SECTION: Features
As the numbers and capabilities of networked devices continue to grow, they will play an increasingly important role in daily life. Ensuring security and usability will be the first and foremost challenge; Named Data Networking can help address this challenge through localized trust, usable security, and autoconfiguration.
By Zhiyi Zhang, Edward Lu, Yu Guan, Tianxiang Li, Xinyu Ma, Zhaoning Kong, Lixia Zhang, September 2019
PDF | HTML | In the Digital Library
We don't need to miss out on the joys of technology in order to regain what liberty and democracy are supposed to mean, but the regulatory transformation we need is of epic proportions.
By carlo von lynX, July 2018
PDF | HTML | In the Digital Library
FEATURE: Features
The Internet of Things places new demands on wireless networks that cannot be met with conventional infrastructure, services, and protocols. But there is hope, specifically a new paradigm to enable wireless awareness through global synchronization.
By Alyssa B. Apsel, Enkhbayasgalan Gantsog, December 2015
PDF | HTML | In the Digital Library
SECTION: Features
In the future, our radio devices will adapt to deal with new types of signals. The challenge is to describe those signals so that devices can learn from one another and communicate.
By Aveek Dutta, Dola Saha, March 2014
PDF | HTML | In the Digital Library
The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.
By Charles Cavaiani, Jim Alves-Foss, April 1996
PDF | HTML | In the Digital Library