Learn More
J2EE is used in many E-Business portal for its characteristic such as high stability, construct rapidly, easy to replant and maintenance and so on. Struts, Spring and Hibernate, which are based on J2EE technology, are Open Source frameworks. This paper analyses how to integrate the three frameworks according to their strong points and apply this technology(More)
A Data Hiding Approach for Efficient Image Indexing J. Jiang* and A. Armstrong** *Department of Electronic Imaging & Media Communications, University of Bradford, UK **School of Computing, University of Glamorgan, UK ABSTRACT: In this letter, we propose a data hiding approach to embed the indexing keys inside the JPEG compressed images for their retrieval,(More)
SMS4 algorithm is one of the block ciphers used in WLAN, and it is the first commercial block cipher opened by China. In this paper, the principle of SMS4 is introduced. And a one-time cipher algorithm based on SMS4 is proposed and realized, thus the security of the algorithm is improved. The symmetric keys are also one-time by Combining from symmetric key(More)
It is very important to protect the data security in distributed web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length(More)
A large-scale authentication architecture and key management protocol based on combined symmetric key (CSK) algorithm are proposed. Through the CSK algorithm and smart card technology, the authentication process can be finished inside the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds. The security(More)
  • 1