The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, most communications are centralized. In emergency or catastrophic situations, this could be a problem because common communication infrastructures could collapse or become unavailable. This is exactly the case of mobile communications because they depend on network infrastructures that can fail due to natural disasters, terrorist attacks or huge people agglomerations. This work proposes...
Nowadays, most communications are centralized. In emergency or catastrophic situations, this could be a problem because common communication infrastructures could collapse or become unavailable. This is exactly the case of mobile communications because they depend on network infrastructures that can fail due to natural disasters, terrorist attacks or huge people agglomerations. This work proposes...
There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation 2 (Gen2 in short) standard. The security analyses of the new born authentication protocols provide some guidelines and lessons that should be considered in the design of new proposals. In this paper, we scrutinize the security of a Gen2 based RFID authentication protocol which has been recently proposed...
Widespread adoption of RFID technology is being slowed down because of increasing public concerns about associated security threats. This paper shows that it is possible to enhance the security of RFID systems by requiring readers to perform a computational effort test. Readers must solve a cryptographic puzzle - one of the components of the Weakly Secret Bit Commitment (WSBC) sent by tags - to obtain...
A public key infrastructure (PKI) is a set of elements and procedures needed to create, store, manage, distribute and revoke digital certificates. Its main objective is to bind public keys with respective user identities assuring the uniqueness of these public keys. A PKI must guarantee the reliability of its services, assuring the timeliness of its responses and the continuity of the service despite...
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully distributed and self-organized authentication. In this paper apart from describing all the GASMAN components, special emphasis is placed on proving that it fulfils every requirement of a secure distributed authentication scheme, including limited physical protection of broadcast...
The very good ideas of the proposed "Standard for Medical Device Communication" (SMDC — IEEE P 1073), formerly known as "Medical Information Bus (MIB)", have partially been implemented within the project ALODIN of the above mentioned academic institutions. The industrial product MCARE of MedKom is a spin off of ALODIN. The paper describes the way ALODIN does and does not conform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.