The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The two-party Diffie-Hellman (DH) key-exchanging technique is extended to generate (i) multiple two-party keys and (ii) one multi-party key. The participants in the former case exchange two public keys and generate 15 shared keys. Of these, 4 keys are called base keys, because they are used to generate the other 11 keys called extended keys. The main advantages are the reduction of the key exchange...
A new optimistic fair exchange protocol between a customer (C) and a merchant (M) is presented in this paper. It makes use of trusted third party (TTP) but its use is kept to minimum when disputes arise. The protocol is for exchanging a payment with a digital product such as software. A new idea, in which if the parties are willing to exchange then they are enforced to be honest, is originated in...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Cooperative wireless communications offers a new dimension of diversity by emulating transmit antenna diversity to provide reliable communications. In cooperative diversity, single-antenna radios behave as relays between a source and destination, and the performance improvements are due to cooperation of the source and the relay. However, a misbehaving relay can degrade the envisaged performance improvements...
Password-based authentication is susceptible to attack if used on insecure communication channels like the Internet. Researchers have engineered several protocols to prevent attacks, but we still need formal models to analyze and aid in the effective design of acceptable password protocols geared to prevent dictionary attacks.
This paper presents a method to and the best path for data exchange in communication systems of infrastructure networks. This method is based on Floyd-Warshall shortest path algorithm and is implemented in MATLAB. In this paper, we considered a typical example of a communication system over a power network modeled as a graph. In this graph, control centers, some power plants, some important substations...
The cryptographic security of the Merkle-Hellman cryptosystem has been a major open problem since 1976. In this paper we show that the basic variant of this cryptosystem, in which the elements of the public key are modular multiples of a superincreasing sequence, is breakable in polynomial time.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.