RESEARCH ON THE REDUCTION OF CARBON EMISSIONS IN BUILDINGS BY SPECIFYING LOW-CARBON CONCRETE MIXES IN CHINA [PDF]
Buildings are key contributors to the emissions of toxic carbon dioxide, which is a global greenhouse gas, and lowering the concentration of this gas is an essential mitigation in mitigating the effects of climate change.
Xi Zhang , Jian Yin , Fangwei Li
doaj +1 more source
Attacks Against White-Box ECDSA and Discussion of Countermeasures
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations.
Sven Bauer +5 more
doaj +3 more sources
Data Augmentation and Second-Order Pooling for Facial Expression Recognition
Facial expression is the main medium of information transmission in human communication, playing an important role in human's daily life. Facial expression recognition is still challenging due to the various obstacle, illumination, and posture.
Xiaoyun Tong, Songlin Sun, Meixia Fu
doaj +1 more source
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia +2 more
core +2 more sources
Integrity protection for code-on-demand mobile agents in e-commerce [PDF]
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core +1 more source
Application of Workflow Technology for Big Data Analysis Service
This study presents a lightweight representational state transfer-based cloud workflow system to construct a big data intelligent software-as-a-service (SaaS) platform.
Bin Zhang +4 more
doaj +1 more source
HotMobile 2008: Postconference Report [PDF]
HotMobile 2008 presented a two-day program on mobile computing systems and applications. The authors focuses on the sessions on sensors, modularity, wireless, security, systems, and screens.
Lindqvist, J., Pawar, P., Stuntebeck, E.
core +2 more sources
The Energy Management System (EMS) is an efficient technique to monitor, control and enhance the building performance. In the state-of-the-art, building performance analysis is separated into building simulation and control management: this may cause ...
Yajie Zhang, Behrang Vand, Simone Baldi
doaj +1 more source
Future consumer mobile phone security: a case study using the data centric security model [PDF]
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core +5 more sources
Secure transmission technology based on direct modulation with random channel characteristics
Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed.
Yang Rong, Hu Aiqun
doaj +1 more source

