The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The hype over cloud computing cannot go unnoticed even as providers and users alike testify of the evident benefits. It also goes without saying that this approach to computing shares its own challenges the most echoed being security. Security concerns herein, birthed by the exposure of the cloud to different threats, continue to cast doubts on potential users and it's only befitting that such concerns...
Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized...
This paper introduces the basic concept of component technology, and its application in the software development area. By analyzing the feature of CORBA and software architecture, presents a new approach of component development, it can help developing software component.
Through the analysis of the characteristics of Bluetooth piconet and Bluetooth's security architecture, this paper gives out a scheme of group key agreement based on Diffie-Hellman key agreement protocol. It affords a method that nodes can authenticate each other in the Bluetooth piconet and defeat threats derived from Bluetooth link-level. In the last place, the feasibility of the scheme is verified.
Network Processor (NP) is optimized to perform network tasks. It uses massive parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization, dynamically topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.