The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud was visualized as the authentic elucidation for rising storage space and service expenditure for Information Technology Applications. Outsourcing the data to cloud storage servers ease the client accountability by facilitating stumpy cost, secure, locality independent platforms and scalable resources. With the proliferation of cloud technologies, outsourced data is scrolling among the nodes,...
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate denial-of-service (DoS) attacks. Through simulation, proof-of concept implementation and experimentation in testbed and realworld Internet paths, we demonstrate that standard...
In real life, we often care about the membership in groups but may only know the identity of the group, rather than its members. This paper proposes and describes a new SIP membership event package, which deals with dynamic groups of event-generating entities. We present the event package concepts and show its usefulness in several application examples. The package allows tracking changes in membership...
Here we propose a wireless communication based railway information system will satisfy the requirements of next generation railway information system (RIS). Here we propose the overall implementation scheme for updating running train information in railway information system using wireless technology. The paper aims at enabling deployment of innovative, cost-effective and interoperable wireless communication...
Key management is a decisive part for security in wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the number of sensor node is huge. Recently, a random key pre-distribution scheme is proposed as an efficient solution for sharing keys among sensor nodes to reduce the length of shared key and avoid unnecessary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.