Resource Type

Journal Article 16

Year

2022 2

2021 3

2020 2

2019 1

2018 2

2017 2

2013 2

2005 2

open ︾

Keywords

Blockchain 2

Physical layer security 2

Anonymity 1

Artificial noise 1

Chaotic systems 1

Cooperative beamforming 1

Copyright protection 1

Correlated channels 1

Cyber-physical production systems 1

Data analytics 1

Data hiding 1

De-correlation 1

Decentralized system 1

Doppler shift 1

Dynamic spectrum control 1

Efficient data transmission 1

Ergodic secrecy rate 1

Fog computing 1

Heterogeneous cellular networks 1

open ︾

Search scope:

排序: Display mode:

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Strategic Study of CAE 2005, Volume 7, Issue 3,   Pages 74-77

Abstract:

This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie

Keywords: JavaBeans     Secure Cookie     middleware     PMI     RBAC    

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Frontiers of Engineering Management 2020, Volume 7, Issue 2,   Pages 172-181 doi: 10.1007/s42524-019-0032-5

Abstract: Obsolescence of integrated systems which contain hardware and software is a problem that affects multiple industries and can occur for many reasons, including technological, economic, organizational, and social factors. It is especially acute in products and systems that have long life cycles, where a high rate of technological innovation of the subcomponents result in a mismatch in life cycles between the components and the systems. While several approaches for obsolescence forecasting exist, they often require data that may not be available. This paper describes an approach using non-probabilistic scenarios coupled with decision analysis to investigate how particular scenarios influence priority setting for products and systems. Scenarios are generated from a list of emergent and future conditions related to obsolescence. The key result is an identification of the most and least disruptive scenarios to the decision maker’s priorities. An example is presented related to the selection of technologies for energy islanding, which demonstrates the methodology using six obsolescence scenarios. The paper should be of broad interest to scholars and practitioners engaged with enterprise risk management and similar challenges of large-scale systems.

Keywords: enterprise risk management     diminishing manufacturing sources and material shortages     scenario-based preferences     systems engineering     deep uncertainty     product life cycle    

Synchronization of two different chaotic systems using Legendre polynomials with applications in secure None

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9,   Pages 1180-1190 doi: 10.1631/FITEE.1601814

Abstract: In secure communication systems, observer-based synchronization is required since only one state variableThe problem of secure communications is explained and the controller performance in secure communications

Keywords: Observer-based synchronization     Chaotic systems     Legendre polynomials     Secure communications    

Secure connectivity analysis in unmanned aerial vehicle networks None

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 409-422 doi: 10.1631/FITEE.1700032

Abstract: Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when thereMoreover, the metrics of both the physical connectivity probability and the secure connectivity probabilityWe derive accurate and analytical expressions of both the physical connectivity probability and the securephysical connection probability with or without malicious attacks, the proposed trust model can guarantee secure

Keywords: Unmanned aerial vehicle networks (UAVNs)     Trust model     Secure connectivity     Doppler shift    

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Strategic Study of CAE 2013, Volume 15, Issue 11,   Pages 49-52

Abstract:

To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.

Keywords: Puguang Gas Field     super-deep and high-sulfur     technology innovation     industrial application    

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: This necessitates protection of digital medical images and their secure transmission.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 1010-1019 doi: 10.1631/FITEE.2000043

Abstract: In this paper we propose an based secure scheme that can resist current underwater attacks, i.e., replay

Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)    

Research advances on engineering structural seismic safety of nuclear power plant

Kong Xianjing,Lin Gao

Strategic Study of CAE 2013, Volume 15, Issue 4,   Pages 62-74

Abstract:

uclear power is one of energy resources that China will vigorously develop for a long term from now on. The issue of nuclear power security guarantee is a key to ensure the smooth implementation and the safe operation of the nuclear power plant construction. However, because of the vast territory of China, the great differences in geological conditions and the complex natural conditions of ocean, as well as a wide range of seismic activity, high strength and high frequency of earthquakes in China, nuclear power buildings based on current standardized design methods are facing problems. Moreover, the lessons of the 2011 Fukushima nuclear accident due to destructive earthquake come out new problems to Chinese seismic safety of nuclear power engineering. In this paper, by combining engineering practice in recent years of nuclear power engineering seismic safety evaluation of the Dalian University of Technology, the key issues and the research methods in the structural seismic safety of Chinese nuclear power projects and some progress made by the Dalian University of Technology in the study of "the function failure mechanism and seismic safety evaluation of the nuclear power plant engineering structures under earthquake" are introduced. It mainly includes the method and strategy to analyze the foundational seismic adaptability of nuclear power plant, and seismic safety evaluation on water supply and drainage structures of nuclear power plant and seismic resistance and disaster prevention researches on engineering structures related to nuclear safety.

