The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electronic payment protocols play a vital role in electronic commerce to ensure the security of transaction process. Current electronic payment protocols based on complex mathematical problems will be vulnerable facing a quantum computer. In order to enhance the security against quantum computers, quantum cryptography is introduced into electronic payment protocols. Although the quantum cryptography...
Automatic protocol reverse engineering for application protocol is becoming more and more important for many applications such as application protocol analyzer, penetration testing, intrusion prevention and detection. However, many techniques for extracting the protocol message format specifications of unknown applications often have some limitations for little priori information or the time-consuming...
The birefringence of fiber quantum channel is compensated for without a reference optical beam always in an interrupt way. We propose and demonstrate a scheme of continuous active polarization compensation based on the feedback of the quantum bit error rate. Two experiments with and without compensation are performed in lab and the records of sifted key rate and quantum bit error rate prove that the...
In space-based networks, the data relay satellites can assist low-earth-orbit satellites in relaying data to other satellites or the ground station and improve the real time system throughput. To take full advantage of transmission resource of the cooperative relays, this paper proposes a multiple access and resource allocation strategy, in which relays can receive and transmit simultaneously according...
According to the problem of low efficiency of the network transmission system based on TCP in the case of large time delay and loss rate, this paper proposes an efficient method for network transmission system based on digital fountain. The principle of the digital fountain is described and a new system is designed and implemented on the basis of Raptor Codes and UDP. The results are given and indicate...
We report a complete experimental realization of measurement device independent quantum key distribution system with decoy method, which closes loopholes in both source and detection. 25-kbit secure key is generated over a 50-km fiber link.
How to effectively manage network resources, compute occupation of the network resources and monitor people's online behavior has become pressing needs. On the other hand, some new IPv6 resources have emerged and how to make users access these IPv6 resources easily also becomes an urgent problem. In this paper, a flow statistics and network access control system has been proposed which realizes the...
Spurred by the remarkable development of VoIP technology, applications of real-time voice communication has come into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VoIP software, and embedded VoIP is one of these blind spots. The VoIP application in this paper sets the hardware foundation on ARM9 embedded platform, adopts SIP...
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some anti-Bit Torrent companies even launch targeted attacks against the seeds. This paper proposes a batch mechanism for proper functioning of the seeds. It applies symmetric-key encryption and chunk mixing to plain...
Vehicle network is popular gradually. For more security in vehicle network, a trusted AAA (Authentication, Authorization and Accounting) environment for vehicle network must be established. The paper proposes an approach to establish such an environment using combination of two next generation AAA protocols, PANA (Protocol for carrying Authentication for Network Access) and Diameter. The ability of...
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of information and applications about mobile devices becomes an exigent problem. This paper proposes a secure authentication and authorization protocol for mobile devices. The protocol employs...
In the paper, an FPGA (field-programmable-gate-array) based industrial Ethernet slave communication controller is proposed. The slave communication controller is compatible with a custom communication protocol and will be used in NC (numerical control) system. A distributed clock which is integrated in the slave controller and synchronizes to the system clock provides a precise time for each device...
The source routing (DSR) protocol is a commonly applied protocol in ad hoc network. As the expansion of network, the efficiency of DSP protocol is on the decline due to the increasing network complexity and overhead. To enhance the performance of DSR, release network congestion, balance network energy and improve scalability, this paper has introduced modification to the outgoing package structure...
The trusted network connect (TNC) is based on the double concepts of integrity and identity. The policy enforcement point (PEP) in TNC architecture is deeply studied and powerful broadband remote access server (BRAS) is also applied into the architecture. The new BRAS model is able to set up access control rules in accordance with the level of trust, filter traffic according to filtering rules and...
In this paper, a novel probabilistic computational reputation based trust model is firstly introduced, which has the property of separating reputations between providing services and giving feedbacks. And then a topology adaptation protocol for unstructured P2P overlays is proposed based on this trust model. The basic principle of this adaptation protocol is that peers with higher service and feedback...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.