Paper Title (Use Style: Paper Title)

Total Page:16

File Type:pdf, Size:1020Kb

Paper Title (Use Style: Paper Title) 1114 JOURNAL OF NETWORKS, VOL. 9, NO. 5, MAY 2014 An Efficient Offline Delegation Protocol in Mobile RFID Environment Jia-Ning Luo Ming Chuan University, Information & Telecommunications Engineering, Taoyuan County, Taiwan 333 Email: [email protected] Ming-Hour Yang* Chung Yuan Christian University, Information & Computer Engineering, Taoyuan County, Taiwan 320 *Corresponding Author, Email: [email protected] Abstract—In this paper, we propose a new protocol to allow reader, and the delegated reader is allowed to access a delegation transfer between offline mobile readers in the specific tag in the future even in an offline environment mobile RFID (Radio Frequency Identification) environment. [10] [14] [16]. A mobile reader can grant the access rights of a specific tag Fouladgar et al. [5] propose an online delegation and to another reader. Besides, our protocol is efficient and ownership transfer protocol. Lee et al.’s scheme [9] uses secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial of timestamps to manage authorization, but in Lee’s protocol, service (DoS) attacks caused by asynchronous update, if one user updates a tag’s timestamp, others will have to guessing attacks, and counterfeit tags. It also guarantees use the new timestamp to access the tag. When a tag forward/backward secrecy, data privacy, and location reaches its maximum timestamp update times, all the privacy. delegated readers have to connect to their back-end server for new delegation. Yang [15] also proposes an offline Index Terms—Mobile RFID; Offline Delegation; Delegation delegation protocol that stores an access control list (ACL) Transfer on a tag to limit a reader’s access right. He also deploys timestamps in his offline delegation scheme. His back-end I. INTRODUCTION server can delegate the access right to a tag, but the access right cannot be transferred from one reader to another. Radio frequency identification (RFID) has been widely For these reasons, we propose a new scheme to perform applied in logistics management, entrance control, smart offline delegation transfer. In our protocol, the delegation appliances, medical control, and e-wallet services. An of a specific tag is within control. A mobile RFID reader is RFID framework consists of back-end servers, database, allowed limited access times of a specific tag by its RFID readers, and tags. RFID tags include active tags and back-end server. The tag can verify and decrease the passive tags. An active RFID tag contains a battery, and a access counter in each access. After the counter expires, passive tag is powered by radio wave energy from an the reader has to request a new delegation from the RFID reader. Most RFID tags used in supply chains are back-end server. The other reader can request delegation passive ones. Because of the limitation of power from the reader that owns the tag. A delegation transfer is consuming and gate counts, a passive RFID tag can only operated offline without the involvement of the back-end do simple computation and have limited storage capacity. server. After the delegation transfer, the access times of Most of its data is stored on the back-end database servers. the tag are transferred to the new reader, and the access In recent years RFID technology has seen the counter of the previous reader decreases by the same integration of RFID and mobile devices [2] [7] [8]. An amount. The rest of the paper is organized as follows: RFID-embedded cellphone can access a tag and retrieve section 2 details our proposed protocol; section 3 analyzes its data from the back-end server through wireless or 3G the security issues; section 4 deals with performance networks [14]. evaluation and comparison; section 5 concludes our In a mobile RFID environment, even though a mobile scheme. reader can communicate with its back-end server through telecommunications, weak reception or poor network II. OFFLINE DELEGATION PROTOCOL quality can usually affect its performance [3] [4] [5] [9] Our offline delegation transfer protocol includes an [11] [15]. Among RFID’s research, offline delegation initial stage and three protocols: (1) offline reader-tag transfer allows users who have been authorized to access a mutual authentication protocol; (2) readers’ delegation specific tag to transfer a part of their authorization to protocol and (3) offline delegation transfer protocol, as others without Internet connections [1] [10] [12] [16]. To shown in Figure 1. At the initial stage, mobile readers have perform offline delegation, a back-end server has to been delegated authority to a specific tag and authenticate