The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-Based Services (LBSs) are becoming increasingly popular in our daily life. In some scenarios, multiple users may seek data of same interest from a LBS server simultaneously or one by one, and they may need to provide their exact locations to the un-trusted LBS server in order to enjoy such a location-based service. Unfortunately, this will breach users' location privacy and security. To address...
Due to the characteristics of mobile ad hoc networks such as lack of infrastructure, shared wireless medium, resource constraints, and highly dynamic topology, a number of challenges to security design arise. In mobile ad hoc networks MANETs, traditional security solutions are not adequate due to the lack of infrastructure and the absence of centralized administration. Distributive key management...
Truly ad hoc networks where no prior knowledge of participants to each other creates difficulties in providing encryption key management services to the network members. If the network uses Public Key Infrastructure (PKI) then a Certificate Authority (CA) must be available at all times. Using threshold cryptography for the CA requires several members to act as servers and collaborate to provide these...
Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of suppliers of wireless access to Internet and of users. But, the architecture and the configuration of this type of network do not ensure a protection against the unauthorized use of the network since the basic security measures used do not include the...
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
In this paper, we propose a location-release signature scheme based on bilinear pairings for vehicular ad hoc networks (VANETs). Location-release signature is a capsule signature signed by a source location server that becomes valid after the signature arrives at a specific destination location, where a location server publishes some trapdoor information associated with such a destination location...
In the future battlefield of modern warfare, soldier-robot ad hoc system is a typical application. On the basis of analyzing soldier-robot ad hoc systempsilas topology and formal security mechanism, this paper introduces the systempsilas security issues when applies the battlefield such as server network exposing, robotpsilas security threats, etc. It provides reference to build the soldier-robot...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.