The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
In this work, we maximize the secrecy rate of the wireless-powered untrusted amplify-and-forward relay networks by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). To guarantee secure communication, the destination-based artificial noise is sent to degrade the reception of the untrusted relay, and...
In this paper, we expounds a cloud model of smartphone industry, and achieved consumers actively participate in the customization services of smartphone. Through social production theory and the combination of cloud computing services, use many kinds of 3D technology, new process technology of cooperative management, e-commerce, logistics and wisdom dynamic value chain analysis and so on. Using many...
Distributed denial of service (DDoS) attack is among the hardest network problems. Among several countermeasures, packet marking scheme is promising. In these schemes, every router marks a passing packet with a probability, so that the convergence time for an attacking path can be achieved in little time, and the attack can be found in attack path reconstruction using IP traceback. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.