2 research outputs found
Packet Construction for Secure Conference Call Request in Ad Hoc Network Systems
[[abstract]]In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one’s own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie–Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference call in an ad hoc network system
Evaluating the effectiveness of mobile telecommunication services in Durban and Lagos.
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.Telecommunication includes voice, video and internet communication services. Thus, mobile
telecommunication services involve voice communication, video streaming, graphics and television
services at high speed. Technology development in mobile telecommunication has enabled users to
exchange data using cell phones, laptops and other telecommunication devices. More so, understanding
the concept of user experience is very important in the context of provision of mobile
telecommunication services.
This research will evaluate the effectiveness of mobile telecommunication services in Durban, South
Africa and Lagos, Nigeria amongst first-year IT students of the University of KwaZulu-Natal and Lagos
State University. The research is focused on the actual experience and perceptions of first-year IT
students. The study will examine the factors that influence first-year IT students' judgment of the
quality of mobile telecommunication services. It will also access the impact of quality of mobile
telecommunication services on the loyalty of first-year IT students towards their network operator.
However, Technology Acceptance Model (TAM) is the theory adopted for this research, which explains
how attitude of users determine the intention to use technology and the intention eventually influences
the overall use of such technology. The objectives of this research highlight opportunities associated
with understanding first-year IT students' experiences and perceptions of mobile telecommunication
services in UKZN, Durban and LASU, Lagos. Other opportunities include giving an insight into the
operations of network providers, determine the quality of mobile telecommunication services and
understanding the impact of mobile telecommunication services on students in UKZN and LASU.
Another significance of this study allows network providers to understand students' behaviour and to
respond to their preferences