Search scope:
排序: Display mode:
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Strategic Study of CAE 2005, Volume 7, Issue 3, Pages 74-77
This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie
Keywords: JavaBeans Secure Cookie middleware PMI RBAC
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Frontiers of Engineering Management 2020, Volume 7, Issue 2, Pages 172-181 doi: 10.1007/s42524-019-0032-5
Keywords: enterprise risk management diminishing manufacturing sources and material shortages scenario-based preferences systems engineering deep uncertainty product life cycle
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9, Pages 1180-1190 doi: 10.1631/FITEE.1601814
Keywords: Observer-based synchronization Chaotic systems Legendre polynomials Secure communications
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Cao Yaofeng
Strategic Study of CAE 2013, Volume 15, Issue 11, Pages 49-52
To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.
Keywords: Puguang Gas Field super-deep and high-sulfur technology innovation industrial application
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles
Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 1010-1019 doi: 10.1631/FITEE.2000043
Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)
Research advances on engineering structural seismic safety of nuclear power plant
Kong Xianjing,Lin Gao
Strategic Study of CAE 2013, Volume 15, Issue 4, Pages 62-74
uclear power is one of energy resources that China will vigorously develop for a long term from now on. The issue of nuclear power security guarantee is a key to ensure the smooth implementation and the safe operation of the nuclear power plant construction. However, because of the vast territory of China, the great differences in geological conditions and the complex natural conditions of ocean, as well as a wide range of seismic activity, high strength and high frequency of earthquakes in China, nuclear power buildings based on current standardized design methods are facing problems. Moreover, the lessons of the 2011 Fukushima nuclear accident due to destructive earthquake come out new problems to Chinese seismic safety of nuclear power engineering. In this paper, by combining engineering practice in recent years of nuclear power engineering seismic safety evaluation of the Dalian University of Technology, the key issues and the research methods in the structural seismic safety of Chinese nuclear power projects and some progress made by the Dalian University of Technology in the study of "the function failure mechanism and seismic safety evaluation of the nuclear power plant engineering structures under earthquake" are introduced. It mainly includes the method and strategy to analyze the foundational seismic adaptability of nuclear power plant, and seismic safety evaluation on water supply and drainage structures of nuclear power plant and seismic resistance and disaster prevention researches on engineering structures related to nuclear safety.
Keywords: nuclear power plant foundation adaptability water supply and drainage structures secure shell seismic
Wei-min Hou, Qing-shan Tang,cstqs001@126.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 11, Pages 1535-1670 doi: 10.1631/FITEE.2000083
Keywords: 人工噪声;多天线系统;保密中断概率;无线携能
Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid Article
Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang
Engineering 2022, Volume 8, Issue 1, Pages 159-169 doi: 10.1016/j.eng.2020.06.018
Keywords: Blockchain Fog computing Homomorphic encryption Smart grid Anonymity
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition Research Articles
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 946-963 doi: 10.1631/FITEE.1700667
This paper presents a block-based secure and robust watermarking technique for color images based
Keywords: Copyright protection Data hiding Multi-resolution decomposition De-correlation Security
He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6, Pages 850-862 doi: 10.1631/FITEE.1601832
Keywords: Simultaneous wireless information and power transfer Physical layer security Relay networks Cooperative beamforming Artificial noise
Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular Article
Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, Xuemin Sherman Shen
Engineering 2022, Volume 17, Issue 10, Pages 220-231 doi: 10.1016/j.eng.2021.04.019
Keywords: Heterogeneous cellular networks Dynamic spectrum control Transmission security Efficient data transmission
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 78-82
Keywords: wireless local area network port based network access control (802.1x) flexible authentication via secure
Correlated channelmodel-based securecommunications in dual-hopwireless communication networks Article
Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6, Pages 796-807 doi: 10.1631/FITEE.1700023
Keywords: Physical layer security Relay beamforming Correlated channels Ergodic secrecy rate
Title Author Date Type Operation
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Journal Article
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Journal Article
Synchronization of two different chaotic systems using Legendre polynomials with applications in secure
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Journal Article
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
The secure and highly efficient development technology for Puguang Gas Field and its industrial application
Cao Yaofeng
Journal Article
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir
Journal Article
Research advances on engineering structural seismic safety of nuclear power plant
Kong Xianjing,Lin Gao
Journal Article
Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems
Wei-min Hou, Qing-shan Tang,cstqs001@126.com
Journal Article
Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid
Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang
Journal Article
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Journal Article
Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers
He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU
Journal Article
Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular
Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, Xuemin Sherman Shen
Journal Article
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Journal Article