The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the...
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms for the class diagram and sequence diagram of UML are presented, which provide an engineering specification for the security protocol formalizing. Therefore, for verifying the confidentiality...
A wireless sensor network (WSN) may interfere with the coexistent network when it plays a part in environmental monitoring, clinical care and so on. For the sake of interference mitigation, a cooperative analog network coding (CANC) technique is studied in the heterogeneous WSN. Furthermore, an optimal algorithm named S-CANC is proposed by combining the source node selection and CANC to minimize the...
Cognitive Radio permits the secondary users to share the spectrum in the space and time domain. But only while the primary users don't occupy the spectrum, the secondary users could access. In addition to the dynamic nature of the spectrum environment, Media Access Control (MAC) spectrum access protocol design is facing several important issues. The secondary users need to determine when and which...
In this paper, we propose a location-aware relay selection (LARS) scheme based on geographical information in the distributed opportunistic relay (OR) communication system. The scheme aims to limit the contention among potential relays through dividing the whole relay selection region into some small nonoverlapping contending torus zones. If a relay lies in the specified contending zone and its local...
The end entity certificates (EECs) revocation mechanism in grid security infrastructure (GSI) adopts certificate revocation list (CRL) currently. However, CRL is an inefficient mechanism with drawbacks of "time granularity problem" and unmanageable sizes. This paper presents a new EECs revocation mechanism MEECRM (mediated RSA-based end entity certificates revocation mechanism) combined...
As wireless local area networks (WLANs) become a part of our network infrastructure, it is critical that we understand both the performance provided to the end users and the capacity of these WLANs in terms of the number of supported flows (calls). Since it is clear that video traffic, as well as voice and data, will be carried by these networks, it is particularly important that we investigate these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.