The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
Delay tolerant networks (DTN) are characterized by a lack of continuous end-to-end connections due to node mobility, constrained power sources, and limited data storage space of some or all of its nodes. To overcome the frequent disconnections, DTN nodes are required to store data packets for long periods of time until they come near other nodes. Moreover, to increase the delivery probability, they...
Transmission Control Protocol (TCP) carries the maximum Internet traffic, so performance of TCP largely affects the performance of Internet. However, end-to-end throughput in TCP degrades notably when operated in wireless networks, since random packet losses and packet reordering are considered as congestion. In wireless networks, due to high bit error rate and changing level of congestion, retransmission...
In mission-critical activities, each user is allowed to access some specific, but not all, data gathered by wireless sensor networks. Yu et al~\cite{YRL09} recently proposed a centralized fine grained data access control mechanism for sensor networks, which exploits a cryptographic primitive called attribute based encryption (ABE). There is only one trusted authority to distribute keys to the sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.