The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
The Internet of Things (IoT) will interconnect billions of devices, denoted as “smart objects,” deployed pervasively, which will be extremely heterogeneous, in terms of hardware (i.e., computational power and available memory), software (i.e., operating systems, applications), and communication interfaces. Traditional Internet actors, such as personal computers, mobile devices, and cloud servers,...
The Internet of Things (IoT) aims at connecting billions of devices in an Internet-like structure. This gigantic information exchange enables new opportunities and new forms of interactions among things and people. A crucial enabler of robust applications and easy smart objects’ deployment is the availability of mechanisms that minimize (ideally, cancel) the need for external human intervention for...
Many applications for ad-hoc networks are based on a multicast communication paradigm, where a single source sends common data to many receivers. In these contexts, it is possible to efficiently secure the multicast communications by leveraging on a common secret key, denoted as “group key”, shared by multiple users. In this paper, we propose a novel centralized approach that efficiently addresses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.