A Secure Smartphone Platform for Efficient Communication in Emergency Situation
نویسندگان
چکیده
منابع مشابه
A Secure Smartphone Platform for Efficient Communication in Emergency Situation
In this paper; we introduce novel technique in which effective communication of the Smartphone can be achieved. It is used as a platform to investigate a correlation that exists between securing the Smartphone and efficient emergency communication. We conducted to include several radio technologies, such as cognitive radio (CR). Cognitive radio deals with spectrum resources utilization. Due to ...
متن کاملSmartphone sensing platform for emergency management
The increasingly sophisticated sensors supported by modern smartphones open up novel research opportunities, such as mobile phone sensing. One of the most challenging of these research areas is context-aware and activity recognition. The SmartRescue project takes advantage of smartphone sensing, processing and communication capabilities to monitor hazards and track people in a disaster. The goa...
متن کاملEfficient HMAC-based secure communication for VANETs
Vehicular ad hoc network (VANET) is an emerging type of network which facilitates vehicles on roads to communicate for driving safety. It requires a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles which do not obey the rules. Most existing solutions either do not have an effective message verification scheme , or use the Public Key Infrastructure...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملCommunication Efficient Secure Linear Algebra
We present communication efficient secure protocols for a variety of linear algebra problems. Our main building block is a protocol for computing Gaussian Elimination on encrypted data. As input for this protocol, Bob holds a k×k matrix M , encrypted with Alice’s key. At the end of the protocol run, Bob holds an encryption of an upper-triangular matrix M ′ such that the number of nonzero elemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Business and Technology
سال: 2013
ISSN: 2291-2118
DOI: 10.17722/ijrbt.v3i2.125