Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Vehicular Ad hoc Network(VANET), an infusive area for the development of Intelligent Transportation System (ITS), is going to be a significant communication pattern in our moving life. Data dissemination is an important part of VANETs. The demand of disseminate commercial advertisements in moving cars emerges. To satisfy the demand of shopping in car, we proposed a new data dissemination scheme in...
Distributed storage platforms draw much attention due to their high reliability and scalability for handling a massive amount of data. To protect user and data privacy, encryption is considered as a necessary feature for production systems like Storj. But it prohibits the nodes from performing content search. To preserve the functionality, we observe that a protocol of integration with searchable...
In recent years, mobile data gathering in wireless sensor networks has attracted much interests in the research community. However, despite extensive efforts, many of previous work in this area lies only in theory and evaluates network performance with computer simulations, which leaves a large gap from reality. In this paper, we present the design and implementation of a general purpose, flexible...
Emerging decentralized storage services such as Storj and Filecoin show promise as a new paradigm for data outsourcing. These services tie cryptocurrency to personal storage resources and leverage blockchain technology to ensure data integrity in distributed networks. Compared to current cloud storage, they are expected to be more scalable, cost effective, and secure. In addition to the features above,...
Distributed key-value stores are rapidly evolving to serve the needs of high-performance web services and large-scale cloud computing applications. It is desirable to search directly over an encrypted key value (KV) store, as data is increasingly stored in the cloud. Encrypted, distributed and searchable key- value stores have been the focus of research, where a data owner outsources his key-value...
Under the opportunistic network environments, normal network protocols can hardly transfer data successfully and efficiently. In order to overcome this problem, many new routing algorithms have been raised pertinently. Thereinto, the Epidemic routing algorithm is a typical approach, which maintains least delay with a highest delivery ratio. However, it is a defective method for routing data as it...
In this paper, we evaluate the outage probability and bit error rate (BER) performances of a three terminal full-duplex relaying (FDR) system with non-negligible residual self-interference (RSI). By investigating the signal-to-interference-plus-noise ratios (SINRs) at the relay and the destination respectively, the exact outage probability and BER of decode-and-forward (DF) based FDR system over Nakagami-m...
Heterogeneous Wireless Network convergence has attracted the attention of researchers. Authentication and key agreement becomes more and more important in this research field. EAP-AKA (Extensible Authentication Protocol Authentication and Key Agreement) is the authentication and key agreement protocol of 3G-WLAN interworking. In this paper, it introduces the procedure of EAP-AKA protocol and analyses...
With the development of the electronic commerce (e-commerce), the untraceable electronic cash is an attractive payment tool for e-commerce, because its anonymity property can ensure the privacy of spenders. Recently, Ziba et al. proposed a new untraceable offline electronic cash system. The authors claimed that their scheme can detect a malicious consumer who spends a coin more than once. In this...
Mobile vehicles equipped with wireless energy transmission technology can recharge sensor nodes over the air. When to recharge which nodes, and in what order, critically impact the network performance. So far only a few works have studied the recharging policy for a single mobile vehicle. In this paper, we study how to coordinate the recharging activities of multiple mobile vehicles, which provide...
Secure scalar product protocol is an important fundamental protocol in secure multi-party computation. Serving as a basic building block for many other secure protocols, it is widely used in data mining, statistical analysis and scientific computation. Based on additive homomorphism public key cryptosystem, we develop a new secure scalar product protocol under semi-honest model with low communication...
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical...
Recently, the significantly increased IPv6 address length has posed a greater challenge on wire-speed router for packet classification (PC). Most conventional IPv4-based PC algorithms are no longer suitable for IPv6 PC. The performance and capacity of many IPv6 algorithms and classification devices depend upon properties of the IPv6 classifiers. However, there are no publicly available IPv6 real classifiers...
Similar to conventional NAT technology, NAT-PT gateways break traditional TCP/IP's end-to-end argument property which result in IPSec can not be applied in NAT-PT environment, and would fall flat when the pool of IPv4 addresses is exhausted. A solution by adding IP transform message, modifying the address mapping tables and session tables, using port transform strategy with inner host computer character...
Append-only file systems, with which data can only be updated in an append-only manner, are of great importance to the regulatory compliance requirements for storing immutable data. However, existing approaches fail to provide the verifiability of the append-only property of the file system in the presence of an inside attacker who can manipulate on-disk data directly, and thus are unsuitable for...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however,...
In the same way Internet standards have connected heterogeneous computing systems, we predict robot communication standards will speed research and development of teleoperated robots. In this paper, a preliminary specification is presented for interoperability among robotic telesurgery systems. This is a first step towards developing a full telerobotics protocol. One way that interoperability will...
Wireless sensor networks routing protocols always neglect security problem at the designing step, while plenty of solutions of this problem exist, one of which is using key management. Researchers have proposed many key management schemes, but most of them were designed for flat wireless sensor networks, which is not fit for cluster-based wireless sensor networks (e.g. LEACH). In this paper, we investigate...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.