You are currently viewing a new version of our website. To view the old version click .

Information, Volume 6, Issue 4

December 2015 - 20 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (20)

  • Article
  • Open Access
22 Citations
6,862 Views
14 Pages

Cable Capacitance Attack against the KLJN Secure Key Exchange

  • Hsien-Pu Chen,
  • Elias Gonzalez,
  • Yessica Saez and
  • Laszlo B. Kish

30 October 2015

The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealit...

  • Article
  • Open Access
7 Citations
7,429 Views
15 Pages

Batch Attribute-Based Encryption for Secure Clouds

  • Chen Yang,
  • Yang Sun and
  • Qianhong Wu

29 October 2015

Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphert...

  • Article
  • Open Access
6 Citations
14,949 Views
11 Pages

21 October 2015

Through the rescientification of philosophy and the philosophization of science, an entirely new concept of science and philosophy as part of general human knowledge is developing. In this concept, science and philosophy become intrinsically integrat...

  • Article
  • Open Access
2 Citations
5,990 Views
14 Pages

20 October 2015

In this paper, we propose a new method for 2D/3D object indexing and retrieval. The principle consists of an automatic selection of optimal views by using an incremental algorithm based on pivot selection techniques for proximity searching in metric...

  • Article
  • Open Access
1 Citations
5,601 Views
10 Pages

16 October 2015

Terrence Deacon’s (2012) notion developed in his book Incomplete Nature (IN) that living organisms are teleodynamic systems that are self-maintaining, self-correcting and self-reproducing is extended to human social systems. The hypothesis is develop...

  • Article
  • Open Access
11 Citations
5,692 Views
19 Pages

15 October 2015

In real aperture imaging, the limited azimuth angular resolution seriously restricts the applications of this imaging system. This report presents a maximum a posteriori (MAP) approach based on the Bayesian framework for high angular resolution of re...

  • Article
  • Open Access
19 Citations
5,236 Views
17 Pages

13 October 2015

Quantum-behaved particle swarm optimization (QPSO), a global optimization method, is a combination of particle swarm optimization (PSO) and quantum mechanics. It has a great performance in the aspects of search ability, convergence speed, solution a...

  • Article
  • Open Access
3 Citations
4,898 Views
20 Pages

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network

  • Jinhua Ma,
  • Zhide Chen,
  • Jianghua Liu and
  • Rongjun Zheng

10 October 2015

With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious worms are getting more and more serious. By considering the influences of the network heterogeneity on worm spreading, we are the first to study the comp...

  • Article
  • Open Access
1 Citations
4,560 Views
16 Pages

7 October 2015

Secret handshake schemes have been proposed to achieve private mutual authentications, which allow the members of a certain organization to anonymously authenticate each other without exposing their affiliations. In this paper, a backward unlinkable...

  • Article
  • Open Access
3 Citations
6,940 Views
21 Pages

7 October 2015

After the derivation of specific applications from a software product line, the applications keep evolving with respect to new customer’s requirements. In general, evolutions in most industrial projects are expressed using natural language, because i...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489Creative Common CC BY license