The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With rapid growth in wireless network technologies, there is high need for secure communication in such as highly heterogeneous environment. Since mobile wireless devices have limited battery capacity, wireless network security should make optimal use of this resource. Implementing security is challenging under this condition. This paper aims to investigate optimal use of energy under the block cipher...
Nowadays, the increased use of battery-powered mobile appliances and the urge to access sensitive data anywhere has fuelled the demand for wireless networks. However, wireless network is susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of the data being exchanged...
The volume of the data involved in healthcare systems and the sensitivity of the data call for strict, non-obtrusive and efficient access control. This paper presents the design and implementation of a software prototype to demonstrate how Role-Based Access Control (RBAC), supported by context-awareness, can be applied in the Mauritian healthcare service for providing efficient and effective access...
Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud Architecture (IGCA) is proposed that comprises of a client-oriented...
In wireless ad hoc networks, protecting source and destination nodes' location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake sourcedestination pairs in the network, provide some privacy of real source and destination nodes against attackers. Moreover, ad hoc networks need stronger privacy protection against powerful...
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode...
Bluetooth is a promising short-range radio network technology. We present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on the Bluetooth technology. The system consists of 2 main components, namely the Bluetooth (BT) Sensor System and the Central Navigation System which have been developed using the JDK 1.6. The Bluetooth Sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.