The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growth of Internet in the recent decades, business environment have transformed to take advantage of the new opportunities offered by this global phenomenon. Fundamental changes have occurred to data and communications networks and one such change has been the use of Virtual Private Network (VPN) to establish organizational networks that may span many geographic locations. VPN solution is...
In recent years, distributed systems are connected by VPN (Virtual Private Network) through the Internet, and construct complicated information systems. These information systems bring benefit and security risks to many users. Representative security risks, vulnerabilities are closely related to application software installed in information systems. If a malicious adversary identifies the application...
The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices'...
Mobile IPv6 allows mobile nodes to remain reachable while moving around in the Internet. In Mobile IPv6, each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. This chapter...
A bare PC is an ordinary computer that runs applications without an operating system (OS). It thus provides immunity from attacks that target specific OS vulnerabilities while eliminating the OS overhead in a conventional system. We describe a novel implementation of TLS that runs on a bare PC. The TLS implementation differs from a conventional TLS implementation in that it is included within a bare...
HTTP (hypertext transfer protocol) is a stateless protocol widely used in Internet World Wide Web. The idea behind a stateless design is to simplify the server conception because there is no need to dynamically allocate storage to deal with conversations in progress. If a client dies in mid-transaction, no part of the system needs to be responsible for cleaning the present state of the server. However,...
Bare PC applications do not use an operating system or hard disk. We present a lightweight VoIP security scheme for a bare PC softphone that consists of an RSA-based key exchange, AES voice encryption, and SHA-1 data integrity and authentication. The scheme is easily extended to incorporate replay protection and a key derivation function as specified in SRTP for example. Experimental results comparing...
This paper proposes a new network cyber-security architecture for smart (energy-efficient, environmental-friendly, cost-effective, etc.) power distribution system operations. The focus is on providing cyber-security for smart (time-of-use scheduling, smart metering, dispersed generation tracking, etc.) load-management devices that are networked for collaborative operations and accessible by utility...
As a security mechanism at the network-layer, the IP security protocol (IPsec) has been available for years, but its usage is limited to virtual private networks (VPNs). The end-to-end security services provided by IPsec have not been widely used. To bring the IPsec services into wide usage, a standard IPsec API is a potential solution. However, the realization of a user-friendly IPsec API involves...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.