Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Based on fresh random challenge response authentication and key agreement, access control, priority control mechanisms, this paper puts forward a security protection communication protocol to guarantee the data transmission security of electricity acquisition terminal and the acquisition host. From the angle of attack detection, this proposed protocol was proved that can resists replay attack, counterfeit...
The Transport Layer Security (TLS) protocol is by far the most widely deployed protocol for securing communications and the Internet Engineering Task Force (IETF) is currently developing TLS 1.3 as the next-generation TLS protocol. The TLS standard features multiple modes of handshake protocols and supports many combinational running of successive TLS handshakes over multiple connections. Although...
Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions, which refers to the social interactions among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their Smartphones or other mobile devices. MSNP applications can provide users more opportunities to discover and make new social interactions within proximity area, e.g., Airports,...
The key management is important issues in multicast communication of satellite network. This paper presented a threshold value -based group key management scheme. In the scheme, ground control center is designed as ID registration authority. A group key share distributed center was created through choosing n satellites which can keep long time visible. The performance of group key generation algorithm...
The global mobility network can offer effective roaming services for a mobile wireless user between his home network and a visited network. For the sake of privacy, user anonymity has recently become an important security requirement for roaming services, and is a topic of concern in designing related protocols such as mutual authentication and key agreement. In this paper we present a generic construction,...
In cognitive radio systems, secondary users should continuously sense the licensed spectrum in case a primary user starts to transmit. Whether or not the secondary users can sense the spectrum during the secondary communication is an attractive problem. In this paper, we consider a particular wireless cooperative communication system acting as a secondary system, and demonstrate that by exploiting...
In this paper, we study the asynchronous cooperative diversity schemes employing the amplify-and-forward (AF) protocols over the frequency-selective channel. We consider three time-division-multiple-access (TDMA) based cooperation protocols and derive the corresponding pairwise error probabilities (PEP). From our analysis, it is seen that of the paths from the source to relays and from relays to the...
Cooperative network with the amplify-and-forward (AF) protocol is attractive for its simplicity and nonloss of soft information. In this paper, we analyze relay region where cooperative transmission with the AF protocol outperforms direct transmission. In high SNR regimes, we derive an analytical expression of the relay region, and propose a geometric explanation for uncoded binary phase shift keying...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.