The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of network systems, many of our daily life activities can be performed via the Internet. Online shopping is one of the most common of these activities, which include group buying behavior. Group buying is a trading way, which is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain...
We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim...
In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is...
In recent years, counterfeiters have become a menace to industry worldwide. This problem is not specific to certain products or countries. More and more RFID applications to solve malicious behaviors have been presented. However, these RFID applications still existed some disputes and not conform to EPCglobal Class 1 Generation 2 (C1G2) standards. Most techniques are not suitable for on-line automatic...
The dynamic identity based authentication was a worth researching issue in the mutual authentication. In 2011, Sood et al. proposed a secure dynamic identity based authentication protocol for multi-server architecture to improve Hsiang and Shih's protocol. However, we find that Sood et al.'s scheme lacks of the authentication between server and user. In this paper, we propose an improved scheme to...
Recently, Chen et al. proposed an anonymous authentication scheme for mobile pay-TV, they claim that their scheme can defend against reply attacks, off-line password guessing attacks, impersonation attack, forgery attack, man-in-the-middle attack, and insider attack. In this paper, we show that Chen et al.'s scheme is still vulnerable to off-line password guessing attacks and fails provide mutual...
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
In recent years, as RFID reader equipments have been widely deployed in handled devices, the security problems between mobile reader and RFID server are important obviously. In this paper, under the assumption of that the communication channel between RFID server and RFID reader is not secure, we propose a novel scheme conforming EPC C1G2 standards which is with low implementation cost. Benefit from...
In recent years, RFID (radio-frequency identification) system has widely used owing to its convenient and efficiency in many applications. In this paper, we propose a novel scheme that the market membership can use the mobile reader to query products information and make a secure transaction through cash register. There also can use the accumulated digital coupon to redeem prizes with the server....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.