The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our scheme has two phases, key computation phase...
To achieve security in wireless sensor networks (WSNs), pairwise key establishment between two sensor nodes is important. Public key cryptography based key establishment mechanisms are not suitable for WSN, due to their more energy consumption and complex hardware requirements. On the other hand, a different class of key establishment scheme that stores key or key related information are computationally...
Summary of e-commerce security is a complicated systematic project, the need from a technical point of view and to be protected in legislation to regulate various kinds of problems exist in e-commerce. This paper discusses the existence of e-commerce applications, security issues; e-commerce security technology is analyzed.
A more and more enterprises using Web services to accelerate its own development. At this point, how to network in an open application environment, guard the confidentiality of their data, resources are more and more concern for people, network security has become the network an integral part of the building. This paper introduces the architecture of network security, and further information on the...
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn, yn) where d(?? , ??) is a distortion measure. However, Alice and Bob do not trust each other and do not wish to reveal their data to each other. This paper describes and analyzes a protocol that uses homomorphic encryption for secure calculation of some special distortion functions without revealing xn and yn. The...
Transactional printing and fulfillment is an area of the graphic communications industry that requires highly advanced informational assurance and security, not only on a digital level, but also once the information is printed. Financial institutions and other service providers exchange confidential information about individuals and business accounts directly with the printer. If this information...
With the analysis of IPv6's IPSec protocol and principles, the paper designs various modules of IPSec, and achieves IPSec function. By the analysis of the FTP under IPv4 and IPv6 environment, the paper realizes the function of FTP in data transmission of IPv6. The test results of FTP data transmission based on IPSec show that the data transmission is successful and secure, the design and realization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.