The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Studies in Dynamic Spectrum Access often consider aspects of primary communication in their schemes. However, the primary spectrum access modelling is generally over simplistic. This paper considers a realistic modelling of the primary traffic and list a series of parameters that should be considered during spectrum reuse. By modelling primary and secondary communications, a better understanding of...
The growing volume of orders generated by HFT (high-frequency trading) systems has posed a challenge of conducting exchange and brokerage systems testing in production-like environments. Specialized testing tools are used to ensure quality of high load trading systems with high availability. The main requirement for such tools is that they should be capable of creating realistic, high loads using...
The task of generating personalized learning scenarios, in an automatic fashion, for learners is a complicated task. The difficulty is compounded when these scenarios are to be integrated within a serious game dedicated to people with disabilities. In this case, the specificities of the learner's preferences and competencies should also be taken into account in addition to the learning domain and...
In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common...
Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. Clients release their burden of storing and maintaining the data locally by storing it over the cloud. As cloud provides many advantages, it also brings certain Security Challenges among them one of its Data Integrity Verification. Proposed approach uses RSA based storage security (RSASS) method uses public auditing...
The performance of communication protocols in vehicular networks highly depends on the mobility pattern. Therefore, one of the most important issues when simulating this kind of protocols is how to properly model vehicular mobility. In this paper we present VACaMobil, a VANET Car Mobility Manager for the OMNeT++ simulator which allows researchers to completely define vehicular mobility by setting...
In this research, we develop a high-performance reliable communication platform. The platform consists of two parts, TCP/IP protocol stack that is implemented as hardware on an FPGA. And the second part is an integrated Triple-speed Ether net (TSE). We designed a state machine that configures TSE and an Ethernet frame generator to send TCP/IP packets at 1 Gbps, which are then driven into Logic Analyzer...
A cryptographically secure hardware HTTP enabled random number generator based on a nondeterministic entropy source has been implemented using open source hardware development kit. Internally, randomness is distilled from the entropy source using Algorithm M where modified-RC4-based and BLAKE-512-as-counter-mode pseudo-random number stream generators are combined. Users access the device via HTTP...
We consider the problem of designing a control protocol for the aircraft electric power system that meets system requirements and reacts dynamically to changes in internal system states. We formalize these requirements by translating them into a temporal logic specification language describing the correct behaviors of the system, and apply formal methods to automatically synthesize a controller protocol...
Among the current information security prevention systems such as firewalls and intrusion detection systems, there exist several shortages such as alert overload, high false alarm rate, absence of effective alert management mechanism etc. As a result, there is a tremendous amount of alert data overload in the network, and this data could be redundant, irrelevant or meaningless. The result of this...
The design of new protocols and features, e.g., in the context of organizations such as the IETF, produces a flow of novel standards and amendments that lead to ever changing implementations. These implementations can be difficult to test for security vulnerabilities because existing tools often lag behind. In the paper, we propose a new methodology that addresses this issue by recycling test cases...
To save the number of control messages in cooperation-spectrum sharing based paradigm, in this paper, we suggest the method using the negative acknowledge message (NACK) as command for cooperation and spectrum sharing. Here, primary transmission requires an optional transmission which is so-called sharing transmission phase whenever the mandatory phase is unsuccessful. In the sharing phase, the selected...
The purpose of anonymous credentials is to bring more privacy to digital communication. By using anonymous credentials, users can anonymously prove the possession of personal attributes. The attributes can represent any personal information, including age, citizenship or birthplace. Unfortunately, existing credential schemes miss practical revocation features for revoking invalid, malicious or expired...
Our multiple-protocol conversion method for file-based storage in ultra-high-definition television systems uses images mapped into multiple 1.5-G serial digital interfaces, individually recorded as material exchange format files and played back with synchronization, which could lead to scalable recorders for storing uncompressed images.
We investigate the problem of (independent) uniform random number generation and secret key agreement. A generator for the (independent) uniform random numbers is constructed by using a sparse matrix and it is applied to a secret key agreement protocol with strong secrecy. It is proved that the rate of the proposed codes can achieve the fundamental limits.
The AAL2 of ATM switching system uses the cyclic redundancy check code(CRC) to correct one bit error of the Common Part Sub-layer payload head(CPS-PH). Heavily based on CRC principle, in this paper analyses the process of one bit error correction of the CPS-PH is explored in detail.
Proof of Retrievability (POR) and Provable Data Possession (PDP) systems these days are the most active area of research for data integrity check, which is outsourced to cloud service providers. In this work we surveyed data integrity proving schemes by reviewing different schemes in the area along with their efficiency and security considerations. The objective of this survey is to offer a state-of-the-art...
This paper presents Caliper, a highly-accurate packet injection tool that generates precise and responsive traffic. Caliper takes live packets generated on a host computer and transmits them onto a gigabit Ethernet network with precise inter-transmission times. Existing software traffic generators rely on generic Network Interface Cards which, as we demonstrate, do not provide high-precision timing...
Location-based services (LBS) have to cope with increasing query loads at their data tier. Yet, the data access patterns of LBS typically possess spatial locality. Therefore, a dedicated spatial cache which provides efficient access to the data currently needed may considerably reduce this load. To ensure high throughput throughout the entire execution, previous work introduced an elastic load-balancing...
One of the key characteristics of pervasive computing applications is their ability to adapt to their environment. One possible approach to simplify the development of such adaptive applications is to use middleware to automate adaptation decisions. However, in many application scenarios, adaptation decisions can have critical security implications. Thus, when designing middleware to support adaptation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.