The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key aggregate cryptosystem is a new cryptographic primitive that one can aggregate any set of secret keys to a single key, which has the power of all the secret keys being aggregated. The data owner can send the aggregate key to any authorized decryptors. Key aggregate cryptosystem can realize conveniently, flexibly and securely sharing data in cloud storage. However, when the key aggregate cryptosystem...
Wireless sensor networks (WSNs) provide a promising approach to monitor the physical environments, to prolong the network lifetime by exploiting the mutual correlation of sensor readings has become a research focus. In this paper, we propose a hierarchical network framework and adaptive threshold compression scheme to reduce the amount of information transmissions and alleviate the network congestion...
Conventional wireless mesh network (WMN)routing protocols are designed for the nodes that use the omni-directional or single-beam directional antennas. This research presents a throughput-efficient routing scheme for WMN, by taking advantage of the nodes equipped with the multi-beam directional antennas (MBDAs). Our routing design has the following two novel features: First, it is a cross-layer design...
The goal of an intrusion detection system (IDS) is to monitor anomalous activities and differentiate between normal and abnormal behaviors (intrusion) in a host system or in a network. The IDS must maintain a high intrusion detection rate (DR) while simultaneously maintain a low false alarm rate (FAR). A high detection rate is the focus of this paper. In this paper, we implemented an Evolutionary...
Internet of Things (IoT) involves connecting physical objects to the Internet, to provide opportunities to build smart systems or applications by leveraging Radio-Frequency Identification (RFID), Near Field Communication (NFC), Wireless Sensor Network (WSN), and universal mobile accessibility advanced technologies. In this paper, we propose an Internet-of-Things Based Smart Resource Management System...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.