The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of 3G/LTE, the high precise time synchronization application used the IEEE1588v2 standard become a great demand in telecommunication. This paper firstly introduces the principle and architecture of IEEE1588v2 and the structure of Optical Transport Network (OTN). According the characters of OTN, The platform used the timing clock module is designed and analysis. Finally the practical...
A new logical method based on game to model and analyze electronic payment protocols is proposed in this paper. Strict formal analysis for Bolignano protocol is made by this new method, and Bolignano protocol is discovered non-fairness. These works indicate that the ATL logic based on game is more suitable to describe and analyze electronic payment protocols than traditional CTL.
DRM (Digital Rights Management) is a basic tool to protect digital content from unauthorized using, which is regarded as one of the most important mechanisms in content industry. In a basic scenario of DRM application, there are a couple of roles are involved, named Content Provider (CP), Service Provider (SP) and consumer Device. CP makes the digital content and distributes to SP, who will then deliver...
When the E-cash file being destroyed for some unexpected error, we cannot expect waiting for the recovery of the file, but improve the design of E-cash system such that the bank can compute the amount of E-cash the user really lost. Recoverability and untraceability (anonymous) are two obviously conflicting properties. If we give up untraceability, we can compute the lost E-cash by computing the difference...
Diverse computers interconnected via mixed network equipments are commonly available parallel architecture now, and achieve good performance/price ratio. As an important parallel communication tool, MPI system is a natural choice to support heterogeneous computing platform. The paper classifies the definition of heterogeneity into three categories, and presents the issues of them in detail respectively...
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL) protocol provides the essential ingredients of secure communications - privacy, integrity and authentication. Though it is well-understood that security always comes at the cost of performance, these costs depend on the...
TCP Splicing can be used in content-aware switches to tremendously reduce overall request latency. In order to reduce the processing latency further, we propose to off load the protocol processing onto network processors (NPs). An NP consists of a multithreaded multiprocessor architecture that can provide high throughput for packet processing or forwarding. However, off loading any protocol software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.