The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Both parties jointly construct a highly nonlinear SPN core algorithm. The paper the connotation of polymorphic cipher theory, making use of the method of self-compiler based expansion factor...
Diffie-Hellman key exchange algorithm, which is used in regular scenes base on the discrete logarithm problem, demands that typically two communication parties should struck up a lively conversation leading to a long-term dependable fellowship. A high efficiency the polymorphic key exchange algorithm is proposed that is based on the polymorphic key exchange protocol. The identity information of two...
This paper introduced a PLC-based control system in a NC wheelset assembly machine, which included the system configuration, control mode, closed-loop control technology in cylinders and communication protocol between IPC and PLC by MPI network. The PLC-based control system is feasible, and it can strengthen the system stability and improve the efficiency of products. The control system has been successfully...
For more and more data services in GPRS networks, through analysis of both the GPRS network structure and the data features of Gb port, introducing into the analysis flow of multi-level, analysis and research the network data from the bottom-up.
This article raised the traffic detection and analysis program based on more and more data services in GPRS networks. By bringing in the traffic acquisition module, data analysis and processing module, database module and WEB terminal blocks, this article achieves the function of traffic collection, analysis and processing of the GPRS.
Mobile IPv6 was the IETF proposition to support host mobility in the Internet. However, MIPv6 only defines means of managing global (macro)-mobility but does not address micro-mobility separately. This involves long handover delay and signaling load. To solve this problem, the Hierarchical Mobile IPv6 (HMIPv6) protocol has been proposed by splitting the handover management into inter-domain mobility...
Most of authentication protocols in the RFID system use the lightweight operation, such as hash function, because the tag lacks computational resources, memory, power and communication ability. The security of different protocols based on the hash function is analyzed. Afterwards, this paper finds the security drawbacks of the improved security solution proposed by Wang and presents an attack against...
HMIPv6 remedied the deficiency of mobile IPv6 protocol, reduced the delay and the amount of signaling during handover compared with the basic MIPv6. But duplicate address detection and the transmission time for the handover operation in HMIPv6 could cause high handover delay. So HMIPv6 still cannot reach the requirement for traffic that is delay sensitive, such as voice. Through the analysis of HMIPv6,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.