The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we revisit multi-party Diffie-Hellman key exchange (DHKE) protocols by using multi-linear mappings and Weil pairings over elliptic curves. We show how to construct a 4-linear Weil pairing and illustrate the approach by examples. Finally, we present several necessary conditions to find a distortion map for a 5-party DHKE protocol.
Wireless sensor networks have emerged as the major criteria that enable the Internet of things evolution. In which, wireless image sensor network have wide application range from special domain to civilian and scientific domain thus it is attracted a lot of research. Since security is of the crucial importance for wireless sensor networks, there are existed several authentication techniques for digital...
Software Defined Network (SDN) empowers network operators with more flexibility to program their networks. In SDN, dummy switches on the data plane dynamically forward packets based on the rules which are managed by a centralized controller. To apply the rules, switches need to write the rules in its flow table. However, because the size of the flow table is limited, a scalability problem can be an...
Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During the probing process, Wi-Fi clients transmit the names of previously known Wi-Fi access points (APs) in plaintext. An eavesdropper can easily collect the information leaked by this Wi-Fi probing process to mount numerous attacks, such as fake AP or revealing hidden APs, or to breach users' privacy. Since APs are...
In security applications, obtaining high resolution face images is challenging since cameras are usually placed at a far distance. In this paper, we employ two approaches to detect face at a distance including using one or dual pan-tilt-zoom (PTZ) cameras to zoom in and capture proximate faces while still maintaining a large observing area. While most current approaches require a complex calibration...
Anonymous tag set cardinality estimation problem of Radio Frequency IDentification (RFID) using Maximum A Posteriori (MAP) approach is studied in this paper. The posterior probability of the total number of tags, given the frame size and the observed number of non-empty slots, is firstly determined. Then, the total number of tags is estimated to maximize the posterior probability. Computer simulation...
Integer factorization is an interesting but a hard problem and stays at the core of many security mechanisms. Conventional approaches to factor big integer numbers often require powerful computers and a great effort in software development. In this paper, we present a different approach to this problem by running the quadratic sieve algorithm in the Hadoop framework. This approach offers a much easier...
The concept of “cloud” becomes a common metaphor for an Internet accessible infrastructure, e.g. data storage and computing hardware, which is hidden from users. Cloud computing makes data truly mobile and a user can simply access a chosen cloud with any internet accessible device. In cloud computing, IT-related capabilities are provided as services, accessible without requiring detailed knowledge...
This paper introduces a new and separated market for the trading of Demand Response (DR) in a restructured power system. This market is called Demand Response eXchange or shortly DRX, in which DR is treated as a virtual resource to be exchanged between DR buyers and sellers. Buyers - including the Transmission System Operator (TSO), distributors, and retailers - need DR to improve the efficiency and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.