The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Group Key Agreement(GKA) protocol provides a set of participants with a shared common key to secure a subsequent communication. Many protocols based on ring structure have been proposed after Steiner et al.'s initial and seminal work called GDH. The number of communication rounds of these protocols is at least equal to the number of participants. In this paper, we propose a round-optimized authenticated...
Studying the features of network traffic is a necessary method in many applications such as managing and monitoring the network, detecting network attack etc. Due to the non-stationary and random characteristics of the traffic signal, Hilbert-Huang Transformation (HHT) is an effective method in signal processing. However, endpoints effect comes subsequently in HHT. In this particular case, the paper...
Heartbeat mechanism is widely used in designing high availability distributed system, while publish-subscribe architectural style has recently emerged as a promising approach to build a NIDS cluster with high dynamism and plenty of computational resources. In comparison with the requirements of general distributed computing, frontend in NIDS cluster cannot redistribute tasks on nodes failure and parallel...
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But security and trust have also become urgent problems for a P2P network due to its openness and anonymousness. Most of the current schemes rely on some trust models, but the research in systematic...
Mobile ad hoc network is a self-organized network made up of mobile devices. It is also often termed an infrastructure-less, spontaneous and dynamic network. Due to the temporary cooperation among nodes, and no enough knowledge between each node in advance, it is difficult to establish trust in ad hoc network. In this paper, a novel cluster-based trust model for ad hoc networks was presented and an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.