The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The multi-round protocols for authentication and group proof construction increase the cost with increase in participants. In this work, computational and communication cost of multi-round protocol is calculated to identify the protocol with least cost and high security. The...
Radio frequency identification (RFID) technology is an automatic identification and data capture technology, and uses tiny and low cost RFID tags. The large scale deployment of RFID systems in practical applications require balancing between the cost constraints of RFID tag and the security, privacy and integrity needs of the application. This work proposes server centric connectivity mechanisms for...
Three stakeholders come into play in peer-to-peer (P2P) video-on-demand (VoD), namely peers/viewers, content providers and ISPs. Different design choices have been proposed to improve quality of user experience, to bring down content server bandwidth cost and to reduce ISP-unfriendly traffic. However, it is unclear whether the ability of these design choices to meet interests of one stakeholder comes...
This paper presents a design of intelligent operating system for effective pollution control facilities by utilizing IT-based machine-to-machine (M2M) converged technology. By comparing proposed system with conventional system, we describe the benefits of proposed system in terms of flexible capacity, operation, cost, and performance efficiency.
IKEv2 is the new version of Internet Key Exchange protocol. Despite of its several advantages, it is still vulnerable to denial of service attack. In this paper, we propose an improvement of IKEv2, which is based on the shared secret and asymmetric distribution of calculations. By analyzing the improved IKEv2 with a cost-based framework, we conclude that the improvement is secure against DoS attack...
There have been 220 million mobile phone users and numerous PDA in our country at the moment, these mobile terminals form the huge potential market of mobile e-commerce which will be the development trend of future e-commerce. Compared with traditional mediums of payment, using mobile terminals, such as mobile phone and PDA, etc to carry out transactions and payments will be more flexible and convenient...
In this paper, we explore the relay node (RN) placement problem in a heterogeneous wireless sensor network (WSN). The objective of the RN placement is to use a minimum number of additional RNs to enable the relaying of given traffic on existing nodes to the base station (BS) under the energy constraints. We assume RNs can adjust their transmission power according to the distance to the intended destination...
The application layer multicast routing problem is a multi-objective optimization problem. Most existing protocols are based on simple geographical rules and focus on either tree cost or application load balance performance. Little attention is pay to the lower level performance. The paper analyzes the constraints on multicast routing, then formalizes three functions to evaluate an application layer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.