The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In advanced world, the E-Auction frameworks give the stage to offer the different sorts of auctioning with less adaptability. In normal scenario the data sharing is extreme requirement over the internet and right survey of shared data is more helpful to people and society. The sharing of information may accomplish issues like validity of information, reasonableness and insurance of data proprietor...
The mobile ad-hoc network (MANET) contains various types of mobile nodes. The Trust of the node is an important issue for deciding the behavior of the node. The behavior of the node regards maliciousness of the node. Trust management for MANETs is an active research area. MANET is a collection of nodes that are self-configuring. There is the absence of any centralized control. In MANET, any node can...
The Mobile Ad-hoc Network (MANET) is a volatile network, the nodes are in the movable state. The node can easily enter and exit from the network. The attacker node can easily enter into the network and affect the performance of the network. The malicious nodes are difficult to detect as any node can enter into the network easily. The detection of the malicious node is very important to secure and...
As we know user profile matching with privacy-preservation in mobile social networks (MSNs) and bring in a family of novel profile matching protocols. We first intend an explicit Comparison-based Profile Matching protocol (eCPM), that runs between parties, initiator, and a responder. It is to propose modified an implicit Comparison-based Profile Matching protocol (iCPM) which allows the initiator...
In a cluster the nodes are connected via a shared network to each other. With the increasing popularity of clusters being deployed over widespread networks that have access to internet, there is an alarming increase in threats to security of programs running on the clusters. We are using Message Passing Interface as it is a widely accepted protocol for parallel computing. The version being considered...
The emergence of wireless sensor networks (WSNs) in last few decades, increases the efficiency and accuracy of large number of applications such as defense, habitat monitoring, industrial and many more. The efficiency and accuracy of WSN is largely affected by the different security attacks and emergence of new attacks. Therefore, it is necessary to analyze and countermeasure the new ways of security...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats and attacks. The different attack reduces the capability of WSN, to work for long time. It largely effects on resource consumption of network and increases the energy consumption, delay, and reduces the throughput. Among all the different WSN security attacks, jamming attack affects largely on performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.