Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Chang-da WANG"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 36-46 (2017)
To improve the self-correction ability and resist the entropy-based detection,a flow watermarking approach based on the inter-packets delays with smooth crossed grouping was proposed.Such an approach extended the watermarking methods using both the c
Externí odkaz:
https://doaj.org/article/980feda5ecb94ff3ab0f358f694b3d73
Publikováno v:
2019 14th Symposium on Piezoelectrcity, Acoustic Waves and Device Applications (SPAWDA).
The reflection and transmission of the thermos-elastic coupled waves across a slab of finite thickness that is sandwiched between two semi-infinite homogeneous isotropic couple stress elastic solids are studied. Based on the modified couple-stress th
Publikováno v:
Chinese Journal of Computers. 36:2587-2600
Publikováno v:
Applied Mechanics and Materials. :742-749
Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails a
Publikováno v:
Journal of Software. 23:2835-2861
Publikováno v:
Journal of Computer Applications. 32:1636-1639
Publikováno v:
Journal of Software. 23:1656-1668
Autor:
Shi-guang Ju, Chang-da Wang
Publikováno v:
Journal of Zhejiang University-SCIENCE A. 9:737-743
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. W
Publikováno v:
Grid and Cooperative Computing ISBN: 9783540219880
GCC (1)
GCC (1)
Covert channels can leak the confidential information under the supervision of security model, so its threat is serious. The working principle of covert channels was formalized and the least condition of its existence was also represented. Based on i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00cc1500d804533da24121ae1f09e98e
https://doi.org/10.1007/978-3-540-24679-4_163
https://doi.org/10.1007/978-3-540-24679-4_163
Publikováno v:
Grid and Cooperative Computing ISBN: 9783540219880
GCC (1)
GCC (1)
The characteristics of grid are outlined to point out that the traditional authorization mechanisms cannot satisfy the requirement of the grid security. Then the authorization mechanisms employed in five prevalent Grid Security Architectures are comp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96e4903f1126b6e2a16a1374c490c153
https://doi.org/10.1007/978-3-540-24679-4_177
https://doi.org/10.1007/978-3-540-24679-4_177