The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When networks are under attack, traceback schemes can be used to locate the compromised node and remove the compromised node from the network. To resolve the problem that marked information has been easy to be covered by the information of down-stream node in the traceback schemes based on probabilistic packet marking (PPM), ‘a non-repeatedly marking traceback scheme for wireless sensor networks (NMtrace)...
Form is an important part in the process of official document transacting, through hard-coded in program to implements user's requirement, such rigid approach can't adapt to the change of user's requirement, and does not have good portability and scalability. On the basis of analyzing the possible change of the form, has implemented dynamic transact of the form based on strategy pattern, Metadata...
For traditional anonymous routing protocols for wireless sensor networks (WSNs), the routing path is a single path, and the invalidation of any one routing node in the routing path will result in the failure of the whole routing path, this is extremely difficult in practice to guarantee the reliability of message delivery. In this paper, a secure anonymous routing protocol for wireless sensor network...
recently, how to support secure anonymous communications in resource restricted wireless sensor network has became the hot topic. In this paper, a secure anonymous routing protocol for wireless sensor network is proposed based on bilinear pairing and exclusive or operation, the protocol not only can provide routing anonymity, location privacy and the identity confidentiality of source node and destination...
Recently, the wireless sensor networks has been used extensively in different domains. Form healthcare to warfare, and indoor spaces to outdoor ones, we can see the existence of sensor networks everywhere. But secure communication is a very important requirement in wireless sensor networks, and how to share the security group key between the sensor nodes becomes the major problem. In this paper, a...
In recent years, wireless sensor network is booming because of the mature of wireless network and its variety in applications. But secure communication is a very important requirement in wireless sensor networks, message encryption techniques, such as DES and AES, are widely used to achieve the confidentiality of transmitted data. And, how to share the same session key between the sensor nodes becomes...
With the increasing application based on Web, the comparatively backward Web printing technology lead so much inconvenience to the development of Web system and slowed the pace of Web application in enterprises. In this work, by making use of component programming ideas and EJB technology, a Web print components was developed which based on the analysis of PDF format. Thus, it provides a simple and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.