The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RS485 Bus is adopted in part of communication structure in the process of remote control communication. Different RS485 communication line is difficult to integrate due to different control systems and communication protocols. Based on this, this paper presents a method which can integrate the original RS485 communication line together without damaging the existing RS485 communication structure, that...
Subliminal channels are covert channels established in cryptosystems such as digital signatures and authentication systems by exploiting the inherent randomness of the cryptosystems and are used to hide secret information. Subliminal channel is a serious threat to sensitive systems with high-level security. The state-of-the-art security requires subliminal channels to be detected and if possible prevented...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
We give a test that can distinguish efficiently between product states of n quantum systems and states which are far from product. If applied to a state |φ) whose maximum overlap with a product state is 1- ε, the test passes with probability 1-Θ(ε), regardless of n or the local dimensions of the individual systems. The test uses two copies of |φ). We prove correctness of this test as a special case...
In a multiagent system, coalition formation is a coordination method for agents aiming to form groups of interest. In this paper, we focus on the particular context of hedonic games. In hedonic games, the objective of the agents is to form coalitions, which are groups of agents. The satisfaction of an agent depends on other members of its coalition. In this context, autonomous agents need strategical...
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
ZigBee/IEEE 802.15.4 was created to address the market need for a cost-effective, low complexity wireless networking solution that supports low data-rates, low-power consumption in application of short range. In our design, the industry-leading CC2420 from Texas Instruments (TI) is the key single-chip RF transceiver compliant with ZigBee/IEEE 802.15.4. By modifying and trimming the ZigBee stack, a...
In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results imply almost tight lower bounds on the accuracy of such data analyses, both for specific natural functions (such as Hamming distance) and in general. Our bounds expose a sharp contrast between the two-party setting and the...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest execution of the protocol by both parties results in a fair coin toss, and (2) Security: a cheating party cannot increase the probability of its desired outcome by any significant amount. Since its introduction by Blum, coin flipping...
The new Internet terminals are at the same time mobile and multihomed since they are able to change their point of attachment to the network, and embed several network interfaces. Each one can be attached to a different network. Multihoming and mobility are generally considered as two separate concepts and thus are handled by different protocols. Nontheless, mobility and multihoming share the same...
Mobile IPv6 (MIPv6) is the current standard for end host mobility management in the Internet. In order to provide location management, MIPv6 operates in two different modes while the mobile node (MN) is away from its home. In the first mode, the MN incoming packets are tunneled to the MN current location via the home network. In the second mode, the traffic is exchanged directly between the MN and...
In order to improve the stability, validity and reliability of network management, the management architecture of multi-agent network is analyzed, and the communication and language between the multi-agent are introduced. Finally, a Distributed Network Management Framework based on multi-agent is presented. The functions of each module and mutual cooperation process in the framework are outlined....
We present round-efficient protocols for secure multi-party computation with a dishonest majority that rely on black-box access to the underlying primitives. Our main contributions are as follows: · a O(log* n)-round protocol that relies on black-box access to dense cryptosystems, homomorphic encryption schemes, or lossy encryption schemes. This improves upon the recent O(1)log* n-round protocol of...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
One I2C protocol design method for reusability was proposed. In this method, design was divided into 3 levels: protocol level, signal level and interface level. Protocol level can be reused without any modification. Signal level can be reused by setting the number of be transferred byte according to specific operation. Interface level can be reused by changing the number of operation mode and the...
Wireless Sensor Networks (WSNs) have attracted significant research interest in recent years because of their suitability to a wide range of real world applications. The envisioned Internet Protocol (IP) support for WSNs requires interoperability with existing management solutions, like Simple Network Management Protocol (SNMP), in order to provide remote management functionality and assure the correct...
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.