Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "ID," wg kryterium: Temat


Wyświetlanie 1-2 z 2
Tytuł:
ID layer for Internet of Things based on Name-Oriented Networking
Autorzy:
Batalla, J. M.
Krawiec, P.
Gajewski, M.
Sienkiewicz, K.
Powiązania:
https://bibliotekanauki.pl/articles/308281.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Future Internet
ID-based routing
ID layer
internet of things (IoT)
Name-Oriented Networking
Opis:
Object and service identification is considered as one of the main challenges in the field of Internet of Things (IoT), which can be solved by the introduction of the so called ID (IDentifier) layer. The objective of this layer is to expose IoT objects and services offered by them, to users. Common approach for ID layer is to create it in overlay manner, on the top of existing network. This paper presents a novel architecture of the ID layer, which is characterized by embedding ID layer functionality into the network plane. Moreover, this approach takes advantage of the Name-Oriented Networking (NON) paradigm. To gain easy access to the IoT objects and services, as well as native support for multicast service, human readable ID-based unified addressing with hierarchical structure was exploited. Additionally, in-network caching of forwarded IoT data, inherited from the NON, helps to reduce total network load and supports applications during collaboration with energy-constrained sensors. Such sensors may enter sleep mode to save energy and then the network nodes can serve requests for sensing data, arrived from applications, by using data stored in nodes’ cache. The paper shows the concept of NON-based ID layer and describes functional architecture of network node paying attention on modules and mechanisms related with ID layer functionality. Primary ID layer processes, i.e., object/service registration, resolution and data forwarding are explained in detail. Moreover, the ID-aware network node was implemented on Linux-based platform and tested to check its forwarding characteristics. The tests showed the performance of the of ID network node in data plane operations, which are the more sensitive for scalability issues.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 2; 40-48
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-Based Digital Signatures with Security Enhanced Approach
Autorzy:
Pomykała, J.
Powiązania:
https://bibliotekanauki.pl/articles/308154.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptography
deniable encryption
ID-based schemes
Opis:
In the paper the ID-based digital signatures with signer's protection in case of the private key compromising is investigated. The proposed protocols have two main ingredients. First is the application of the credential system for the suitable verification key approval. Second is the application of the subliminal channel together with the interactive generation of the secret key, to obtain the increased resistance of the system against the powerful adversary. The particular interest was turned towards the significance of the deniable encryption in creation of the corresponding protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 4; 146-153
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies