Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials
Vols. 501-504
Vols. 501-504
Applied Mechanics and Materials Vols. 511-512
Paper Title Page
Abstract: Micro-payments are very small sums of money, typically used to pay for content access or for small quantities of network resources. However, the existing micro-payments have the following drawbacks: firstly, generated e-coins only connecting with one particular merchant; secondly, only one unit value or one kind of currency is provided; and thirdly, needs multiple hash chain. In this paper, we constructed an efficient micro-payment protocol based single hash chain. The user only generates a hash chain to do business with multiple merchants. Using the hash value of monetary value generated by the broker, the user can spend different monetary value by a hash chain.
1167
Abstract: This paper introduces the server design of a personal cloud sync storage system based on Android mobile terminal, including system architecture, workflow and module design. According to the application characteristics of personal cloud, this thesis selects Servlet as the core development technology of server-side system, describes the development process of the personal cloud server based on Tomcat container and establishes a secure connection between the mobile terminal and the personal cloud server center. Under the LAN environment, the server system has successfully completed the function module of the test and assembly verification test. Test results show that the whole system runs in good condition and has certain applicative value.
1172
Abstract: To overcome the defects of low efficiency of pattern matching in intrusion detection systems (IDS), an efficient pattern matching algorithm is proposed. The proposed algorithm first preprocesses pattern to record pattern information, then it recursive compares the nodes to find the most common part of pattern to improve efficiency. The proposed algorithm also appends auxiliary structure of m nodes in pattern to reduce time and space complexity. Theoretical analysis shows that for the subject with n nodes, the time complexity of the proposed algorithm is, and space complexity is . Detailed experimental results and comparisons with existed algorithms show that the proposed algorithm outperforms current state-of-the-art algorithms in terms of time efficiency, space efficiency and matching ratio.
1178
Abstract: Some undecidability on self-affine fractals have been supported. In this paper, we research on the decidability for self-similar fractal of Dubes type. In fact, we prove that the following problems are decidable to test if the Hausdorff dimension of a given Dubes self-similar set is equal to its similarity dimension, and to test if a given Dubes self-similar set satisfies the strong separation condition.
1185
Abstract: Test of VMF Codecs aims to find errors. This paper proposes an automatic test method of VMF codecs, the method use VMF Data Element Dictionary as the input data. Firstly the test process is designed for pack & unpack functions using legal and illegal test cases, then discusses the test cases suitable for automatic generation, and proposes an automatic test case generation method, the method consists of such steps: design of VMF Data Element Dictionary, message format analysis, generation of message storage struct, generation of message pack & unpack function, generation of legal test case and illegal test case. Lastly this method has been implemented and test experiments are taken, the results show that this method is feasible and effective.
1189
Abstract: Cloud computing is an open structure which have complexity, on-demand services, virtualization, resource pooling, rapid elasticity and multi-tenant architecture, etc. The security issues have become a bottleneck restricting the development of cloud computing. This paper analyzes the characteristics of cloud computing services, security requirements and security issues, given security strategies and a cloud computing model. It requires the use of cloud computing architecture data centers, virtualization platforms, cloud services, cloud terminal interfaces and cloud terminal to establish a secure cloud computing model. It needs considerations from prevention, surveillance and response to ensure the implementation and management. Cloud computing security is not just technical issues, it also involves many standardization, regulatory approach, laws and regulations and follow the existing security best practices can enhance the security of cloud computing.
1196
Abstract: This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security.
1201
Abstract: Web application has been widely used. So it is urgent to test the security of Web application efficiently to resist various attacks. In this paper, key technologies (detecting framework with plugin, discovering unknown vulnerability and building detection tools integrated by user-defined) are absolutely researched. No matter Web application is running or not, the platform can be dramatically able to discover the vulnerability efficiently to insure their security.
1205
Abstract: Software reliability accelerated testing can achieve higher reliability requirement in a relatively less period of time, which is based on the strengthened operational profile. However, when using different strengthened operational profiles, the effects of software reliability accelerated testing are different and some risks should be considered. Based on experiments, two different kinds of strengthened operational profiles are compared, and the accelerated effectiveness and the risk between two profiles are also analyzed, which give a reference for practical application.
1211
Abstract: The impact of hyper-parameters is considered in the software reliability verification testing program based on the traditional Bayesian theory and a new Bayesian software reliability verification testing program is proposed, which could be used for high-reliability software. Examples are given to illustrate the effectiveness of this verification testing program.
1215