The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. Key management is a central aspect for security in mobile ad hoc networks. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems...
Digital watermarking became a key technology for protecting copyrights. In this paper, we propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches,...
Network-based methods of intrusion detection alone are not adequate to encounter current and future threats in mobile networks. In this paper, we introduce HIDMN, a host and network-based intrusion detection and prevention system for mobile networks. In addition, we outline some patterns for significant attacks in the GSM mobile network. This system can detect most attacks which we divide them into...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
A mobile ad hoc network (MANET) is an architecture without fixed infrastructure or centralized administration. However, when a message is transmitted in a multicast group, without any security infrastructure, it may be attacked or corrupted. In this paper we propose a new key management mechanism to support secure group multicast communications in ad hoc networks. The scheme proposes a dynamic construction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.