The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless communication is an indispensable tool in our daily life. Due to the open nature of wireless channels, wireless communication is more vulnerable to attacks than wired communication. Security is paramount in wireless communication to overcome these attacks. A reconfigurable convolutional encoder/decoder based physical layer security mechanism, named ReConv, is proposed in this paper. ReConv...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
Aimed at security issues in collaborative process planning system, a multi-level and dynamic access control (PPMLDAC) model was proposed for collaborative process planning based on role based access control (RBAC) model. A multi-level permission model was discussed on the basis of product and task decomposition level structure. New concepts of permission and permission assignment were defined for...
In this article, we propose a simple remote user authentication scheme using smart cards. This scheme has the following features. First, it does not require any password or verification tables. Second, it can withstand the message replay attack. Third, any legal users can arbitrarily choose and change their own passwords at will. And finally, the password of a user is not revealed to the server. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.