The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
In recent years, issues of Wireless Sensor Networks (WSNs) have been widely studied. The energy is limited in WSNs. However, it always takes much energy to achieve highly accurate time synchronization. In this paper, a Spanning Tree-based Energy-efficient Time Synchronization (STETS) strategy for WSNs is proposed. In STETS, only a small number of sensor nodes in the WSN have the privilege to send...
With RFID applications being used more widely, their security risks are growing. Especially, there are many threats in the security of tags in RFID system. Due to their physical structure, plenty of vulnerabilities exist in memory bank and simple communication protocols. In this paper, we analyze the vulnerabilities of memory banks, detail the treats of the vulnerabilities in the cases of different...
Proximity-based mobile social networks (PMSNs) are a novel type of social networks, where mobile users can choose potential friends in vicinity by comparing the similarity degree between their private attributes and make new connections through the WiFi/Bluetooth interfaces on their mobile devices. Since users' personal attributes usually contain some sensitive information, users may have increasing...
Proximity-based mobile social networks (PMSNs) are becoming increasingly popular in recent years with the explosive growth of mobile devices, where a user can find a best matching friend in vicinity through profile matching. However, the matching process calls for the publication of users' personal information, which conflicts with users' growing privacy concerns about revealing their profiles to...
Making new social interactions with other users in vicinity is a crucial service in Proximity-based Mobile Social Networks (PMSNs), where a user can find a best matching friend directly through the Bluetooth/WiFi interfaces built in her mobile device. In existing work for such services, users have to publish their interests to do the matching. However, it conflicts with users' growing privacy concerns...
This paper introduces UI Portals, a novel approach to help users share their off-the-shelf applications' user interfaces on traditional and multi-user interactive devices among various platforms. Users can choose an application window or select parts of the window to share. In addition to the traditional single-user mouse-and-keyboard interaction, we provide support for simultaneous interactions on...
Low energy neighbor discovery, group formation, and group maintenance is a fundamental service in mobile sensor networks. Traditional solutions consider these protocols separately. In this paper, we introduce WiFlock, an energy-efficient protocol that combines discovery and maintenance using a collaborative beaconing mechanism. WiFlock combines a coordinated synchronized listening and evenly-spaced...
Based on SD memory card, the communication & storage system of the embedded portable spectrometer was designed, so the spectrometer can save data and change the analysis model files. In the system, SD card was used to store data files, and the communication function was designed by using serial port to send the file and command and receive the file. So the system can be used to accomplish uploading...
A project of mobile value-added service based on P2P is proposed. In this project, wireless devices can build a P2P network dynamically and they can access and transmit information point to point. The idea will adapt to the 3G wireless network and it will become a effective solution for mobile value-added services on 3G. Utilizing JXTA and J2ME, a platform based the project is realized. The module...
Recently, Tsai et al. have proposed a multi-server authentication protocol. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Tsaipsilas protocol does not provide perfect forward secrecy and is susceptible to a Denning-Sacco attack and server spoofing. We then present an enhanced...
RACNet is a sensor network that monitors a data center's environmental conditions at high temporal and spatial resolutions. The data RACNet collects can improve the energy efficiency of data centers, currently one of the fastest growing energy consumers in the U.S. RACNet overcomes the challenge of reliable and low-latency data gathering from dense networks deployed in harsh RF environments through...
Peer to peer systems are distributed systems, decreasing system load is important for improving the scalability of systems. Caching is always used to achieve load balance in structured p2p systems currently, but none of the current caching algorithms take system load into consideration. We proposes a caching model for decreasing system load in structured peer to peer systems, describes how peer uses...
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305(2006)], proposed by Lee, Lim and Yang, recently were indicated to be insecure against the authenticator Trentpsilas attacks [Phys. Rev. A 75, 026301(2007)]. In this paper, two novel efficient protocols of quantum direct communication with authentication are presented by utilizing four kinds of Pauli operations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.