The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information. It is a further challenge to honor requests for a required quality of information when selecting information...
The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required quality. The information quality implicitly accounts for the level of security...
Channel surfing is an effective method to prevent jamming attacks in wireless communications. In traditional channel surfing schemes, two parties have to negotiate beforehand, in order to agree on the channel switching sequence. However, the negotiation process itself is vulnerable to jamming attacks. In this paper, we propose a novel channel surfing method without relying on such negotiation. Taking...
The domain name system (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. In this paper we propose a formal model for analyzing the name dependencies inherent in DNS, based on protocol specification and actual implementations. We derive metrics to quantify the extent to which domain names affect other domain...
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys, authenticate all communications with cryptographic functions, and also apply secure information aggregation schemes or hop-by-hop filtering methods. However, these security measures can take considerable overhead in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.