The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over recent years the depth to which we have grown to rely on networked computer systems as part of the critical national infrastructure has become ever more apparent. Concern over difficulties caused by accidental failures has led to a realisation of the potential for damage that could be caused by targeted attacks and cyber warfare. Current approaches to addressing these problems have tended to...
In multihop networks such as mobile ad hoc networks (MANETs), a node can misbehave by selfishly dropping others' packets to save battery life. This selfishness or misbehaviour can disrupt the whole network functionality and can severely degrade network performance. Reputation based models have been developed to discourage node misbehaviour. However, these models are vulnerable to whitewashing attacks...
Currently there are a range of digital devices and the trend is moving us closer to an increasingly interconnected world. However one of the current limitations is that device usage is location dependent. For example, when you are in your home environment and your PDA, which contains MP3s, resides in your work environment, there is no mechanism to enable you to use the functionality it provides. Mechanisms...
Recent advances in home networking devices and the increase in users connected to the internet, has allowed "home automation" to gain more attention. Home automation is the process of accessing and controlling home devices from remote locations across the Internet. Today, modern technology has reached a point in which computing devices are common in every facet of our life. We encounter...
We are living in the age of electronics where a vast range of devices-from small handheld mobile devices to super mainframe computers-have become commonplace. We are experiencing a move towards the vision suggested by Mark Weiser of the ??computer everywhere,?? and increasingly use computers as an essential part of our daily lives. With the advancement in electronic and networking devices at home...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
This paper presents a practical and efficient protocol to support a common Internet-based e-commerce activity—fair document exchange between two parties. This protocol incorporates a novel RSA-based method for the off-line recovery of a document decryption key of a party. The principal idea for such key recovery is based on a verifiable and recoverable encryption of the document decryption key. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.