The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For large-scale networking environments, grouping network nodes into clusters is a key technique to achieve the scalability objective. This paper addresses cycle-based node clustering in the crossed cube architecture. Let r be a positive integer. For any r distinct vertices v1, …, vr of a network G = (V, E), G is said to be spanning (v1, …, vr)-cyclable if there exists a set of r vertex-disjoint cycles...
A sensor network is one popular candidate for the fundamental backbone of IoT (Internet of Things). Among the key technologies involved in sensor networks, fault detection techniques are indispensable for maintaining the availability of sensor applications. Chen et. al. (2006) presented a distributed fault detection (DFD) scheme to identify hard faults, such as power failures, crash faults, etc.,...
The quantum cryptographic key assignment problem is getting important in an optic network, when it is to assign cryptographic keys to each of communication parties via insecure optic channel. In this paper, we propose Three-Party Authenticated Quantum Key Distribution Protocol with Time-Bound (3PAQKD-TB). Each session key corresponding to the measurement bases dynamically changed for each time-period,...
System-level fault identification is a key subject for maintaining the reliability of a multiprocessor interconnected system. As a popular network topology, meshes have various applications to real multiprocessor systems. In this paper, a system contains only restricted-faults if every of its fault-free units has at least one fault-free neighbor. Then this paper aims to study the method for identifying...
Diagnosis is an essential subject for the reliability of a network system. Under the PMC diagnosis model, Dahbura and Masson (1984) proposed a polynomial-time algorithm with time complexity O(N2.5) to identify all the faulty nodes in an N-node network. In this paper we present a novel method to diagnose a wireless sensor network by applying the concept behind the local diagnosability, first introduced...
We propose an enhanced 3PEKE (Three-party Encrypted Key Exchange) scheme, in which both two parties/clients act as the roles upon the relationship of exchange-messages, who are employed in the traditional 3PEKE (Three-party Encrypted Key Exchange) schemes [2-5, 9, 12-17, 19, 23, 26, 27]. Our approach can improve the security of traditional 3PEKE scheme by adding digital time-stamp. By this way, we...
A graph G is called pancyclic if it contains a cycle of length l for each integer l from 3 to |V (G)| inclusive, where |V (G)| denotes the cardinality of the vertex set of graph G. It has been shown by Ma et al. (2007) that the augmented cube, proposed by Choudum and Sunitha (2002), is pancyclic. In this paper, we propose a more refined property, namely double-pancyclicity. Let G be a pancyclic graph...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.