The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking (NDN) is a clean state Internet paradigm that considers some security primitives in its original design, and one of the promising candidates for the future Internet architecture. However, it may suffer from the specific threats such as Interest Flooding Attacks (IFA). Most researches are focused on the defense against fake IFA, where the PIT resources in victim routers are exhausted...
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, the action-based access control (ABAC) model is the most suitable to control the access on Web services. In this paper, the ABAC model is introduced. Then, the security architecture of ABAC for Web services is proposed. In the...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.