Advanced Materials Research
Vol. 854
Vol. 854
Advanced Materials Research
Vol. 853
Vol. 853
Advanced Materials Research
Vol. 852
Vol. 852
Advanced Materials Research
Vols. 850-851
Vols. 850-851
Advanced Materials Research
Vol. 849
Vol. 849
Advanced Materials Research
Vol. 848
Vol. 848
Advanced Materials Research
Vols. 846-847
Vols. 846-847
Advanced Materials Research
Vol. 845
Vol. 845
Advanced Materials Research
Vol. 844
Vol. 844
Advanced Materials Research
Vol. 843
Vol. 843
Advanced Materials Research
Vol. 842
Vol. 842
Advanced Materials Research
Vols. 838-841
Vols. 838-841
Advanced Materials Research
Vol. 837
Vol. 837
Advanced Materials Research Vols. 846-847
Paper Title Page
Abstract: As a network middleware, Data Distribution Service (DDS) is a hot research subject in recent years. First, DDS model is formalized definition and description in this paper. Second, we research and analysis performance-related QoS policies and these polices are how to do affect performance. Finally, we verify and analyze the control strategy of QoS by experimental, which has an important impact on improving the performance of DDS.
1604
Abstract: As more and more cars are in service, the traffic jam becomes a serious problem in our society. At the same time, more and more sensors make the cars more and more intelligent, and this promotes the development of Internet of things. Real time monitoring the cars will produce massive sensing data, the Cloud computing gives us a good manner to solve this problem. In this paper, we propose a traffic flow data collection and traffic signal control system based on Internet of things and the Cloud computing. The proposed system contains two main parts, sensing data collection and traffic status control subsystem.
1608
Abstract: Combining the technologies of electronic currency and mobile communication, mobile banking services can not only make people in any time, any place handle a variety of financial services, but also greatly enriched the connotation of banking services. While people are enjoying the convenient, efficient banking services, the security issue becomes a focus of attention and a key to this business development. This paper outlines the development trend of mobile banking service, analysis its existing security measures and challenging problems, and puts forward a new solution to improve the safety of the mobile banking service. It is of significance to the development of mobile banking industry and the financial security of a country.
1612
Abstract: Client puzzles, a type of cryptographic puzzle, have been proposed and developed by many scholars to guarantee network security. In this paper, we proposed C2Puzzle, a novel computational client puzzle. By using the iterative algorithm, C2Puzzle successfully combined the basic principles of prime factorization and discrete logarithm problem. We show that, C2Puzzle has the visible security advantages, and the adjustability of puzzle difficulty is in fine granularity.
1615
Abstract: While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.
1620
Abstract: With the rapid development of Internet, E-mail has been widely applied, and along goes a great deal of useless and harmful information. In the face of todays rampant spam developments, anti-spam mechanism is the mail filtering technology has gradually become the focus of information security. While the technical performance of spam filtering is good or bad, the key lies in the amount of spam sample collection, study and analysis. Through the analyzing and processing of spam, the paper designs and implements the intelligent spam filtering system. It brings forward some new theories. Based on analyzing actuality, origin and characteristic of spam, the paper also mainly expounds several filtering technique applied in E-mail.
1624
Abstract: With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.
1628
Abstract: Security situational awareness has become a hot topic in the area of network securityresearch in recent years. The existing security situational awareness methods are analyzed and compared in details, and thus a newnetwork security situational awareness model based on information fusion is proposed. This modelfuses multi-source information from a mass of logs by introducing the modified D-S evidence theory,gets the values of nodes security situational awareness by situational factors fusion using attacks threat,and vulnerability information which network nodes have and successful attacks depend on, computesthe value of network security situational awareness by nodes situation fusion using service informationof the network nodes, and draws the security-situation-graph of network. Then, it analyzes the timeseries of the computing results by ARMA model to forecast the future threat in network security.Finally an example of actual network datasets is given to validate the network security situationalawareness model and algorithm. The results show that this model and algorithm is more effective andaccurate than the existing security situational awareness methods.
1632
Abstract: This paper introduces a typical softswitch network system, points out the security threats of SIP softswitch network that may exist, select suitable HTTP digest authentication mechanism for softswitch network in the analysis of the SIP security mechanism. For the deficiencies of HTTP digest authentication, by extending SIP message header field contents, learning SRTP and other methods to improve it. Improved HTTP digest authentication mechanism can effectively avoid the server camouflage, registration hijacking, message tampering and other security threats, to ensure the security of SIP protocol application layer, improved security of softswitch network.
1636
Abstract: In this paper, a novel Automatic Malware Signature Discovery System for AV cloud is proposed to generate malware signatures from both static and dynamic aspects. It keeps a good workload balance between the desktop and cloud services. It can automatically generate a lightweight signature database with the size hundreds times smaller than traditional signature ones. In the AV cloud model, users do not need to install a large virus signature file, but a lightweight set of cloud signatures. The benefits include easy deployment, low costs of operation, and fast signature updating. Further, Automatic Malware Signature Discovery System signatures can be easily integrated into existing AV products.
1640