Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Xi-jun Cheng"'
Publikováno v:
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
Aiming at the authentication of civilian signals broadcasted by currently orbiting GPS satellites, this paper proposes a new technique, which carries GPS authentication information by the messages hidden in the navigation message and, without affecti
Publikováno v:
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
The GPS system is capable of one-way communication (OWC) if the reserved bits of navigation message are utilized. Excluding the potential communication protocol overheads, a single frequency with one satellite transmits data at 0.5B/s; with the dual
Publikováno v:
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
There are two main techniques to disable GPS user receivers from performing navigation fix, either causing interference on transmission route segment or using directional signal radiation on satelliet segment. This paper introduces a new Denial of Se
Publikováno v:
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
GPS is widely used by civil aviation, financial institutions and transport sector and other civilian sectors, as well as for military purposes, thus the research on GPS spoof is of considerable merits. This paper analyzes the roots of forgeability an
Autor:
Xi-jun Cheng, Juan-juan Chen
Publikováno v:
2009 Second International Conference on Information and Computing Science.
In collaborative environment the threshold structure is common for joint authorization. Although with the powerful ability to enforce security policies, traditional RBAC hardly considers the issue. In order to solve the problem, we describe the thres
Autor:
Juan-juan Chen, Xi-jun Cheng
Publikováno v:
2009 2nd IEEE International Conference on Computer Science and Information Technology.
The ports which are often open on different hosts at different times are extremely important for network security analyses because they supply more attack chances to attackers. These ports can be discovered by sequential port scans. For network defen