delegate authority of a specific RFID tag to an RFID each other. In the second part, the readers identify and © 2014 ACADEMY PUBLISHER doi:10.4304/jnw.9.5.1114-1120 JOURNAL OF NETWORKS, VOL. 9, NO. 5, MAY 2014 1115 access the tag offline. In the third part a reader delegate his performed offline. Figure 3 details the steps of our access rights to another reader. reader-tag mutual authentication. Reader RIDi Back-end server Reader i 1.offline authentication R,T, Delegation RIDi , Tlisti 1. RequestDelegation , RIDi m m 2.offline reading Generate RK i , ri m m SKi H(Secrectm || RIDi || ri ) DM m LE (SK m , RID || TID || RS || RK m || RC m ) 3.offline delegation i i i m m i i m m m m transfer 2.offline reading Tlisti Tlisti {TIDm , RK i , RCi , DM i ,ri } Tag TID1 2.Tlisti Tlisti Tlisti 1.offline authentication Figure 2. Initial stage Reader RIDj Reader i Tag m Figure 1. Offline coupon delegation transfer scheme RIDi , Tlisti {{TIDm , TIDm , Secretm , TSm , RK m , RC m , DM m ,r m}} i i i i Rlistm Notations uses in this paper are listed in Table 1. m m 1. Request Authentica tion , RIDi , ri , DM i TABLE I. NOTATIONS flag false m m SKi H(Secrcet m RIDi ri ) Tag ’s identifier. m m m Derive RIDi ', TIDm ', RSm , RKi , RCi from DM i Reader ’s identifier. (target reader in delegation transfer) If (RIDi RIDi ') and (TIDm TIDm ') and (RSm TSm ) Secret key shared between and its back-end server. If (RSm TSm ) TS RS , Clear Rlist Tag ’s timestamp. m m m m m Reader’s current timestamp. / Tag ’s current timestamp If (Rlistm {RIDi , RKi , RCi }) m m that a reader holds. Rlistm Rlistm {{RIDi , RKi , RCi }} Counters that indicate reader ’s and reader ’s maximum flag true query times to tag . (on tag’s part) Generate r1 If ( flag true) Counters that indicate reader ’s and reader ’s maximum m m query times to tag . (on reader’s part) M1 LE(RKi ,TIDm || ri || r1) Else Tag ’s access control list. M1 r1 Reader ’s authorization table. m 2. M1 Reader ’s and reader ’s shared keys with tag , Derive TIDm ',ri ' from M1 m m respectively. If (ri ri ')and(TIDm TIDm ') Delegation message, generated by back-end server for Confirm reader i to access tag m. Requested query times in delegation transfer. Figure 3. Mutual authentication protocol Delegation transfer flag. Session key, used to en/decrypt a delegation message. Step 1: Reader i sends a request message Nonce generated by back-end server, used in reader-tag to tag m, along with its own communications, between reader and tag . Random numbers. identifier , a nonce , and a delegation message Hash function. Lightweight symmetric key encryption algorithm. Step 2: Tag m generates a session key and Concatenation of messages. decrypts to derive reader’s identifier , tag’s A. Initial Stage identifier , reader i’s current timestamp , the key , and reader i’s delegated query times . Tag In the initial stage, when an RFID reader i wants to access a tag, it should send a delegation request to the m compares and with and , respectively. It also checks if . If , back-end server, and the server will return a tag-list that contains all the tags owned by the reader, see Figure 2. the reader’s delegated authority expires. If , tag m has to update its timestamp, i.e. , and to The server randomly generates a session key and a clear its access control list . Then tag m stores , nonce . After concatenating , and , and on its . If reader i is valid, tag m and generate the session key , a delegation message sends a message to the reader, as shown in figure3. If contains reader’s and tag’s identifiers, system’s reader i fails to pass the authentication, tag m returns a timestamp , session key , and reader’s maximum random number. query times . Then the server sends to the Step 3: When receiving , reader i derives and reader. and compare them to and . B. Offline Reader-Tag Mutual Authentication Protocol C. Reader’s Delegation Protocol After a reader gets the access right of a specific tag from In our protocol, the delegation of a specific tag is the back-end server, the reader and the tag should do limited. Each time when a reader accesses a tag, a counter mutual authentication to identify each other, which is decrease. After the counter expires, the reader has to © 2014 ACADEMY PUBLISHER 1116 JOURNAL OF NETWORKS, VOL. 9, NO. 5, MAY 2014 request a new delegation from the back-end server. We use Our offline delegation transfer requires a tag and two two counters and to restrict delegated readers’ mobile readers (one to request delegation transfer, the access to a tag, as shown in Figure 4. Detailed steps are as other to transfer authorized query times). Both reader i and follows: reader j have to be delegated authority in advance to access Reader i Tag m tag m.
