The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported by the mobile devices. A P2P device becomes a group owner for a set of client devices forming a P2P Group. All devices in the P2P Group then communicate to each other and connect...
Privacy, Anonymity, pseudonymity are the debatable terms which on one angle restrict the rights but on other angle open doors for malicious activity.This paper proposes design for a pseudonymised communication which is optimal solution for the privacy issues, where the real identity is hidden from the outside world by using blind signature in a different way of group communication.The protocol is...
Recently, chaos based cryptography has attracted significant attraction of the researchers due to their simplicity of implementation, complex behavior and extreme sensitivity to initial conditions. In this paper an efficient technique to introduce security at physical (PHY) layer is proposed in 802.11i design to provide security in Medium Access Control. Since it does not emphasize on availability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.