The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The complexity of traditional data mining techniques prevents them from being used in VANETs. The introduction of data stream mining has opened a window for extending data mining to be used in VANETs. Data stream mining can be used to construct or extract patterns from messages broadcast frequently from vehicles traveling on a road. Vehicles exchange different types of messages either periodically...
In a society oriented signature scheme, a signature is produced by several co-signers simultaneously in a group. Saeednia proposed an identity-based society oriented signature scheme. However, there are some security weaknesses in the scheme. Zhu and Wang et al. showed two different attacks against the identity-based society oriented signature scheme respectively. In this paper, we proposed an improved...
Data collision in LR-WPAN(Low Rate Wireless Personal Area Network) causes retransmission of which energy consumption may reduce life of the entire network. Furthermore LR-WPAN is very sensitive to collision as it has relatively fewer frequencies of back-off retries. LCS(Limited Contention Scheme) suggested in this study is a way to transmit data by certain groups of the total nodes so that it can...
Nowadays applications are mostly service oriented and cross-boundary, entities involved in the access control process are usually unfamiliar, so traditional access control mechanism, which basically uses the identity of the involved entities to control authorization internal the organization, is no longer sufficient. Then, trust negotiation is brought out to construct trust between unfamiliar entities...
In this paper, we first point out that there are still some incomplete theorems in although some authors have showed several incorrect statements in the literature. We then present the improved versions of the incomplete propositions.
Password-based authenticated group key exchange protocols allow group users to jointly share a session key based on a human-memorizable password. In this paper, we present an undetectable online dictionary attack on N-EKE-D, a recent provably secure protocol designed to explicitly resist this type of attack. Thus, our result contradicts the design goal. We also give a simple attack on the key indistinguishability...
When humans interact with machines in their daily networks, it is important that security of the communications is offered, and where the involved shared secrets used to achieve this are easily remembered by humans. Password-based authenticated group key exchange (PAGKE) schemes allow group users to share a session key based on a human-memorizable password. In this paper, we consider two PAGKE schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.