The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper analyzes the inflexibility of video data collection for current 3G video phones. A solution for adaptive video data collection is proposed. The solution proposed in this work mainly consists of software components, according to which hardware needs to be selected. It also gives the video phone terminal structure, block diagram for H.324M video phone terminal, the main software functional...
P2P has become an important traffic form of current Network, and P2P identification has been a hot research in Network monitoring & management area. In order to tackle the problem of P2P data encryption persecuting P2P identification, in this paper, a traffic identification method for specific P2P based on multilayer tree combination classification BP-LVQ Neural-Network was proposed, baseing itself...
With the increasing popularity of distributed systems, middleware has become a major building block for the development of distributed applications. In this paper, we firstly analyze in detail four traditional middleware systems called RPC middleware, message-oriented middleware, transaction-oriented middleware, and distributed object middleware. Subsequently, we present a detailed review of SOA,...
As the IEEE 1516 standard for distribution simulation, High Level Architecture (HLA) framework does not solve the issues of scalability, dynamic load-balance and fault tolerance. HLA does not support federation migration, which would balance the system workload on heterogeneous distributed resources and consequently improve simulation's performance either. In this paper, a Grid based Advanced Distributed...
The concept of concurrent signature was first introduced by Chen, Kudla and Paterson in Eurocrypt'04, it contributes a novel approach for the traditional problem of fair exchange of signatures. Unfortunately we find out that in many concurrent signature schemes based on ring signatures, signers produced a signature, but his own cannot authenticate this signature was indeed produced by himself. To...
The mobile e-commerce protocols often have more complex structures than authentication protocols. Strand space model (SSM) is an intutive, highly efficient formal analysis method. In this paper, the strand space model is described and expanded, and the confidentiality, authentication and fairness of KSL protocol are analyzed by strand space formal methods. The analysis shows KSL is unfair and an improvement...
The technologies of Wireless local networks and cellular network are very popular and more and more service under the integrated heterogeneous environment. Stream Control Transmission Protocol (SCTP) is considered as an ideal to support the communication between them by enabling a mobile client to freely switch the IP address in different networks. In this paper, we propose an extended analytical...
IPv6 will inevitably take the place of IPv4 as the next generation of the Internet Protocol. Despite IPv6 has better security than IPv4, but there still have some security issues. So it is an urgent problem to requirement of IDS for IPv6 networks. Many intelligent information processing methods, data mining technology and so on have been applied to improve detection accuracy for IPv4 network. At first...
With the widespread use of broadband network, the firewall, as a filter installed on the border of network, can easily cause congestion and becomes the bottleneck of network transmission. The Web Monitoring System Based on the URL Analysis introduced in this paper replicates the user Web request by the use of the monitoring technology, extracts and analyzes the URL of user request. Then the URL will...
Because the PrivacyCA defined in TCG specification may leak user's privacy and trace his transactions, two PrivacyCA schemes with higher untraceability are proposed. The agents-based one provides higher untraceability by introducing agents and VK certificates to eliminate the linkage between EK and AIK. By adopting Partially Blind Signature algorithm in the generation of AIK triples, PBS-based one...
This paper analyzes the causes leading to call drop for 3G video phones. A solution for reducing the call drop is proposed. The solution proposed in this work mainly consists of software components, according to which hardware needs to be selected. It also gives the video phone terminal structure, block diagram for H.324M video phone terminal, the main software functional blocks and the algorithm...
In this paper we propose an anti-collision algorithm named IBTA for Radio Frequency Identification (RFID) when tag collision problem occurred. RFID is a flagship technology that has been developed for years since 1990s. Because of the shared wireless channel between RFID reader and tags during communication, the tag collision problem is a matter of significance to the performance of a RFID system...
Today more and more network-based attacks occur at application layer. Observed from the network layer and transport layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. However, traditional security techniques usually detect attacks from those two layers. Although some security techniques can detect some application layer attacks, these techniques...
This paper mainly studies mobile sink-based data gathering protocol, according to mobile wireless sensor network model, adopts a joint strategy of sink mobility and routing to realize high-efficient data gathering based on which nodes in network are divided into certain number of clusters, demonstrates that in the square monitoring area with any side-length L, the minimum energy consumption of the...
To study and solve the mobile payment problems based on MPTP in China, this paper proposed to put forward Error Handling and Controlling Protocol (EHCP) and described the framework of this protocol and the execution process. EHCP is aimed to perfect mobile payment communication mechanism and further solve mobile payment security issues; in order to make mobile payment becomes more widely accepted.
A buyer-seller fingerprinting protocol can enable a seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an innocent buyer. Existing protocols often create a large computation and bandwidth overhead for two reasons: one is a lot of asymmetric ciphers operations are performed and the other is the uniquely fingerprinted copies are sent to...
Nowadays, email has become the most widely communication way in the daily life. By using identity-based encryption scheme, we propose a high efficient identity-based authenticated email protocol, which provide perfect forward secrecy. In contrast to previous email protocols, our scheme does not use PKI and so it avoids complex certificate and key management problems. And we prove that our scheme satisfies...
This paper presents one inner-cluster scheduling algorithm, avoiding mobile nodes' location affect, satisfying expected coverage scale and high-effect. This excludes the number of smallest inner-cluster active nodes k, which can satisfy expected coverage scale in monitored area, according to coverage analysis theory. In inner-cluster, we only select k nodes with higher energy and nearer close to fixed...
Introduced the credible computation's background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original...
With the development of reformation on teaching model of the course of computer networks, teaching resources construction is demanded more and more. It stares us in the face that teaching materials curricular or extracurricular; electronic or classic; on-line or out-line are needed to be set up. In this paper, the practice of tridimensional teaching resources construction is concluded according to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.