The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
We propose a fountain coding aided CCSDS file-delivery protocol (FCFDP) and analyze its deferred negative acknowledgment (NAK) automatic repeat-request (ARQ) scheme. For ideal fountain codes, an expression for the expected number of retransmission spurts in the FCFDP is derived. The analytical and simulation results show that the expected number of retransmission spurts decreases with the increase...
With the rapid popularization of mobile smartphone and its built-in location-aware devices, people are possible to establish trust relationships with each other by matching their interests, hobbies, experiences, or spatiotemporal profiles. However, the contradiction between the possibility of personal sensitive information leaking and the growing privacy concerns of users restricts the widespread...
Voice over Internet Protocol (VoIP) over wireless mesh networks (WMNs) is becoming more and more popular due to its significant cost advantage, higher flexibility and wide coverage. One of the most basic requirements of VoIP is that it must provide privacy and security protection for VoIP clients. Unfortunately, little effort is spent on this area. In this paper, we focus on the privacy security of...
RapidIO is an open standard that provides high-performance interconnect for chip-to-chip, board-to-board, and chassis-to-chassis communications. In this paper, we present an executable RapidIO interconnect in which an improved Buffer structure based on flow control is put forward. It helps to provide a smooth data flow, strong built-in error detection and error recovery mechanisms. It is tested to...
This paper studies the problem of constructing maximum-lifetime data gathering trees in sensor networks in which the power levels of sensors are heterogeneous and adjustable. In-network data aggregation is also employed to aggregate sensor data while they are being forwarded toward the base station. For sensor networks in which sensors have fixed and the same transmission power level, Wu et al. has...
Since forward reservation protocol (FRP) and backward reservation protocol (BRP) both have apparent drawbacks when they are used in multi-domain optical network. So we propose a reservation protocol based on priority in multi-domain optical network with wavelength conversion, which achieves the trade-off between blocking probability and connection setup time.
IEEE802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in IEEE802.11, IEEE introduced 802.1x for authentication and key management. IEEE802.1x is a port based network access control protocol that uses extensible authentication protocol (EAP) at the transport layer.IEEE802.1x defines authentication...
The scalable video coding (SVC) extension of H.264/AVC was designed to support bandwidth efficient and loss resilient video streaming. Its multilayer predictive encoding enables user devices to adapt their video reception by extracting and decoding selected code layers according to device display capability and network throughput. However, this desirable feature is much harder to realize in practice...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.