OALib 期刊
  OALib Journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721)是一本多合一的开源期刊,以同行评审的方式出版发行文章,其所涵盖的研究领域多达311种领域。本刊发表的全部文章均可在期刊网站上免费阅读、下载、引用和传播。单篇文章出版费用为99美元。详情请咨询service@oalib.com 或 QQ: 3279437679。现在就去投稿!
               文章 | 目标与领域 | 读者指南 | 编委 | 文章版面费检索             


Go

Apr 12, 2018Open    AccessArticle

Analysis and Reflection on the Utilization of Foreign Academic E-Book—An Empirical Study Based on 367 Users of a University

Jiayin Liu, Chen Chen
Based on the form of questionnaire, this paper explores the use of foreign academic e-books by teachers and students in a certain school from a subjective view. 367 Users’ behavior, habits and needs were analyzed. Based on the results of the analysis, four suggestions are put forward to improve the overall utilization: Promote the localization of interface, pay attention to users’ advice while
...


Mar 19, 2018Open    AccessArticle

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

S. Y. Massamba, S. A. R. R. Cheikh
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
...


Oct 11, 2016Open    AccessArticle

Tightly-Secure Authenticated Key Exchange without NAXOS’ Approach Based on Decision Linear Problem

Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
Design Secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach [4] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks: (i) leaking of the static secret key which will be utilized in computing the exponent of the ephemeral public key; (ii) ma
...


Apr 28, 2016Open    AccessArticle

Data Security of Mobile Cloud Computing on Cloud Server

Mohammad Waseem, Abdullah Lakhan, Irfan Ali Jamali
Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage se...


Nov 25, 2015Open    AccessArticle

The Content Security Mechanism of Smart TV Broadcasting Operating System

Xin Wang
Smart TV broadcasting system is an extensively deployed application which charges users based on their subscription. In Smart TV broadcasting service environments, services providers charge subscription fee by scrambling the programs in CAS. This technique abstain unauthorized televiewers to watch and receive the program. Smart TV malware presents significant threat to Homeland Security. Security for contents running on smart TV terminals is important. As a new smart TV operating system, SMART T...


Oct 22, 2014Open    AccessArticle

Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)

Amin Mohajer, Mohammad Hasan Hajimobini, Abbas Mirzaei, Ehsan Noori
Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. There are several architectures for embedding IDS in WSN. Due to Energy Limitation, in this paper we use a distributed architecture which activates intrusion detection system for limited number of nodes. For this purpose we select a secure set of nodes c...


Oct 21, 2014Open    AccessArticle

Development of College of Industrial Technology Frequency Modulation Broadcast Trainer

Bernardo A. Pangilinan
A frequency modulation broadcast station trainer was developed to expose the students to the basic equipment needed in radio broadcasting. The cost of portable FM broadcast trainer is much lower than the cost of the traditional commercially available equipment because of the materials used. The FM broadcast trainer is laboratory equipment that can be used by schools offering academic programs in industrial courses specifically Electronics and Communication Technology courses. At present there is...


Go