The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional cloud stacks are designed to tolerate server or rack-level failures, that are unpredictable and uncorrelated. � Such stacks successfully deliver highly-available cloud services at global scale. The increasing criticality of cloud services to the overall world economy is causing concern about the impact of power outages, cyber-attacks, configuration errors, or other causes of datacenter...
This paper proposes a cloud-based architecture for enhancing the performance and capacity of vehicular networks of potentially multiple different wireless technologies. The approach addresses the well-known limitations of today's vehicle-initiated as well as base station-assisted handoff solutions; the former is reactive, therefore slow and inefficient, while the latter is mostly limited to within...
Abstract- In IEEE Standard 802.16e, there are two privacy key management editions PKMv1 and PKMv2. PKMv2 as a supplement is used to improve the IEEE standard 802.16e security, in which EAP as an optional authentication protocol besides RSA is involved in several authentication modes. However how to use EAP methods in different authentication mode has not been detailed. In this paper, common EAP methods...
Most information systems using C / S and B / S architecture, cannot meet the real-time data acquisition and transmission. Based on the design of a smart home, it designs an interacting system capable of real-time data aggregation and analysis. Function modules of the system are given a specific design, and describe the system implementation process
Aiming that now most of Web 1.0 websites are not updated to 2.0 because of cost and time, the paper designs a architecture of Web 2.0 Launch Tool + Management Server to update Web 1.0 website to 2.0 more easily and quickly, which was developed with asynchronous interaction, no refresh of AJAX and Connection pool technology, XHR and DWR. The reality proves this system is very convenient. The technology...
Presently Research of Smart Home System usually adopts C/S Structure that causes lower system flexibility. A design of smart home system based on B/S mode proposed increasing system flexibility and achieves a Thin Client. Design a smart home system, the system function modules are given a specific design, and describes the system implementation process
According to the current situation of multimedia instruction and application of campus network in new local colleges, this paper analyses problems and technical limitations in the process of implementing multimedia teaching; At the same time, combined with new requirements of multimedia instruction using network, it proposes the view that local colleges campus network should possess the ability of...
IEEE 802.16e Standard as the new released version, renew the security scheme PKMv1 of IEEE802.16d into PKMv2. This paper analyzes the EAP_based authentication mode of PKMv2, and proposes an improved EAP_TTLS _SPEKEY method for EAP_based authentication patter. The improvement has enabled the EAP_TTLS_SPEKEY to overcome the engrained vulnerability of the Man in the Middle attacks in the original EAP_TTLS...
Re-Authentication is required after the initial authentication in IEEE 802.16e to guarantee the security of the keys. We analyze the key factors in the re-authentication under the 5 authentication modes. And aiming at the RSA + Authenticated_EAP mixed mode, the re-authentication mechanism is designed. A PAK/PMK_counter is added into the PAK and PMK buffer, which can adjust the keys' lifetime to increase...
Location-aware is becoming an important aspect of mobile computing. A core problem in location-aware service is the determination of physical location. For applications in open, outdoor areas, the Global Positioning System is a common choice. Although GPS offers near-worldwide coverage, its performance degrades indoors and in high-rise urban areas. By using signal strength, it is possible to locate...
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.