Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The NFC Forum has released a first candidate for their Signature Record Type Definition. This specification adds digital signatures to the NFC Data Exchange Format (NDEF), which is a standardized format for storing formatted data on NFC (Near Field Communication) tags and for transporting data across a peer-to-peer links between NFC devices. With an increasing number of applications of the NFC and...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymous-driven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands...
Communication networks are prone to virus and worms spreading and cascading failures. Recently, a number of social networking worms have spread over public Web sites. Another example is error propagation in routing tables, such as in BGP tables. The immunization and error curing applied to these scenarios are not fast enough. There have been studies on the effect of isolating and curing network elements,...
The following topics are dealt with: wireless networking; network optimization; service management; visualization and P2P; cloud management; information modeling; performance and fault management; resource allocation & control; IMS/SIP; IT management; traffic flows, sampling, and classification; routing; intrusion detection and fault management; resource management; WLAN and ad hoc networks; policy-based...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are highly desired. Existing approaches either rely on a relative small set of pre-selected relay servers to redirect the messages, or use structured peer-to-peer systems to multicast messages among a set of relay groups. The pre-selection...
DPI identification technology is a main technique of P2P data stream identification technology; the advantages of it are higher accuracy and the ability of distinguishing accurately which type of P2P applications. But it is difficult to apply in highspeed networks due to its slow execution speed. To solve this problem, this paper suggests six sampling strategies: invariable random sampling, invariable...
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and...
Quickly acquiring the data required from network node environments to share files in the vast P2P network environment is a challenging job. Many researches have proposed data sharing mechanisms and scheduling methods in P2P environments, however, most focused on the efficient utilization of network bandwidth, using greedy methods to deliver the data to the client end as early as possible. However,...
Peer-to-peer (P2P) communities over the Internet contain a large amount of trust evidences that can be used to compute the reputation of peers, but existing reputation systems merely uses the evidences within the scope of one community, neglecting the social characteristics of peers' reputation that can only be actually derived from information based on all communities they participate in. We believe...
Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of both techniques. Clusters build in ONDC style can be deployed both on small scale local networks, but as well in large scale over the Internet deployments. In this paper we analyze the...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
P2P worm based on loopholes spreading in peer-to-peer network is a serious security threat. According to the characteristics of P2P worms, a signature-behavior-based P2P worm detection approach detecting the known P2P worm based on characteristic string matching is proposed. In addition, this method can also detect unknown P2P worms based on behavior. This method is mainly composed of the technology...
In the last few years, several new IP applications and protocols emerged as the capability of the networks to provide new services increased. The rapid increase in the number of users of peer-to-peer (P2P) network applications, due to the fact that users are easily able to use network resources over these overlay networks, also lead to a drastic increase in the overall Internet traffic volume. An...
Unstructured peer-to-peer (P2P) networks for content distribution are decentralized and robust. Searching for content in the network is based on the Gnutella protocol which does not provide security. Communication between two or more peers is secure if it can provide authentication and ensures the confidentially and integrity of the data exchanged. Authentication enables the identity verification...
Homomorphic hash functions (HHFs) have been applied into peer-to-peer networks with erasure coding or network coding to defend against pollution attacks. Unfortunately HHFs are computationally expensive for contemporary CPUs, This paper to exploit the computing power of graphic processing units (GPUs) for homomorphic hashing. Specifically, we demonstrate how to use NVIDIA GPUs and the computer unified...
Peer sampling - the capability of obtaining a random sample from a large population of peers - is a basic building block for the gossip paradigm. Current peer sampling services have been designed for ''first-class'' citizens of the Internet: peers that are able to accept incoming, sporadic connections. Unfortunately, the vast majority of peers do not belong to this class, as they are behind firewalls...
Since their emergence peer-to-peer (P2P) applications have been generating a considerable fraction of the overall transferred bandwidth in broadband networks. Residential broadband service has been moving from one geared towards technology enthusiasts and early adopters to a commodity for a large fraction of households. Thus, the question whether P2P is still the dominant application in terms of bandwidth...
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to communicate easily while protecting the botmaster from being discovered. Existing work on P2P-based botnets mainly focuses on measurement-based studies of botnet behaviors. In this work, through simulation, we study extensively...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.