The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of internet and new technology has been growing continuously, smartphone is now a necessary device that has great impact on users in various ways. Internet and smart devices have gained their success in various fields and have provided conveniences to all types of users. The flow of data is seen as a part of the internet and smart devices. Since a large amount of users rely on the...
Due to the explosive proliferation of network security breaches and threats, major study and analysis should be implemented and performed to secure the confidentiality and privacy of data transmission against intrusions and attacks. The protection of data transmission is a crucial condition, which requires secure and robust detection system to ensure data transfers without being exposed or intruded...
Several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the accessible network system. One of the most popular areas in OTP authentication protocol can be used for authenticating a user by a server. It increases security by using a new password for each authentication while the previous password scheme iteratively uses...
In this research work, we proposed a new, efficient and compact software based IPv6 packet generator, V6GEN and a new packet classification framework for IPv6 traffics, V6PCF. V6GEN is compact as packet construction support for IPv6 packets in neighbor discovery, automatic tunneling and network mobility are proposed while V6PCF is to provide a platform in designing, implementing and evaluating software...
Packet sniffing is important in network monitoring to troubleshoot and to log network activities which will benefit both the network software engineers and network engineers. In this research work, we specifically designed and implemented a new and efficient software based IPv6 capable packet sniffer, V6SNIFF. Performance analysis has been done on two different approaches which are the libpcap implementation...
In 2007, Hu-Niu-Yang put forward an improved efficient password authenticated key agreement scheme for multi-server architecture based on Chang-Lee's scheme proposed in 2004. This scheme is claimed to be more efficient and is able to overcome a few existing deficiencies in Chang-Lee's scheme. However, we find that this scheme is not as ideal as described by the authors. Specifically, the fulfillment...
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which can subsequently be used to preserve confidentiality and data integrity over an open network. Since Joux has pioneered the notion of pairing-based tripartite key agreement protocol, various group key agreement schemes have been proposed after then. In 2003, Liu et al. proposed a tripartite identity-based...
A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation and electronic voting. In 2007, Ma et al. proposed a chameleon-based deniable authenticated key agreement protocol while in 2006,...
In recent years, mobile network has evolved greatly with the existences of MANET, wireless sensor network, mobile IP, NEMO and etc. The advent of network mobility (NEMO) tends to provide seamless Internet connectivity to all the nodes within a mobile network regardless of their current points of attachment with the usage of a mobile router. Multicasting support is one of the key technologies in next...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.