Through analyzing the security problems which exist in general on-line payment systems, this paper proposes a scheme based on WPKI (Wireless Public key Infrastructure) and further designs and implements a gas station ...
详细信息
ISBN:
(纸本)9787894631046
Through analyzing the security problems which exist in general on-line payment systems, this paper proposes a scheme based on WPKI (Wireless Public key Infrastructure) and further designs and implements a gas station on-line payment system. By using WPKI technology which includes SSL (Secure Sockets Layer) protocol, digital signature and digital certificate, the designed on-line payment system can achieve data privacy, authenticity, integrity and non-repudiation during on-line payment process.
Direction relations between extended spatial objects are important commonsense knowledge. Skiadopoulos proposed a formal model for representing direction relations between compound regions (the finite union of simple ...
详细信息
Most of the current information retrieval systems are mainly based on full text matching of keywords or topic-based classification, often return a large number of irrelevant information, and are unable to meet the use...
详细信息
This article has been retracted: please see Elsevier Policy on Article Withdrawal ( http://***/locate/withdrawalpolicy ). This article has been retracted at the request of the Infringed Author. The authors have plagia...
This article has been retracted: please see Elsevier Policy on Article Withdrawal ( http://***/locate/withdrawalpolicy ). This article has been retracted at the request of the Infringed Author. The authors have plagiarized part of a paper that had already appeared in ACM MULTIMEDIA '07, (2007) 97 – 106. 10.1145/1291233.1291255. One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to readers of the journal that this was not detected during the submission process.
Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it is important to clarify the difference between t...
详细信息
Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it is important to clarify the difference between them. The difference above refers to the logical difference, not syntactic one. Examples of the logical difference include the difference in taxonomy, concept subsumption difference and query difference. These has been well investigated for the lightweight description logic EL because of its tractability and successful application in bio-medical ontologies. Fuzzy EL+ has been put forward and applied in view-based searching in Semantic portals. Thus comes the problem of comparing fuzzy ontologies of different versions and clarifying the difference. In this paper, we define the logical difference of two fuzzy EL+ ontologies. For fuzzy EL+ ontologies of different versions we investigate how to compute the difference in taxonomy and concept subsumption difference. We also explore how to compute approximation of the logical difference of two EL terminologies. Our work can be applied in the scenario of EL+ ontologies with access control if the set of all access rights is a linear order.
Soil fertility grading is an important issue in the agriculture domain, AI based approach has been applied recently. But in most circumstance data obtaining is a expensive and time consuming procedure, sometimes even ...
详细信息
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle el...
详细信息
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by which the on-vehicle electronic systems achieve a trusted boot process. Data and information of vehicles are encrypted before storage and transmission. The experiments show that with the authorization on the vehicular platform, the TCM will improve the credibility and security of the Internet of Vehicles.
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a funda...
详细信息
ISBN:
(纸本)9787894631046
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a fundamental block constraining the progress of vehicle electronic industry. A trusted remote remediation framework for vehicle software is presented and realized to enable drivers to online upgrade version or fix bug without needing for driving the vehicles back to the factories or using the specific devices. In this framework, the trusted remediation server takes responsibility for managing and providing the patch programs and the trusted remediation client can download directly from the remediation server to upgrade programs or fix software errors, achieving the self-repair in complex vehicular networks.
The rigorous theoretical analyses of algorithms for #SAT have been proposed in the literature. As we know, previous algorithms for solving #SAT have been analyzed only regarding the number of variables as the paramete...
详细信息
Petri Nets is a powerful mathematical modeling tool for system description and analysis, with which we can describe the relationship among entities efficiently. The present thesis puts forward the modeling of the dist...
详细信息
暂无评论