The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a condition-based location authentication protocol for mobile devices to authenticate users' location claims. This protocol collaborates with other neighboring mobile devices to generate the trusted proofs. This protocol does not require any extra equipment built in mobile devices, thus, it is easy to use and deploy. Through the security analysis, our protocol is more secure...
ZigBee network is a restricted wireless sensor network, and it has wide range of extensions. To solve the interconnection problems between ZigBee networks and IP networks, we propose an approach called DTN based Interconnecting ZigBee Network (DIZN), present the architecture and hierarchy communication protocol of DIZN system, study the main functions of the communication process in DIZN modules,...
Peer-to-peer networking is a popular topic for network researchers. A fundamental step before digging into understanding peer-to-peer network behavior is to collect a sufficient amount of peer-to-peer traffic traces. However, it is not really easy to obtain traces. Due to privacy concerns, researchers usually have to either sign non-disclosure agreements or choose to use anonymous/obfuscated traces,...
Security issues play an important role in modern communication worlds. Via distrusted networks, exchanged messages need to be encrypted by a session key for security requirements. Session keys are preferred to be generated by communication parties, and how to authenticate the other communication party is an important problem needed to be solved. In three-party encrypted key exchange (3PEKE) protocols,...
A Three Layer Multimedia Sharing (TLMS) for managing access right of user in a P2P network is proposed in this paper. The features of TLMS include: 1) a novel DRM scheme for P2P networks, 2) a digital content protection without the need of an on-line server, and 3) low communication and computation cost. In addition to introducing the operation of TLMS model, we also compare its performance and security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.