The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Researchers and engineers have paid more attention to cloud-based application systems, whose features are virtualization and services provisioning. Fortunately the technology can be just right to healthcare. Meanwhile, security has also become more challenging. Although many cloud-based RFID authentication protocols have been proposed, some of them only improve the function and performance without...
Resource constrained secure deep space Inter-Planetary Multimedia Networks (IPMNs) gathering various planetary sensor information have high requirements for energy-efficient transmission, error-resilient multimedia coding and robust content authentication. However, the joint exploration of Intra-Inter video coding versatility in signal processing domain, Signature-Hash diversity in information security...
Secure wireless communication is a challenging problem due to the shared nature of the wireless medium and the dynamic channel. Most of the existing security mechanisms focus on traditional cryptographic schemes. In recent years, features of multi-path channels, such as randomness, coherence and reciprocity, have driven researchers to exploit their potential to enhance the security of mobile wireless...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.