Volume 1 Number 1 March 2012

    
Privacy Systems in Smart Spaces

Jamil Al-Jabi, Jamal Abu Rrub, Khalil El-Khatib

https://doi.org/

Abstract Radio Frequency Identification (RFID) systems are used to automatically identify objects by using radio waves transmitted between readers and tagged objects. While the RFID technology has numerous potential applications in healthcare, military, commerce, to list a few, it raises many security and privacy risks and concerns due to the wireless transmission for data between the tag and the reader. Additionally,... Read More


Distributed Test Architecture for Load Balancing System

Mariam Lahami, Moez Krichen, Rochdi Abid, Mohamed Jmaiel

https://doi.org/

Abstract VoIP-based applications are emerging as new technologies in the e-learning area by proposing new and flexible modes of communications between students and teachers. In this paper, we propose a SIP-based clustered architecture based on failover and load balancing mechanisms that are used to ensure the high availability and scalability of such systems. We define also a distributed test architecture in... Read More


Mechanism for the Deployment in Switched Ethernet Networks

Hela Mliki, Lamia Chaari Fourati, Lotfi Kamoun

https://doi.org/

Abstract In order to define new switched Ethernet functions for data center use, the project IEEE802.1Qau [1] for congestion management is underway in the IEEE 802.1 standards committee. The aim of this project is to develop Ethernet congestion control algorithm for hardware implementation. Our focus is on Quantized Congestion Notification (QCN) algorithm, which is being considered by the IEEE802.1Qau standards for... Read More


Analysis of Security Weaknesses in IEEE 802.16

Noudjoud Kahya-Abbaci, Nacira Ghoualmi

https://doi.org/

Abstract The IEEE 802.16 standard, usually known as WIMAX, is the latest technology that has promised to offer broadband wireless access over long distance. In this article we offer an overview of the state-of-the-art of security issue on WIMAX, which is a new and hot research point for telecommunication and computer scientist, we analyze vulnerabilities contained in layers and we categorize... Read More