The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work concentrates on the design of an efficient and scalable group rekey method for P2P IPTV DRM system where the minimal division of right is a program. Our group rekey scheme is efficient in two aspects, less number of encryption and less individual transmission. We divide the members into three categories, namely, the fresh members, the rejoined members, and the remaining members, according...
Success of any ERP project requires the clear understanding of the various implementation facets and careful and appropriate identification of systematic QA activities to provide adequate confidence that when rolled out the system will fulfill requirements for quality and achieve envisaged business value. In this effort, we unleash details of rigorous ERP QA model designed at Ministry of Education,...
Analytical approaches based on rigorous mathematical foundation are getting more importance in service-oriented computing (SOC) research area. Defining appropriate metrics to measure service quality attributes is one of the key activities in this context which plays an important role in construction of quality service-oriented solutions. In this paper, some metrics are introduced for measuring structural...
This paper proposes a centralized model for the Indian Public Distribution System (PDS) and states its benefits over the current system. The proposed system has its Point of Sale (POS) outlets centered around an ebox 3310 MSJK device which runs an OS customized in Windows CE. This processor communicates with three different centralized databases to access different data associated with the customer...
In this paper, we propose a structure of a multichannel downstream receiver supporting four downstream channel bonding in hybrid fiber coax (HFC) networks. In addition, we show the implementation and measurement results. The structure we prupose and implement consists of a radio frequency (RF) tuner and multichannel downstream receiver, which consists of a digital filter bank and four downstream demodulators...
In today's competitive environment, for telecom service providers, estimating the cost for providing their services is becoming increasingly important. Moreover, cost estimation in the telecommunication industry becomes more difficult because of increasing indirect cost upon digital convergence, expanding multipurpose facilities, complexity of service product, etc. Nevertheless, not much seem to have...
Most network applications such as pervasive computing, grid computing, P2P etc. can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. Due to such nature multi-agent systems present potential threats in ensuring secured communication. One of the key feasible ways to minimize threats is to evaluate the trust and reputation of the interacting agents. Many trust models...
In traditional Open Systems Interconnection (OSI) layered model, many security protocols in layers are proposed to provide network security. Because security protocols among layers are lack of cooperation, system performance degrades due to security redundancy and furthermore causes system overloading. Therefore, the paper proposes a cross-layer design network security management (CLDNSM) to protect...
Web applications often use cookies for maintaining an authentication state between users and web applications, these cookies are typically sent to the users by the web applications after the users have been successfully authenticated. Every subsequent request that contains the valid cookies will be automatically allowed by the web applications without any further authentication. The cookies are used...
A logical interface is used to hide the change of network interface from the upper host IP layer and it also can be used for a multiple interfaces mobile node in PMIPv6 domain. In a MN point of view, the link-layer identifier of a logical interface can use same link-layer identifier of physical interface or a totally different link-layer identifier from them of physical interface. And in a LMA point...
Many parts of India are prone to natural disasters, particularly caused by earthquakes and floods because of its geographical location. The Catastrophic areas can be rural, remote or urban anywhere in the world. It has been understood that earthquakes directly do not cause causalities but instead by side effects of weak or faulty constructed buildings and infrastructure etc. As there can be destruction...
With the acceleration of network evolution to the packet-based all-IP network, a demand for the IMS which is defacto standard framework to provide IP services in the packet-based network, is increasing rapidly. Number Portability(NP) which has been contributing to facilitating of telephony company competition and increasing of user convenience in legacy circuit-based networks, is also becoming more...
IEEE 802.15.4 has limitations as short range, low bit rate, low power, and low cost. And IEEE 802.15.4 devices have limitation as computational power, memory, and/or energy availability. IEEE802.15.4 standard's MTU is 127 bytes, among which IEEE 64 bits extended addresses may be used. After an association, 16 bits are used as an unique ID in a PAN L2, Still only 102 bytes are available for payload...
Security is an important issue in wireless communication systems as the wireless channel is unguided. Cryptographic techniques in the wired communication may be used to secure the wireless communication, but the characteristics of radio channel are not exploited efficiently. This paper proposes a simple key generation method for securing wireless communication. It assumes that each terminal is equipped...
Malicious code is a threat to computer security globally. The threat is evolving and leaving challenges for security specialists to improve the detection accuracy. Hence, it is imperative to optimize the traditional manual analysis method by automatic malicious code analysis system. Automatic protocol reverse-engineering is important for many security applications, including the verification of objects...
In this paper, we propose an intra-gateway server for the entertainment content in digital home environment and show an implemented prototype system which provides the interoperability among different DRMs, different services, and different content formats. We also define DRM conversion protocol to support the intra-gateway. It is operated on the UPnP protocol, which enables the devices to be used...
We study the power allocation algorithms in the case of multi-source multi-relay (MSMR) amplify-and-forward wireless cooperative network in this paper. In this MRMS system, we consider that multiple users would communicate with one destination node with the help of multiple relay nodes in the same time. To guarantee the quality-of-service (QoS) for all the users and reduce the power consumption, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.