The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Monitoring and tracking of IP traffic flows are essential for network services (i.e. packet forwarding). Packet header lookup is the main part of flow identification by determining the predefined matching action for each incoming flow. In this paper, an improved header lookup and flow rule update solution is investigated. A detailed study of several well-known lookup algorithms reveals that searching...
A collision-free consensus algorithm with leader tracking for multi-agent systems is presented. Virtual force is introduced for avoiding agents' inner collisions, and a method for choosing virtual force function is proposed. It is supposed that this kind of force is only effective when the distance between two agents is beyond a safe region. It performs repulsion function when the distances among...
Multiple Channel Design (MCD) has been adopted widely in wireless networks to increase throughput and reliability with relatively less energy consumption. Due to physical restrictions of sensor nodes, applying multiple radio channels in sensor networks poses significant challenges, particularly on energy consumption. To address such challenges, we propose an energy-aware MCD scheme called SmartChannel...
The NAC (network access control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various companies and has been widely deployed in intranets. Besides intranet, mobile telecommunication networks also find NAC is required. This paper introduces the main NAC solutions in industry...
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the...
In the current Internet, hosts are identified using IP addresses that depend on the topological location of the hosts. In other words, the IP addresses are semantically overloaded since they identify both hosts and topological locations. The host identity protocol (HIP) introduces a way of separating the location and host identity information. It introduces a new namespace, cryptographic in nature,...
Comprehensive analysis on the security mechanism of EMV2000 payment protocol indicates that there is still some frangibility in EMV2000 payment systems. Based on EMV2000 transaction flow, improvement advice to enhance the security of EMV transaction protocol is put forward. The authentication information that the terminal sends to the card, the issuer sends to the terminal and the issuer sends to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.