Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As the use of wearable devices such as smartwatches, smartbands and wearable glasses increases, the concern about their security also becomes serious. In this study, we explore various vulnerabilities of wearable services with three aspects: device itself, wearable gateway and server. Then, we devise three attack scenarios, namely an illegal device pairing attack, a fake wearable gateway attack and...
For System-on-Chips (SoCs) one of the most critical design constraints are gate count and power consumption. This paper presents a quality characteristics estimation methodology for STAR Memory System (SMS) network. Our proposed methodology is based on linear and polynomial approximation. The obtained approximate functions are embedded in scripts that were developed for automated estimation of gate...
Proximity Integrated Circuit Cards (PICC) are widely used for public transport fare collection. The stored contents in the card can only be accessed or modified after the card is able to authenticate the Proximity Coupling Device (PCD) or reader using a shared secret key. We propose a new authentication scheme that is not based on shared secret keys. Instead, authentication is based on the card and...
ENUM (E.164 Number Mapping) is widely used to provide automatic mappings between the telephone numbers and the VoIP (Voice over IP) URIs (Uniform Resource Identifiers). With ENUM, the subscribers dial the telephone number of the called party and the system automatically forwards the call through IP networks if the VoIP URI of the call is found. Typically, the ENUM query process is performed at the...
Internet Censorship is unceasingly increasing in many countries worldwide in order to restrict web contents within the country premises. According to latest Open Net Initiative (ONI) report, almost 50 countries are involved in web censorship, including Pakistan. This paper presents the methodology and the measurement analysis based on publicly available censored URLs in Pakistan, providing both qualitative...
Research efforts for the Industrial Internet of Things (IIoT) have placed great emphasis on the use of vertical integration as a mainline strategy for the realisation of the fourth industrial revolution (Industrie 4.0). The present paper proposes the use of a distributed Gateway Service Bus (GSB) as a plant-wide and resilient platform for vertical integration, field level reconfiguration, and distributed...
In industrial environment to optimize and to improve maintenance operations could be one of main goals to achieve for enhancing revenues for machinery manufacturers providing after-sales services to their customers. Especially remote maintenance and diagnosis are aspects investigated in literature and in real environments in the last years. In fact, remote access and role-specific data distribution...
The impulse radio ultra-wideband (IR-UWB) radar technology is attracted strong attention for various applications such as crowdedness measurement, building energy management system, vital sign monitoring, and counting the number of inbound and outbound people. In this paper, we propose a shopping store management system based on IR-UWB radar sensors. In order to manage a shopping store, checking the...
Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more popular. Within this context, the industry search for lower tag weight and low cost system together with solemn security to satisfy the consumer. Tag search is among the most requested protocols in such systems. Being light weight...
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually...
To provide the privacy of the users who receive some computing services from the cloud, the users must encrypt their documents before outsourcing them to the cloud. Computation on outsourced encrypted data in the cloud rises some complexity to the system specially in the case when an entity would like to find some documents related to a special keyword. Searchable encryption is a tool for data owners...
Disseminating sensory information from sensor nodes to the gateway node towards Data Center Server has to be guaranteed its fruitfulness. However, these important information commonly are transmitted over wireless connections whereas everyone including adversaries may join freely in the network. Hence, the correctness of received information should be emphasized. To do so, such information should...
We proposed a novel virtualized PON OLT architecture to realize flexible and cost-efficient PON systems, and evaluate the techniques proposed to suppress collision between upstream signals caused by the software-derived processing time jitter on MPMC.
Internet of Things (IoT) has emerged for over a past few years and has been a substantial deployment on multiple architectures, standards, and platforms. Despite the heterogeneity of the devices, it must provide open access for the development of the existing firmware. This firmware must be kept in constant development to remove bugs and improve functionality. An over-the-air firmware update system...
In order to provide tourists with a pleasant and economical sightseeing experience by using the information technologies and integrating with big data, a multi-purpose integrated system is proposed to construct smart scenic spots by using the information technologies such as IoT and mobile computing. The proposed system is capable of sensing environmental information in and around the scenic spots,...
In view of the high demand for the security of visiting data in power system, a network data security analysis method based on DPI technology was put forward in this paper, to solve the problem of security gateway judge the legality of the network data. Considering the legitimacy of the data involves data protocol and data contents, this article will filters the data from protocol matching and content...
Solutions that allow the computation of arbitrary operations over data securely in the cloud are currently impractical. The holy grail of cryptography, fully homomorphic encryption, still requires minutes to compute a single operation. In order to provide a practical solution, this paper proposes taking a different approach to the problem of securely processing data. FRagmenting Individual Bits (FRIBs),...
Representational State Transfer (REST) is a web architecture that take the advantage of Hypertext Transfer Protocol (HTTP) to invoke a certain code in the server to do action, either to store, update, delete, or query a value in the server. This kind of implementation are the basis of all Application Program Interface (API) system used by the web application. API provide a tools for creating a software...
The smart mobile terminals and mobile broadband communications become more and more popular. Access control systems using traditional mechanical lock, IC card authentication and password authentication technology exposes more and more security issues. This paper describes the design and implementation of server authentication module. The server system used JAVA language development and JDBC technology...
With the large-scale commercial process of 4G networks in China, the volume and the variety of mobile web data in the telecommunication networks grow exponentially. In order to meet the demand of higher data rates and better customer experience, the traditional telecom operators and new small telecom operators (mobile virtual network operators) are pursuing advanced information, communication technology...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.