The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In many implementations of intelligent traffic system (ITS), the actuated signal controller (ASC) is widely deployed to control the traffic lights and other terminals. However, inadequate research has been done on the security for the link that goes between the ASC (e.g., primary device) and many secondary devices controlled by the ASC. The communication of the link is based on the old synchronous...
The security of the control network has become a major concern since the wide deployment of smart grid systems. The functions of Intelligent Energy Management (IEM) highly depend on the communication techniques. The IEM is the service agent of smart grid communication network in a limited management zone for distributed and autonomous power system control and operations. In such a smart grid, the...
Traffic intersections are plenteous in this world we live in, while the efforts to secure them are not. With a little knowledge in the Department of Transportation one could easily take control of an intersection for a period of time without any interference from authorities. In this paper a proposal to encrypt such SDLC and broadband messages shall be described. DES and MD5 prove to be strong solutions...
For the realistic demand of data security communications, the paper proposes a new algorithm for encryption/decryption based on the theory of artificial immunization. It is a new method based on the negative selection algorithm and extracts the encryption factor from the plaintext. Encryption factor as a key group is expanded by the way of the m-sequence and generates pseudo-random key sequence that...
Exclusive-OR (XOR) gate is one of the critical components in many applications such as cryptography. In this paper, we present an efficient multi-input XOR circuit design based on pass-transistor logic (PTL). A synthesis algorithm is developed to efficiently generate the PTL-based multi-input XOR circuits. Both pre-layout and post-layout simulation results show that our proposed multi-input XOR design...
With the penetration of the Internet and the rapid development of information technology, the secure transmission of the text and image herewith gets a great deal of attention. The traditional methods of encryption can only maintain the information security. However, the information could be cracked and to proceed criminal acts by the illegal use of the relevant information. Therefore, it is necessary...
Packet losses and errors are common through current wireless transmission due to signal decay, barriers in-between and other environmental related reasons. Although there are many ways to correct these errors, there is no one can deal with them immediately. For the efficient use of energy to achieve the purpose of energy conservation, and use the smallest energy to implement monitoring more, rapid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.