The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Utilizing evolutionary algorithms to achieve a low axial ratio of a circularly polarized microstrip antenna over a wide bandwidth and optimal impedance matching is the main aim of this study. A circularly polarized cross aperture coupled microstrip antenna using a 50Ω microstrip feed line is designed. A software simulation program (CST microwave studio) is used to design and compare the performance...
Many security protocols have been developed to handle security problems in various circumstances. However, these protocols are often limited to client/server architectures and cannot answer special application and network's needs such as securing audio/video applications or transactions between several nodes in wireless mesh networks. In this paper, we propose extending the Transport Layer Security...
TLS (Transport Layer Security) is the de facto standard that provides end-to-end secure communications with mutual authentication between two communicating entities. TLS has been designed to run from end to end, in which case intermediate hosts are considered as man in the middle attacks. Recently, TLS is widely deployed by applications and networks to exchange keys between more than two entities,...
Natural disasters represent a typical large-scale dynamic environments. As governments are more and more relying on sensors to monitor natural disasters, many related research problems have to be tackled, in particular the sensors relocation. In this paper we propose to plan the sensors relocation in a virtual geographic environment (VGE) which is synchronized with the real environment (where the...
Current authentication and security protocols provide authentication services using either shared secret keys or certificates and public key infrastructures. They usually involve using random values and nonce to prohibit replay attacks and to generate fresh keys per each session. The Challenge-Response authentication mechanisms are the predominant access method for authentication and access control...
The session initiation protocol (SIP) is rapidly becoming the dominant signalling protocol for calls over the Internet. It has quickly made large inroads into the voice over IP (VoIP) market. SIP is an application-layer control operating on top of a transport protocol and allows to create, modify, and terminate sessions with one or more participants. With security considerations, these operations...
Nowadays, the TLS protocol (transport layer security) is the de facto standard for securing transactions across the Internet. It provides end-to-end secure communications with one way or mutual authentication between two network nodes. However, this protocol suffers from serious vulnerabilities because classical software implementations are not trusted and allow the use of falsified credentials (e...
Wireless and IP networks requires extensible, fast and flexible authentication and key-exchange protocols, addressing wireless environment constraints, such as scarce radio resources and limited computational power on the client. Many mobile and wireless communities have agreed to adopt security protocols originally designed for wired networks, as authentication methods for their entities and for...
Virtual private networks (VPN) technology allows users to remotely access their enterprise networks through a public network such as Internet. To accomplish secure remote accesses to private networks, many security protocols including transport layer security (TLS) have been introduced. TLS is an IETF standard allowing secure channels between two applications conversing over the Internet as well as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.