Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message pa...
详细信息
According to expanding the use of wireless communication technology in transmitting critical datathe importance of privacy and security of data are irrevocable. Numerous data encryption algorithms are being done curr...
详细信息
Current solutions for private searching on streaming data only support searching for "OR" of keywords or "AND" of two sets of keywords. In this paper, we extend the types of private queries to supp...
详细信息
Lots applications need involved parties to share common session keys for specific requirements. For example, the shared key can be the seed to determine locations to hide secret data into an image. Wang et al. propose...
详细信息
Recent years have seen the emergence of a new programming paradigm for Web applications that emphasizes the reuse of external content, the mashup. Although the mashup paradigm enables the creation of innovative Web ap...
详细信息
In this paper, we propose an approach for designing and implementing a middleware for data dissemination in Wireless Sensor Networks (WSNs). the designing aspect considers three perspectives: device, network and appli...
详细信息
ISBN:
(纸本)9781612081441
In this paper, we propose an approach for designing and implementing a middleware for data dissemination in Wireless Sensor Networks (WSNs). the designing aspect considers three perspectives: device, network and application. Each application layer is implemented as an independent Component Object Model (COM) Project which offers portability, security, reusability and domain expertise encapsulation. For result analysis, the percentage of success is used as performance parameter. Such analysis reveals that the middleware enables to greatly increase the percentage of success of the messages disseminated in a WSN.
Group Key Exchange allows a set of parties to communicate over a public network and securely establish a secret session key. thus, it is a critical protocol for emerging network applications that require collaborated ...
详细信息
Secure multiparty computation was firstly introduced by Yao in 1982. Two-party equality testing is a special case of secure multiparty computation. It enables two entities to compare the equality of their secret data ...
详细信息
the impact of information technology on business operations is widely recognized and its role in the emergence of new business models is well-known. In order to leverage the benefits of IT-supported business processes...
详细信息
there is a growing concern across the globe about exfiltration of sensitive data over network. this coupled withthe increase in other insider threats pose greater challenge. Present day perimeter security solutions s...
详细信息
暂无评论