The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularization of intelligent mobile phone, the applications based on LBS has been spread rapidly. But there are also some problems of safety and complexity. An ordering scheme based on LBS which adopts the near-field mobile payment way is proposed in this paper. It has advantages of convenience and payment security.
Satellite communications are used more and more widely. But this kind of communication has a lot of particular characteristics, such as long link delay and high bit error rate. Our research aimed to find out the new algorithm based on template analysis to improve the accuracy and recognition efficiency of identification.
According to the large size and strong association feature of space data, an improved BM algorithm-RE_BM (Relationship BM) suitable for space protocol identification was proposed. Firstly, the flag bit oriented Packet judging algorithm was presented to reduce the identification complexity of single-strip space data. Then, the mechanism of flag bit conversing was introduced to improve the protocol...
The satellite communications are used more and more widely. But these kind of communications have a lot of different characteristics, such as long link delay and high bit error rate. Our research aims to find out the efficient protocol between TCP and SCPS-TP transport protocol through simulation topology method.
This article introduced the principle of PPP, then carried the detailed analysis to the protocol's security mechanism, with the concrete analysis of the traditional PAP and CHAP existing in the PPP, the PPP network expose some shortage of security which is easily cracked, on this basis, finally, reached the improved security algorithm, which can enhance the security of PPP network obviously.
Radio Frequency Identification (RFID) has many perfect features such as completely non-contact, high recognition rate, bulk-storage memory, securely access and easily be integrated with existing management information system, etc. It has widely been applied in many fields especially in logistics and product quality tracking systems. The research on the application of RFID in agricultural seed quality...
UHF RFID is becoming the main stream of passive RFID applications. Reader is a key component of a RFID application system. Based on the ARM9 chip S3C2440, the UHF reader ASIC AS3990 and a battery charger 9-channel programmable DC-DC power management chip SMB122, a low-power handheld UHF RFID reader is designed and implemented in this paper. In addition to long enough read range, the power consumption...
In this paper, Universal Serial Bus 2.0 (USB2.0) host stack has been analyzed, and special emphasis on USB2.0 Driver (USBD2.0) and Host Controller Driver (HCD) in USB2.0 protocol stack is presented. At last, a particular implementation principle of U disk driver based on VxWorks real time operating system, attachment of driver and simulation of block device initialization with CY7C67300 as its Host...
For safeguarding the interests of web services transaction parties, non-repudiation mechanism need assure fairness and timeliness. The non-repudiation service implemented currently mostly does not consider the requirement of fairness and the fair non-repudiation protocols to date can not be suitably applied in real environment due to its complexity of interaction. This paper discusses the transaction-oriented...
The central processing units of centralized structure are generally overloaded, and traditional intrusion detection system cannot effectively detect unknown attacks. To overcome the above problems, a distributed intrusion detection system model is established combining neural network with distributed detection in this paper based on the self-learning and adaptive characteristics of neural networks...
Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.
MIPv6 is presented to cope with mobile problem for deploying IPv6 around the world. Petri net is utilized to model the roles of MIPv6 and generate paths for each role. According to the test purpose for the coverage of promising property, the extracted interactive relations are analyzed from each rolepsilas model. The generation of test paths from two rolespsila models is illustrated. Moreover the...
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery...
In this paper, the models which display different kinds of nondeteminsim in protocol are presented from either control flow or data flow point of view. From control flow side, the information attached is not enough for the analysis of nondeteminsim, therefore the data flow is achieved according to the description in the specification. From data flow side, data is analyzed from packet as well as field...
Extended from mobile IPv6, NEMO basic support protocol provides mobility management for whole moving networks, but results in suboptimal routing and long handover latency. When multiple MRs connect to each other and form a hierarchical nested mobile network, suboptimal problem is exacerbated. To optimize routing, access point selection(APS) solution is proposed to prevent mobile network from high...
In this paper we present empirical results from a study, examining the effects of environmental diversity on vehicle-to-vehicle link in vehicular ad hoc networks (VANET). And packet loss rate (PLR) and received signal strength indicator (RSSI) of the wireless link are measured. The results of the measurement indicate that environment affects the quality of the wireless link in VANET greatly; the average...
NEMO basic support protocol enables mobile networks preserve communication with other nodes, while changing their point of attachment to the Internet. But in nested mobile network, Pinball routing problem appears. In this paper, a route optimization solution for mobile networks based on local mobility management framework was proposed to improve the performance. By defining the operation on local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.