The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the attractive characteristics of high capacity, high-speed, wide coverage and low transmission power, Wireless Mesh Networks become the ideal choice for the next-generation wireless communication systems. However, the network congestion of WMNs deteriorates the quality of service provided to end users. Game theory optimization model is a novel modeling tool for the study of multiple entities...
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
Voice over Internet Protocol (VoIP) service has been a very popular and important application over the Internet. Recently, wireless mesh networks (WMNs) has been considered as a good solution for VoIP services due to low cost and convenience, easy deployment and larger area coverage. However, many relevant security issues have been raised for integrating IP Telephony into the existent applications...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
There are some papers on secure or anonymous routing protocol in mobile ad-hoc networks. However, due to their original design goal, most of them are vulnerable to attacks and inefficient. In fact, providing security and anonymity are critical in wireless ad hoc networks. In this paper, we present an efficient secure anonymous routing protocol for clustered mobile ad-hoc networks, which not only solves...
Firstly, we concentrate on the security of WAI Protocol in the third version of WAPI(WLAN authentication and privacy infrastructure), listing several possible attacks the protocol is liable to suffer from. Also, we do according improvement on the protocol when mentioning a certain attack. Finally, we provide a new protocol as an alternative by doing holistic improvement..
The amplification of variable regions (Fv) of immunoglobulins (Ig) becomes a major challenge in cloning antibody genes either from hybridoma cell lines or splenic B cells. When we amplified the heavy-chain variable regions (VH) gene from one hybridoma cell line which were not amplified successfully under conventional protocols, a novel method was developed to design the degenerated primer of immunoglobulin...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.