Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Monitoring and tracking of IP traffic flows are essential for network services (i.e. packet forwarding). Packet header lookup is the main part of flow identification by determining the predefined matching action for each incoming flow. In this paper, an improved header lookup and flow rule update solution is investigated. A detailed study of several well-known lookup algorithms reveals that searching...
A collision-free consensus algorithm with leader tracking for multi-agent systems is presented. Virtual force is introduced for avoiding agents' inner collisions, and a method for choosing virtual force function is proposed. It is supposed that this kind of force is only effective when the distance between two agents is beyond a safe region. It performs repulsion function when the distances among...
Multiple Channel Design (MCD) has been adopted widely in wireless networks to increase throughput and reliability with relatively less energy consumption. Due to physical restrictions of sensor nodes, applying multiple radio channels in sensor networks poses significant challenges, particularly on energy consumption. To address such challenges, we propose an energy-aware MCD scheme called SmartChannel...
The NAC (network access control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various companies and has been widely deployed in intranets. Besides intranet, mobile telecommunication networks also find NAC is required. This paper introduces the main NAC solutions in industry...
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the...
In the current Internet, hosts are identified using IP addresses that depend on the topological location of the hosts. In other words, the IP addresses are semantically overloaded since they identify both hosts and topological locations. The host identity protocol (HIP) introduces a way of separating the location and host identity information. It introduces a new namespace, cryptographic in nature,...
Comprehensive analysis on the security mechanism of EMV2000 payment protocol indicates that there is still some frangibility in EMV2000 payment systems. Based on EMV2000 transaction flow, improvement advice to enhance the security of EMV transaction protocol is put forward. The authentication information that the terminal sends to the card, the issuer sends to the terminal and the issuer sends to...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.