The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A flexible and hydrogel-swelling-based actuated electrode array for cochlear implants was developed to bridge the gap between commercially available flexible and easily implantable straight electrode arrays on one side as well as stiff and difficulty implantable pre-curved electrode arrays on the other side. Therefore, the presented array consists of a polyimide/gold thin-film electrode carrier embedded...
In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore,...
Wireless local area networks (WLAN) are increasingly deployed because of the freedom wireless communications afford and the decreasing costs of the underlying technology. Together with its higher and higher popularity, the Internet has also shown more and more weakness of wireless protocols that lead to attacks. There are a lot of efforts to improve the security of wireless network (from IEEE 802...
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.