The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite many advantages of Identity-based Public Key Cryptography (ID-PKC) in removing the certificates of public key over traditional Public Key Infrastructure (PKI), there are some problems related to key escrow property and the need for a secure channel to transmit the private key to the user. A Certificateless Public Key Cryptography (CL-PKC) retains the efficiency of ID-PKC while it solves the...
Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think over it for security perspective. Sensor network works...
This paper studies the incompatibilities issues on deploying IPSec Encapsulating Security Payload (ESP) in providing end to end security between heterogeneous IPv4 and IPv6 networks. The presence of IPv4/IPv6 translation gateway violates the TCP/UDP intrinsic functionalities due to the translation of the IP addresses in IP packets. We address these interoperability issues by modifying IKE negotiation...
Aiming at the problems of implementing the conventional IKE authentications such as pre-shared key and certificate-based Public Key Infrastructure (PKI), this paper proposes a new certificateless IKE authentication scheme. This scheme uses bilinear pairing to structure the framework of certificateless IKE authentication, solves the end to end IPSec security by removing the requirement of both nodes...
The presence of IPv4/IPv6 translation gateway provides transparent routing mechanism to IPv4-only nodes and IPv6-only nodes which trying to establish communication from disparate address realms. However, the mechanism breaks TCP/IP intrinsic functionalities that results in IPSec cannot be applied in this environment. The existing solutions to address the compatibility issues between translation gateway...
The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.