Recommended publications
  • C•CURE Solutions SALTO Offline Locks
    C•CURE Solutions SALTO Offline Locks Features That Make a Difference: • Seamless integration with C•CURE 9000 security and event management system • Offline, wireless and wireless-ready locks supported The C•CURE 9000 integration with SALTO access to offline locks will expire after • High level interface between offline locks allows communication with the one day, unless a card is updated with C•CURE 9000 and offline lock system SALTO server and control of cardholder a fresh update point transaction. using SHIP (SALTO Host Interface access permissions to offline locks, directly Protocol) from the C•CURE 9000 system. This SHIP Interface • SALTO online readers to update cards for seamless interface supports bi-directional C•CURE 9000 support for SALTO offline offline reader access communication with the SALTO system locks utilizes a high level interface to • Offline transactions shared via cards are using SHIP (Salto Host Interface Protocol). SHIP (SALTO Host Interface Protocol). synchronized with C•CURE 9000 server The SALTO offline lock solution offers C•CURE 9000 and the SALTO offline lock flexibility within any project where the solution exchange cardholder data via • Suitable for storage areas, office spaces cost of a fully wired door is not justified. SHIP communications over an Ethernet and other areas where real-time security monitoring is not a priority SALTO offline locks can be installed on network. SALTO online readers (control almost any type of door ranging from points) are used to update a card with • Flexible design that can be fitted to almost narrow profile, aluminum doors, heavy duty access permissions for offline lock any type of door doors, panic bars, glass doors and many use.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Creating Permanent Test Collections of Web Pages for Information Extraction Research*
    Creating Permanent Test Collections of Web Pages for Information Extraction Research* Bernhard Pollak and Wolfgang Gatterbauer Database and Artificial Intelligence Group Vienna University of Technology, Austria {pollak, gatter}@dbai.tuwien.ac.at Abstract. In the research area of automatic web information extraction, there is a need for permanent and annotated web page collections enabling objective performance evaluation of different algorithms. Currently, researchers are suffering from the absence of such representative and contemporary test collections, especially on web tables. At the same time, creating your own sharable web page collections is not trivial nowadays because of the dynamic and diverse nature of modern web technologies employed to create often short- lived online content. In this paper, we cover the problem of creating static representations of web pages in order to build sharable ground truth test sets. We explain the principal difficulties of the problem, discuss possible approaches and introduce our solution: WebPageDump, a Firefox extension capable of saving web pages exactly as they are rendered online. Finally, we benchmark our system with current alternatives using an innovative automatic method based on image snapshots. Keywords: saving web pages, web information extraction, test data, Firefox, web table ground truth, performance evaluation 1 Introduction In the visions of a future Semantic Web, agents will crawl the web for information related to a given task. With the current web lacking semantic annotation, researchers are working on automatic information extraction systems that allow transforming heterogonous and semi-structured information into structured databases that can be later queried for data analysis. For testing purposes researchers need representative and annotated ground truth test data sets in order to benchmark different extraction algorithms against each other.
    [Show full text]
  • B-GPT: Grundlagen Der EDV Version: 16
    World Wide Web - 1 / 4 - World Wide Web. Aufbau Full Qualified Domain Name (FQDN). Der Name eines Hosts setzt sich aus mehreren Teilen zusammen, die durch Punkte voneinander getrennt sind und deren Gesamtheit als FQDN bezeichnet wird. Nicht erlaubt in FQDN's sind Sonderzeichen mit Ausnahme des Binde- strichs (dh. auch Leerzeichen sind nicht erlaubt), erlaubt dagegen sind Buchstaben und Ziffern, wobei zwischen Groß- und Kleinbuchstaben nicht unterschieden wird. Rechnername.[[Fourth-Level-Domain.]Third-Level-Domain.]Second-Level-Domain.TLD TLD = Top-Level-Domain (First-Level-Domain) Als Beispiel diene der Web Server der University of Texas in Austin, USA, mit dem FQDN www1.cc.utexas.edu • Hostname: Dies ist der eigentliche Name des Rechners. Im Beispiel www1 • 3rd, 4th usw. Level Domain (falls verwendet, wahlfrei): Subdomains (bzw. auch Zonen genannt). Wird eine Domain in Subdomains unterteilt, folgt deren Bezeichnung. Im Beispiel cc • 2nd Level Domain: Dies ist die Bezeichnung des Bereiches, in dem alle Hosts des Betreibers mit eventuellen Subdomains zu- sammengefasst sind. Im Beispiel utexas • Top-Level-Domain - TLD oder 1st Level Domain: Diese Domain gehört einer übergeordneten Struktur an. Die Top-Level Domain wird nicht willkürlich bei Namens- adressen vergeben, sie hat eine feste Bedeutung. Im Beispiel edu. Top Level und 2nd Level Domain sind für Hosts im WAN nicht frei wählbar, sondern müssen registriert werden. Bei einigen TLD's wie zum Beispiel .uk unterliegen auch einige 3rd Level Domains det Registrierungspflicht. Die Regis- trierung erfolgt beim NIC (Network Information Center). Die Festlegung der TLD Bezeichnungen obliegt der ICANN (Internet Corporation for Assigned Names and Num- bers): http://www.icann.org/tlds/ Die IP Nummern Pools werden regional verwaltet, also auch nicht willkürlich vergeben: AfriNIC für Afrika: http://www.afrinic.net APNIC für Asien u.
