Search results for " protocol"

showing 10 items of 1320 documents

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

M-commerce - mobile commerce: a new frontier for E-business

2005

Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…

Service (business)Electronic businessComputer sciencebusiness.industrycomputer.internet_protocolMobile commerceMobile computingServices computingMobile business developmentE-commerceBusiness modellaw.inventionWorld Wide WebBluetoothGSMlawMiddlewareInformation systemWireless Application ProtocolbusinesscomputerProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct

Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos

2012

When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that appear similar in a networklevel may cause very different responses in an application level, and the other way round. In this article, we study how Windows Media Server's log files can be used to evaluate the QoS of video transmission, and we also examine the application level performance based…

Service (business)business.industryComputer sciencecomputer.internet_protocolQuality of serviceWindows MediaReal Time Streaming ProtocolNetwork interfaceMobile QoSService providerbusinesscomputerComputer network2012 18th IEEE International Conference on Networks (ICON)
researchProduct

Second Opinion System for Intraoral Lesions

2014

In this paper we present the prototype of a teledentistry system to perform the remote diagnosis of oral diseases. It makes use of a particular device called intra-oral (or dental) camera properly designed to shoot video and take pictures of the inner part of the mouth. The intra-oral cameras can be connected via USB to a common PC and they are very cheap, unlike the intra-oral photography kit for DSLR cameras. Usually this kind of devices are used in dentistry studies for local visualization by means of specialized software. The novelty of our system is that the real-time video produced by this device is canalized into a video streming by means of Video LAN client server (VLC) and pictures…

Service (systems architecture)File Transfer ProtocolMultimediaTeledentistry oral lesionbusiness.industryComputer sciencePhotographyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONUSBcomputer.software_genrelaw.inventionVisualizationClient–server modelSoftwarelawbusinessTeledentistrycomputerComputer hardware2014 IEEE 27th International Symposium on Computer-Based Medical Systems
researchProduct

IN service specification using the KANNEL language

1995

KANNEL is an application-oriented language for protocol engineering, with integrated support for all the main aspects of implementing typical communications software. Intelligent network services with distributed and interacting components share a number of central features with communications protocols, thus bringing in the possibility of applying protocol engineering techniques within the area of intelligent networking. To verify this view, the KANNEL language is applied to the specification of an intelligent calling card service. The specification includes both visual and textual notations of KANNEL.

Service (systems architecture)Protocol engineeringIntelligent NetworkComputer sciencebusiness.industryPersonal identification numberCode reuseCommunications softwareSoftware engineeringbusinessNotationCommunications protocolComputer network
researchProduct

Interaction Mechanism of Humans in a Cyber-Physical Environment

2015

The research initiative “Industrie 4.0” (I4.0) of the high-tech strategy announced by the German government targets the deployment of a cyber-physical system (CPS) in production and logistics. Such CPS-based environments are characterized by an increasing number of heterogeneous intelligent autonomous and communicating artifacts tightly integrated with humans. Thus, the human’s role will become a composite factor (“man-in-the-mesh”) for this future CPS environment, playing more than just a simple role inside the control loop. This paper investigates the need of a robust communication between CPS and humans, which includes a clear semantic of the exchanged information. For this purpose, a me…

Service (systems architecture)SIMPLE (military communications protocol)Human–computer interactionSoftware deploymentMechanism (biology)Computer scienceFactor (programming language)Control systemMediationCyber-physical systemcomplex mixturescomputercomputer.programming_language
researchProduct

An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture

2005

This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…

Service (systems architecture)Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOpen Shortest Path FirstMultiprotocol Label SwitchingAdmission controllaw.inventionNetwork simulationTraffic engineeringlawNext-generation networkInternet ProtocolTelephonyStream Control Transmission ProtocolSoftware architecturebusinesscomputerComputer network
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct