The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret sharing refers to the sharing and reconstruction of a secret among a group of participants. In light of a few disadvantages of the traditional secret sharing, it is desirable to reconstruct the secret directly from the encrypted shares to protect the secret and shares during secret reconstruction. This paper develops several useful techniques for processing encrypted data. A new secure comparison...
Secret sharing refers to dividing a secret into pieces or shares and allocating the shares among a group of participants. The secret can be reconstructed only when a sufficient number of shares are combined. To protect each share during secret reconstruction, it is desirable to reconstruct the secret directly from the encrypted shares. Secure signal processing is typically based on probabilistic and...
Time synchronization is critical in distributed network system. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The “Network Time Protocol” (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. In order to reduce access frequency to...
Mobile Ad Hoc networks, which are becoming the research hotspot, have wide application in battlefield, disaster area, extraordinary session and other special environments due to their independence on any network infrastructure. In this paper, a scheme of node behavior classification was proposed based on the analysis of mobile Ad Hoc networks' own laws in practical application. Analytic hierarchy...
A secure and efficient ID-based registration protocol with user anonymity is proposed in this paper for IP-based mobile networks. The protocol minimizes the registration delay through a minimal usage of the identity (ID)-based signature scheme that eliminates expensive pairing operations. User anonymity is achieved via a temporary identity (TID) transmitted by a mobile user, instead of its true identity...
Time synchronization is one of core technologies in distributed systems and communication fields. The "Network Time Protocol" (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. NTP uses a hierarchical scheme in order to synchronize the clocks in the network. It mainly adopts a phase-locked loop technique to adjust the local clock. This paper develops...
Optical network unit (ONU) and optical line terminal (OLT) are two basic device elements in an Ethernet passive optical network (EPON). To support an optical multi-point network, the multi-point control protocol (MPCP) is being standardized in the IEEE 802.3ah task force (Ethernet in the first mile -EFM) by defining a multi-point MAC control sublayer as an extension of the existing MAC control sublayer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.