The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
Due to some security issues of varieties of mobile access technologies, we need a new supporting infrastructure that can be able to support more efficient and secure ways to authenticate users and devices arises. To meet this goal, in view of current security issues of mobile terminals, we analyzed the idea of trusted computing, describe the user authentication model of TCG(Trusted Computing Group)...
Mobile IPv6 allows mobile nodes to remain reachable while moving around in the Internet. In Mobile IPv6, each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. This chapter...
With the rapid development of wireless network technology, the extensive use of mobile office in government, military and financial industry makes information security an urgent and important problem to be solved. However, traditional security mechanisms focus on authentication and authorization without considering endpoint security. TNC is no other than based on endpoint integrity to extend the trusted...
A strong designated-verifier proxy signature scheme was proposed to protect the original signerpsilas interests. In this scheme, the verifier was designated by the original signer. The valid proxy signature generated by the proxy signer on behalf of the original signer can only be accepted by the designated verifier and no body else can be convinced about the proxy signaturespsila validity or invalidity...
A research on the related technology and implementation of IP phone based on WiFi network is discussed in this paper; it includes the net structure of the technology used in designing the terminal of IP phone. This technology is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. A WiFi enabled IP phone is used which is preinstalled...
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the investigation and discussion of alternative solutions. We suggest a low hardware-complexity solution for authenticated symmetric key exchange, using a tree parity machine rekeying architecture. An authenticated key exchange is...
Numerous schemes have been proposed for secure routing and intrusion detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent intrusion detection system (IDS) for ad hoc...
Over the last three years, mobile handsets have evolved from voice based services to multimedia terminals that is gradually leading towards a new era of consumer entertainment, fostered by mobile communications and consumer networks. The need for mobile digital rights management solutions is thus intensified in order to safeguard mobile media content. Various types of content protection solutions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.