Most digital content nowadays is protected by a digital rights management (DRM) framework to prevent piracy. Since much content is distributed throughout the world, modern DRM frameworks must protect the confidentiality and integrity of the data, even from rootkits or physical tampering. Secure processors have been proposed to ensure secure executions by performing memory encryption and integrity...
The paper presents MorphicLib, a new partial homomorphic cryptography library written in Java that can be used to implement a wide-range of applications. The paper shows the use of the library with the HomomorphicSpace coordination service. This service is a tuple space that stores encrypted tuples but still supports operations like returning tuples with values within a certain range.
We analyze the distribution situation of chain supermarket, point out the existing problems in the process of distribution operation, expound the necessity and urgency of distribution route optimization. The basic ant colony algorithm is improved, and the improved ant colony algorithm is used to solve the established model of chain supermarket distribution route. The original distribution scheme is...
In this paper, we focus on multi -- scale modeling and simulation of piezo electric composite materials, Piezo electricity is the ability of some materials to generate an electric field or electric potential in response to applied mechanical stress.And it isreversible in piezoelectric materials.This property can be reflected in the constitutive relations as coupling of mechanical field and electrical...
It puts forward the design principle and goal of university administrative management system and elaborates on the design of function modules of its major subsystems. We mainly study the functional design of three major modules, user authentication module, announcement management module and official document management module. On the basis of analyzing various data mining model and algorithm, data...
For the collaborative development status between E-commerce and express logistics, this article starts from respective development to analyze the most intuitive non-cooperation during cooperative development between current e-commerce and supply chain of express logistics and to perform relevant causes analysis. According to the idea of interest collaboration management, such as the problems in collaborative...
For ecological environment problem in city development, we analyze current situation and problems of urban ecological environment, based on the research of relevant literature at home and abroad, and field research. The theory of sustainable development and ecological economics are introduced, to select 28 single indicators and to establish an evaluation indicator system of ecological environment...
Most of the existing various kinds of clustering algorithms, it is only in the process of clustering by specific routing clustering algorithm select appropriate cluster head to reduce the energy consumption of the whole sensor network, does not take into account numerous due to high density network node in the network, there is a large number of redundant nodes in the cluster. Combined energy consumption...
The system model is built according to the Analytic Hierarchy Process. The evaluation tables filled by students and non-students are converted into a comparison matrix, where the weight of every evaluation item is calculated, according to the AHP respectively. After the consistency of these weights is checked, the weight of every item in the criteria hierarchy is worked out. Then the score of evaluated...
This article establishes a translation model from source language dependency treelet to target language string. This model performs syntactic analysis on source language terminal so it belongs to tree-to-string model. In phrase of training, source language sentence is performed dependency relationship analysis to obtain source language dependency tree. Then, according to bilingual alignment information,...
As a basic function unit of digital signal processing, digital filter design is the main subject of research in the field of digital signal processing, it is widely used in the field of communication, radar and so on. The traditional design method is difficult to satisfied high performance requirements of digital filter. A kind of simplified artificial fish swarm algorithm is introduced into optimize...
Pairing-based cryptography have begun to draw attention ever since the work of Boneh and Franklin in 2001 proposing the first identity-based encryption scheme using bilinear pairings. In 2010, Tan et al. developed a pairing library that has running times that is as competitive as Pairing-Based Crypto (PBC) library. However, since Tan et al's pairing library was written in Java, it was not known to...
In traditional public key encryption schemes, data encrypted by a public key pk can be decrypted only by a secret key sk corresponding to pk, and their relation between pk and sk is static.Therefore, the schemes are unsuited for control of access to several data.Meanwhile, functional encryption (FE) is an encryption scheme that provides more sophisticated and flexible relations between pk and sk.Thus,...
Over the past decade, the Web has been transformed from a collection of static HTML pages to a complex, distributed computing platform, as evidenced of the success are sites such as Facebook and YouTube. This transformation has been enabled primarily by the continuous development of Web applications. Inevitably-due to the Internet architecture-Web applications must rely on the servers so as to process...
Contemporary cloud computing solutions incorporate HTTP intermediaries, such as reverse proxies, load balancers, and intrusion prevention systems. These act as TLS server connection ends and access HTTP/TLS plaintext to carry out their functions. This raises many concerns: increased security efforts, the risk of losing confidentiality and integrity, and potentially unauthorized data access. Current...
In this paper, we propose a web solution that generates secure documents using XML security technology and tokens through a component-based approach. Tokens consist of user identity certificates and keys associated with the certificates. Tokens can either be in software or hardware. To provide such middleware, we gather a list of applicable components related to XML security, review its trends and...
In this paper, we proposed a novel approach, called LDS-IVD, to model the entity interaction vulnerabilities in Large Distributed System (LDS) which results from the absence of necessary security mechanisms. LDS-IVD constructs a general interaction security mechanism description language, named with IS-LAN. By analyzing the key resources in LDS with the finite state machine, IS-LAN provides the capability...
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.