The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. One of the biggest challenges is how to store these data. Storing the data decentralized in wireless devices is an attractive approach because of its major advantages over centralized ones. In this work, to facilitate...
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of robust security architecture able to cope with these threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. In this paper, we designed a framework of intelligent transport system. The main task of the road condition information...
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call ldquoend-to-middle security,rdquo which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway...
In order to encapsulate data and to convey information more efficiently and more security, a draft frame based on active block ciphers for application layer of Internet which could transmit orange data into semantic security and semantic integrity was designed according to scalable purpose. To different network environment, there were different intelligent choices about block cipher algorithms to...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.