The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness against many attacks. Also, the Window technique integrates the Time-Stamped which strongly eliminates the anti-replay attack. It will also control...
IP-based Wireless Sensor Networks (IP-based WSNs) combine IPv6 technology with WSNs to create a global sensor network infrastructure. However, wireless radio access and Internet connectivity make end-to-end security urgently needed by security critical WSN applications. Transport Layer Security (TLS) is considered as a suitable solution to ensure such security. However, the certificate-based mechanism...
The Future Internet that includes Real World Objects and the Internet of Things together with the more classic Web pages will move communications from a node-centric organization to an information-centric network allowing new paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a network of information designed to enable more powerful...
Thanks to the advances in communication and wireless technologies, many personal devices are able to interact within a new type of network called home networks (HNs). However, we need to protect the privacy of the users and secure their data during transfer. A number of works has been carried out recently to allow userspsila authentication within these networks using a biometric approach. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.