The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
Data multicast is an important data traffic pattern in today's data center running big data oriented applications. The physical layer multicast capability enabled by the emerging technologies used to build circuit switches exhibits huge benefit in transferring multicast data. This paper tackles the problem of scheduling multicast data transfer in high-bandwidth circuit switch. The scheduler aims at...
We often send our confidential information such as passport, credit card, social security numbers over email without concern about the security of email services. Existing network security mechanisms provide adequate security from external malicious adversaries and eavesdroppers, but they don't guarantee that the email service providers (ESPs) wouldn't or can't access our email data themselves, which...
In this paper, we propose a novel secure and privacy-preserving scheme for enhancing security in vehicular cloud based tasks announcement. The proposed scheme uses an efficient multiple receiver signcryption technique with proxy re-encryption in order to prevent the private information of the vehicles from being disclosed during task announcement. By integrating the proxy re-encryption algorithm with...
Service elasticity, the ability to rapidly expand or shrink service processing capacity on demand, has become a first-class property in the domain of infrastructure services. Scalable NoSQL data stores are the de-facto choice of applications aiming for scalable, highly available data persistence. The elasticity of such data stores is still challenging, due to the complexity and performance impact...
Hybrid broadcast-broadband TV (HbbTV) is a global initiative that brings new solutions to world of digital television (DTV) in terms of entertainment. In comparison to previous initiatives, different services are additionally provided in HbbTV. This paper describes an application for displaying of hybrid Electronic Program Guide (EPG) for a digital TV receiver. The application works with and without...
Modern internet traffic is heavily composed of some form of video communication. In addition, video streaming is slowly replacing regular phone connections. Given that most video transport utilizes Video over Hypertext Transfer Protocol/Transmission Control Protocol (HTTP/TCP), it is important to understand TCP performance in transporting video streams. Recently, multipath transport protocols have...
A new time dissemination and synchronization service over public switched telephone network (PSTN) has been established at CSIR-NPL. The time synchronization accuracy achieved using is this service is ± 10 ms. The measurement of round trip delay and its cancellation in the final time code sent to the receiver has been implemented in this service. In this paper, the technical details of this service...
Mobile devices have been increasing in both number and power. While devices such as smartphones gain capabilities, an increasing number of users rely on them to complete more and more tasks. One of the most significant constraints of mobile devices is the necessary reliance on battery power. This limitation can be circumvented by operating the device while it is charging; however, this approach has...
Applications requiring strict access control, such as medical record query, often require auditing of the query. The current typical design relies on server side logging. However, logging on server-side do not provide strict means of auditing, since the server can be tampered with attackers, and also anybody who has permission to write can modify the log. We propose a scheme using blockchain technology,...
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
High quality of the provided communication services can be reached by package networks by the organization of network synchronization of the time scales (TS). The report summarizes the experience of comparing the TS of the leading watches of the corporate telecommunication network with the state time scale - UTC (SU). The methods of realization of checking of a time scale and methods of distribution...
We propose a cloud migration strategy that migrates applications and services running on multiple virtual machines (VMs) from one cloud environment to another. Current migration techniques mostly focus on migrating VMs between physical servers that are placed inside a single cloud. In this work, we consider an automated cloud migration system that enables a cloud migration of multiple VMs between...
Recently, spoofed e-mails become sophisticated and the messages that cannot be identified by visual confirmation have been increasing. DKIM is one of the most famous methods as countermeasure of spoofed e-mail. However, since DKIM allows a signature by third party domains, a recipient server can be unable to determine whether the attached signature is the legitimate. To solve the problem, although...
The one-way messaging pattern, in which a message sender does not expect any response, is fast and convenient for many applications, but whenever reliable communication is needed, developers either use heavy-weight middleware, such as JMS, or implement request-response interactions, based on TCP. However, TCP is poorly adapted to one-way messaging, because it offers a streaming channel with no mechanisms...
Compared with today’s 4G wireless communication network, the next generation of wireless system should be able to provide a wider range of services with different QoS requirements. One emerging new service is to exploit cooperative driving to actively avoid accidents and improve traffic efficiency. A key challenge for cooperative driving is on vehicle-to-vehicle (V2V) communication which requires...
The distributed index coding problem is studied, whereby multiple messages are stored at different servers to be broadcast to receivers with side information. First, the existing composite coding scheme is enhanced for the centralized (single-server) index coding problem, which is then merged with fractional partitioning of servers to yield a new coding scheme for distributed index coding. New outer...
Superseding HTTP/1.1, the dominating web protocol, HTTP/2 promises to make web applications faster and safer by introducing many new features, such as multiplexing, header compression, request priority, server push, etc. Although a few recent studies examined the adoption of HTTP/2 and evaluated its impacts, little is known about whether the popular HTTP/2 servers have correctly realized the new features...
A cache-aided erasure broadcast channel is studied. The receivers are divided into two sets: the weak and strong receivers, where the receivers in the same set all have the same erasure probability. The weak receivers, in order to compensate for the high erasure probability, are equipped with cache memories of equal size, while the receivers in the strong set have no caches. Data can be pre-delivered...
The public key encryption scheme with conjunctive keyword search (PECKS) is one of the most important techniques used for sensitive users' data outsourced to the third party, especially the cloud storage. However, most existing PECKS schemes need to construct a secure channel, which is usually costly. To solve this problem, some scholars have proposed several secure channel-free PECKS schemes, however,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.