The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, various Digital Right Management (DRM) schemes have been proposed to protect and manage access rights of digital contents. Nevertheless, most DRM schemes do not care for protecting user privacy so the user's private information is easily compromised. To solve this problem, Zhang et al. proposed a license management scheme with anonymous trust for digital right management. However,...
So far, engineers have proposed many authentication protocols to repair drawbacks of GSM system. Among them, Peinado's method can solve those and provide an anonymous channel for mobile users, an intruder therefore is unable to trace the identity and the location of the user. However, we find that authenticating VLR does not be performed at the first time when MS joins into a new visiting VLR to ask...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
For telematics applications, entity authentication between vehicles and roadside units (RSUs) with vehicle anonymity plays an important role on providing security and privacy. In 2009, Yim, Choi, and Kim proposed an anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) for communications between vehicles and RSUs. The Yim-Choi-Kim scheme employs a traceable ring signature with t-times...
In some applications of WSN, each node can communicate with the base station, if each node communicates with base station directly, there are will a lot of duplication of information and cause waste of nodes' energy. For this reason, we put forward Data Query Protocol Based on Minimum Spanning Tree (QPMST) , QPMST protocol can create a minimum spanning tree with sink as root and other nodes as descendants,...
To effectively implement fair use and rights transfer of digital content in DRM(digital rights management) system, a usage control protocol model MUCON(Multi-UCON) using encryption, digital watermarking technology and traitor tracing technology based on UCON(usage control) is proposed, whose characteristics are feature binding, flexible authorization, traitor tracking, and off-line control. Meanwhile,...
“Push-to-talk over Cellular” (PoC) which is wireless technology and is used on mobile telecom network can enable cell phones capability of one-to-many communications, as the walkie-talkie. PoC is a new potential communication service using cellular network without the defect of walkie-talkie limited communication distance. In this paper, the performance of today's PoC is evaluated,...
Group key agreement based on elliptic curve at ad hoc networks is studied. In order to meet the demand of efficiency and security, an improved key exchange scheme based on elliptic curve is proposed in this paper. In the scheme, elliptic curve cryptosystem and digital signature algorithm in elliptic curve field are combined to make a group key. The key is agreed on within all members who would participate...
Clustering technique is an effective topology control approach which can improve the scalability and lifetime in wireless sensor networks (WSNs). LEACH is a classical clustering algorithm for low energy scheme, however, it still have some deficiencies. This paper studies LEACH protocol, and put an Improved LEACH protocol which has more reasonable set-up phase. In the cluster heads election phase,...
On the basis of interference model, the article puts forward a self-adapting routing strategy of Wireless Mesh Network, which can significantly improve the efficiency of the routing by choosing a minimum interference path. Due to regularly-distributed self-adapting adjustment and load balance, the routing can adapt to the dynamic network environment. The simulation shows that IBAR can significantly...
In this paper, based on requirements of wireless Mesh network Multi-service and high speed, Is proposed based on more access control technology and the QoS control technology of new wireless resource allocation methods of the upward, To better solve the uplink bandwidths business concurrently, And both to delay and bandwidth requirements, improving the bandwidth of the system. Finally, simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.