    [Show full text]
  • Dictionary of Health Information Technology and Security
    DICTIONARY OF HEALTH INFORMATION TECHNOLOGY AND SECURITY Dr. David Edward Marcinko, MBA , CFP© Certifi ed Medical Planner© Editor-in-Chief Hope Rachel Hetico, RN, MSHA, CPHQ Certifi ed Medical Planner© Managing Editor NEW YORK 33021009_FM1.indd021009_FM1.indd i 003/17/20073/17/2007 116:48:506:48:50 Copyright © 2007 Springer Publishing Company, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmit- ted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of Springer Publishing Company, LLC. Springer Publishing Company, LLC 11 West 42nd Street New York, NY 10036 www.springerpub.com Acquisitions Editor: Sheri W. Sussman Production Editor: Carol Cain Cover design: Mimi Flow Composition: Apex Publishing, LLC 07 08 09 10/ 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Dictionary of health information technology and security / David Edward Marcinko, editor-in-chief, Hope Rachel Hetico, managing editor. p. ; cm. Includes bibliographical references. ISBN-13: 978-0-8261-4995-4 (alk. paper) ISBN-10: 0-8261-4995-2 (alk. paper) 1. Medical informatics—Dictionaries. 2. Medicine—Information technology—Dictionaries. 3. Medical informatics—Security measures— Dictionaries. I. Marcinko, David E. (David Edward) II. Hetico, Hope R. [DNLM: 1. Informatics—Dictionary—English. 2. Medical Informatics— Dictionary—English. 3. Computer Communication Networks—Dictionary— English. 4. Computer Security—Dictionary—English. W 13 D557165 2007] R858.D53 2007 610.3—dc22 2007005879 Printed in the United States of America by RR Donnelley. 33021009_FM1.indd021009_FM1.indd iiii 003/17/20073/17/2007 116:48:516:48:51 Th e Dictionary of Health Information Technology and Security is dedicated to Edward Anthony Marcinko Sr., and Edward Anthony Marcinko Jr., of Fell’s Point, Maryland.
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]
  • UNIX-Verzeichnisbaum
    Inhalt Vorwort ........................................................................................................ 23 TEIL I: KONZEPTE 1Konzepte............................................................................... 31 1.1 Dateien ..................................................................................... 32 1.1.1 Dateitypen ................................................................. 32 1.1.2 Dateinamen ............................................................... 33 1.2 Datenstrom .............................................................................. 34 1.3 Verzeichnisse ........................................................................... 35 1.3.1 Umgang mit Verzeichnissen ................................... 35 1.3.2 Der UNIX-Verzeichnisbaum ................................... 36 1.3.3 Was ist wo? ............................................................... 36 1.3.4 Einbinden von Speichermedien ............................. 39 1.3.5 Ein Blick unter die Haube: i-nodes ....................... 42 1.4 Schichten und Shells .............................................................. 43 1.5 Das offene System .................................................................. 44 1.6 Mehrbenutzersystem .............................................................. 45 1.6.1 Eigentumsrechte von Dateien und Verzeichnissen .......................................................... 46 1.6.2 Der Administrator .................................................... 47 1.7 Konsequenz: Sicherheit und Wartbarkeit
    [Show full text]
  • Mcgraw Hill: PC/MAC Online and Offline Mcgraw Hill: PC/MAC Online and Offline
    Portal > Knowledgebase > McGrawHill eBookstore > McGraw Hill: PC/MAC online and offline McGraw Hill: PC/MAC online and offline Roshan - 2021-09-29 - 0 Comments - in McGrawHill eBookstore Click on the Login button on the top right corner of the page. Existing Users can enter their credentials to Log in. New Users can click on the "sign up" button to create new accounts and access the eBooks. Click on your subscribed eBook and click on the "Online Reading Options" Once you click on the online reader, the eBook opens in the reader with all the feautures that enable you to read your book at your convenience. The epub reader comes with the Table Of Contents, Search, Listings, Bookmarks, Zoom and Settings. Listings: Shows all your Bookmarks, Highlights and Notes, in one location. Settings: Gives you options to choose a Color Theme for the reader and also switch on/off your Last-Read Location Offline reader installations Once you login to the McGraw Hill eBook site using your account you will notice a button “Download iPublishCentral Reader” Figure: Download iPublishCentral Reader Click on the download button to go to installation page. Click on install button to setup iPublishCentral reader on your system. The iPublishCentral Reader bookshelf is displayed. If the user is logging in for the first time, then a message "No books have been downloaded to the bookshelf" is displayed. Figure: Bookshelf Click the Login button on the upper right corner of the screen. Figure: Login Screen for an Normal user To log in into iPublishCentral Reader, you should have an online account in McGraw Hill portal.
