Key Resolution of Reencryption by Providing Paging in Between the Gateway
نویسندگان
چکیده
The Internet use in mobile has increased day by day .Every user want to access the Internet through mobile phones instead of laptop because of its feature like small in size and portable. When mobile user wants to access the Internet on mobile then all the request goes to the wireless gateway .The gateway acts as intermediate between the two points either it can be from wireless to wired or vice versa. The request of mobile phone is transferred from WAP device to web server through the gateway .The gateway is also a protocol translator which translate all the protocols used by wireless device to wired network. The problem of existing system was hole in the gateway .This paper has discussed about the problem of the WAP gateway .This paper focused on implementation of hashing technique in between the networking gateway to provide a solution of Re-encryption.
منابع مشابه
Characterizing Reservation Management for Media Gateway Controller (Performance and Reliability)
In this paper, analysis and simulation of Media Gateway Controller (MEGACO) based COPS (Common Open Policy Server) which is a protocol defined in IETF (Internet Engineering Task Force) to transport configuration requests and deliver the policies is presented. For this scenario, three queuing models include M/M/1, M/M/c and M/D/c were applied . Then, some of the key performance benchmarks look l...
متن کاملCharacterizing Reservation Management for Media Gateway Controller (Performance and Reliability)
In this paper, analysis and simulation of Media Gateway Controller (MEGACO) based COPS (Common Open Policy Server) which is a protocol defined in IETF (Internet Engineering Task Force) to transport configuration requests and deliver the policies is presented. For this scenario, three queuing models include M/M/1, M/M/c and M/D/c were applied . Then, some of the key performance benchmarks look l...
متن کاملWhat about Bob? The Inadequacy of CPA Security for Proxy Reencryption
Consider three parties: Alice, Bob, and Polly. Alice keeps some encrypted data that she can decrypt with a secret key known to her. She wants to communicate the data to Bob, but not to Polly (nor anybody else). Assuming Alice knows Bob’s public key, how can she communicate the data to him? Proxy reencryption provides an elegant answer: Alice creates a reencryption key that will enable Polly (th...
متن کاملدروازه اطلاعات علمی،پژوهشی، و فناورانه ایران: خدمتی نوین برای پژوهشگران ایرانی
Information Subject Gateways are providing access to the necessary quality controlled databases among the vast resources for users of the web and saving them from the confusion and perplexity among the sources on the web. The main objective of this research is creating Iranian Gateway for Scientific, Research, and Technological Information as a valuable source for use by academics and researche...
متن کاملAnalysis of SFL1 and SFL2 Promoter Region in Arabidipsis thaliana using Gateway Cloning System
SFL1 and SFl2 (SETH Four Like) genes are two members of SETH4 gene family in Arabidopsis thaliana expressed in saprophytic tissues. In this study, expression of SFL1 and SFL2 genes were studied using Gateway Cloning Technology. Primers were designed for PCR amplification of promoter region of SFL1 (900 bp) and SFL2 (930 bp) genes having attB1 recombination sites using Kod Hi Fi DNA polymerase e...
متن کامل