Keywords: nuclear power plant     foundation adaptability     water supply and drainage structures     secure shell     seismic    

Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems

Wei-min Hou, Qing-shan Tang,cstqs001@126.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 11,   Pages 1535-1670 doi: 10.1631/FITEE.2000083

Abstract: In this paper, we investigate the secrecy outage performance in (SWIPT) systems taking assistance into account. Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed. Specifically, the transmitted signal at the source is composed of two parts, where the first part is the information symbols and the other is the noise for the eavesdropper. To avoid making noise in the legitimate receiver, these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver. We derive an approximate closed-form expression for the (SOP) by adopting the Gauss-Laguerre quadrature (GLQ) method, where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ. To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system, the asymptotic result of the SOP is also derived. This is tight in the high signal-to-noise ratio region. A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper. Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions.

Keywords: 人工噪声;多天线系统;保密中断概率;无线携能    

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid Article

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Engineering 2022, Volume 8, Issue 1,   Pages 159-169 doi: 10.1016/j.eng.2020.06.018

Abstract: To address these challenges, we propose a double-blockchain assisted secure and anonymous data aggregationintegrating fog computing and the blockchain, which provides strong support for achieving efficient and secureSubsequently, we develop a secure and anonymous data aggregation mechanism with low computational overhead

Keywords: Blockchain     Fog computing     Homomorphic encryption     Smart grid     Anonymity    

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition Research Articles

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 946-963 doi: 10.1631/FITEE.1700667

Abstract:

This paper presents a block-based secure and robust watermarking technique for color images based

Keywords: Copyright protection     Data hiding     Multi-resolution decomposition     De-correlation     Security    

Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers Article

He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6,   Pages 850-862 doi: 10.1631/FITEE.1601832

Abstract: We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication

Keywords: Simultaneous wireless information and power transfer     Physical layer security     Relay networks     Cooperative beamforming     Artificial noise    

Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular Article

Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, Xuemin Sherman Shen

Engineering 2022, Volume 17, Issue 10,   Pages 220-231 doi: 10.1016/j.eng.2021.04.019

Abstract: and lower bounds of network capacity are further derived with given requirements on the reliable and secure

Keywords: Heterogeneous cellular networks     Dynamic spectrum control     Transmission security     Efficient data transmission    

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 78-82

Abstract: wireless authentication protocol is vulnerable to dictionary attacks, the flexible authentication via secure

Keywords: wireless local area network     port based network access control (802.1x)     flexible authentication via secure    

Correlated channelmodel-based securecommunications in dual-hopwireless communication networks Article

Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6,   Pages 796-807 doi: 10.1631/FITEE.1700023

Abstract: This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropperIn this network, a single-antenna source-destination pair transmits secure information with the help

Keywords: Physical layer security     Relay beamforming     Correlated channels     Ergodic secrecy rate    

Title Author Date Type Operation

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Journal Article

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Journal Article

Synchronization of two different chaotic systems using Legendre polynomials with applications in secure

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Journal Article

Secure connectivity analysis in unmanned aerial vehicle networks

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Journal Article

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Journal Article

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Journal Article

Research advances on engineering structural seismic safety of nuclear power plant

Kong Xianjing,Lin Gao

Journal Article

Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems

Wei-min Hou, Qing-shan Tang,cstqs001@126.com

Journal Article

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Journal Article

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Journal Article

Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers

He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU

Journal Article

Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular

Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, Xuemin Sherman Shen

Journal Article

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Journal Article

Correlated channelmodel-based securecommunications in dual-hopwireless communication networks

Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN

Journal Article