951 resultados para Mobile communication
Resumo:
Las redes móviles ad hoc son redes formadas por lainterconexión de terminales inalámbricos que de manera autónoma,sin ninguna administración central, establecen enlaces decomunicación entre ellos. La infraestructura de red la componenlos propios terminales de usuarios que actúan de gestores yencaminadores de paquetes. Así, un usuario cualquiera puedeconectarse con un terminal remoto a través de una conexiónmultisalto entre diferentes usuarios. En este tipo de redes tanabiertas, uno de los retos prioritarios es proteger el anonimatode los sujetos y sus localizaciones. En este artículo hacemos unrepaso de las técnicas existentes a través de los protocolos que sehan propuesto en la literatura, y exponemos los problemas queaun quedan abiertos.
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
Infants use their social competence very early to communicate not only in dyads but also in triads, in particular in the triangle they form with their mother and father. The development of this triangular communication is largely shaped by the ways the parents support or undermine each other in relation to their child. Whereas triangular communication is facilitated in "two for one" alliances, it is recruited in the service of regulating the parents' conflicts in "two against one" coalitions. These processes are manifest in toddlerhood and may be traced back to the coparenting alliance in formation during pregnancy.
Resumo:
Après une revue de la littérature concernant les médias utilisés dans le cadre de campagne de prévention, le matériel d'exposition est présenté. Le contenu et les moyens mis en oeuvre ne sont traités que dans la mesure où ils influencent directement la présentation du matériel. Enfin pour clore ce travail, une discussion concernant les possibilités et difficultés d'évaluation de ces actions de diffusion de l'information. [Auteur, p. 2]