The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the recent rapid advancements in the Internetof-Things (IoT), one of the applications being developed is thatof smart door lock (SDL) systems. SDL are intended to offerhigh security, easy access and easy sharing. Unlike existing SDLsolutions that mostly use biometrics or crunched RF spectrum, we uniquely propose to use Infrared (IR) optical wireless signal(OWS) using IR light emitting diode (LED)...
Network Functions Virtualization (NFV) offers a new way to design, deploy and manage network services. NFV relocates network functions from dedicated hardware appliances to generic servers, so they can run in software. Also, it is designed to consolidate and deliver the network components needed to support a virtualized infrastructure including virtual servers and storage, as well as networks. However,...
One of the most important characteristics of the traditional approaches of searching a missing object is a societal and infrastructural participatory crowd sensing where the crowds/participants 'consciously' opt to register the information in mind, and decide when, where, what, and how to sense and report. While the alert may extend to a broad community, the effectiveness of the crowd sensing doesn't...
With the rapid proliferation of data centers, their energy consumption and green house gas emissions have significantly increased. Some efforts have been made to control and lower energy consumption of data centers such as proportional energy consuming hardware, dynamic provisioning and virtual-ization machine techniques. However, it is still common that many servers and network resources are often...
Cloud-based storages have become considerably popular in recent years, as they enable data access from anywhere and any device at any time. Many leading cloud-based storage services including Dropbox, JustCloud, and Mozy use data deduplication techniques at a source to save network bandwidth from a user to cloud servers as well as storage space, which in turn expedites the speed of data upload. Although...
The level 2 system of POSCO consists of general server-level computers which adopt middleware to minimize migration cost and development time of application software. In order to reduce cost and time further, POSCO, one of the leading steel companies, has been developing its own middleware in recent years. This paper describes the structure and the behavior of POSCO middleware named POSMOS. Moreover,...
While the volume of emails are ever-increasing, email servers tend to have large redundancies demanding huge storage unnecessarily. MS exchange single instance (SIS) attempts storage-efficiency by removing redundant copies of an entire email-level when it is destined for multiple recipients' mailboxes within a server. However, redundant attachments or parts of emails due to threads are left storage-inefficient...
In the last few years, researchers have extensively studied the key exchange protocol. In 2007, Kwon et al. proposed a simple three-step key exchange protocol using smart card. In 2008, Chen and Lee proposed a secure and efficient user authentication scheme using smart card that is modified to enhance the security of the series of the Peyravian-Zunic scheme. The current paper demonstrates the vulnerability...
This paper proposes an SAMD (Synchronization Algorithms based on Message Digest) algorithm based on message digest in order to facilitate data synchronization between a server-side database and a mobile database. The SAMD algorithm makes the images at the server-side database and the mobile database uses message digest tables to compare two images in order to select the rows needed for synchronization...
Proxy Mobile IPv6(PMIPv6) is a network-based mobility management protocol to support mobility for IPv6 nodes without host involvement. In PMIPv6, the Mobile Access Gateway(MAG) incurs a high signaling cost to update the location of a mobile node to the remote local mobility anchor(LMA) if the mobile node moves frequently. This increases network overhead on the LMA, wastes network resources, and lengthens...
The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in ubiquitous environment because various applications are running in various devices and servers in ubiquitous environment...
In this paper, we propose a secure binding update authentication scheme in FMIPv6 for wireless vehicular networks. The scheme guarantees mutual authentication, secrecy, and integrity based on pre-authentication. We analyze the security of the binding update authentication scheme and the security requirements using AVISPA Tool that supports a rigorous analysis of security.
In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of-initiator attack and...
Phishing often causes more financial damages to enterprises and users than virus and worms. Proposed techniques so far mostly are to provide protection for the banks or other enterprise corporations and/or require changes in Web servers. Regular home users are left without protection against phishing, other than the traditional rudimentary email filtering. Furthermore, security toolbars on browsers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.