    [Show full text]
  • Creating Permanent Test Collections of Web Pages for Information Extraction Research*
    Creating Permanent Test Collections of Web Pages for Information Extraction Research* Bernhard Pollak and Wolfgang Gatterbauer Database and Artificial Intelligence Group Vienna University of Technology, Austria {pollak, gatter}@dbai.tuwien.ac.at Abstract. In the research area of automatic web information extraction, there is a need for permanent and annotated web page collections enabling objective performance evaluation of different algorithms. Currently, researchers are suffering from the absence of such representative and contemporary test collections, especially on web tables. At the same time, creating your own sharable web page collections is not trivial nowadays because of the dynamic and diverse nature of modern web technologies employed to create often short- lived online content. In this paper, we cover the problem of creating static representations of web pages in order to build sharable ground truth test sets. We explain the principal difficulties of the problem, discuss possible approaches and introduce our solution: WebPageDump, a Firefox extension capable of saving web pages exactly as they are rendered online. Finally, we benchmark our system with current alternatives using an innovative automatic method based on image snapshots. Keywords: saving web pages, web information extraction, test data, Firefox, web table ground truth, performance evaluation 1 Introduction In the visions of a future Semantic Web, agents will crawl the web for information related to a given task. With the current web lacking semantic annotation, researchers are working on automatic information extraction systems that allow transforming heterogonous and semi-structured information into structured databases that can be later queried for data analysis. For testing purposes researchers need representative and annotated ground truth test data sets in order to benchmark different extraction algorithms against each other.
    [Show full text]
  • Elibrary User Guide
    eLibrary User Guide Empowering Knowledge Contents 1 Your Bookshelf ...................................................................................... 3 1a) Creating shelves ....................................................................................3 2 Searching for books .............................................................................. 4 3 Online & Offline Reading .................................................................... 4 3a) Reading online ......................................................................................4 3b) Reading offline ......................................................................................5 4 Standard Features ................................................................................ 6 4a) Copy & paste ..........................................................................................6 4b) Deep links...............................................................................................7 4c) Citations ................................................................................................7 5 Advanced Features ................................................................................ 8 5a) Register as an individual user ...............................................................8 5b) Creating digital notes ............................................................................9 5c) Printing pages .....................................................................................10 5d) Highlighting text .................................................................................11
    [Show full text]
  • Wiktionary App Download Wiktionary App Download
    wiktionary app download Wiktionary app download. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67a46b6f88f6c3e8 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Kiwix at a glance. The Kiwix Reader runs on all platforms and operating systems – mobile (Android and iOS), desktop (macOS, GNU/Linux, and Windows) and even as browser extension (Chrome or Firefox). Simply chose the one you need, and go offline! Content Packages. Our content packages (aka zim files) are exact copies of the best free content available on the Web to use offline: Wikipedia, Wiktionary, Project Gutenberg, and many more coming every month. More than a 1,000 files to chose from, in 100+ languages! Custom Apps. Our Custom Apps combine a specific content package and a reader into one easy to install app. Wikimed, the medical encyclopedia, is the best known. Custom Apps work on iOS, Android and Windows devices. Kiwix-Serve. Kiwix-Serve is a ZIM compatible web server: it allows you to deliver content over the HTTP protocol within your local network.
    [Show full text]
  • Technical Evaluation Report 58
    International Review of Research in Open and Distance Learning Volume 7, Number 3 ISSN: 1492-3831 December – 2006 Technical Evaluation Report 58. RSS Windows Editors: First impressions Steve Swettenham Masters of Distance Education Program Athabasca University - Canada's Open University Background An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006). The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are “pushed” from the publishing site whenever new material is added to that site (see Figure 1). This allows notification of new content of possible interest, fed with anonymity to subscribers, and reduces email clutter. Figure 1 is an example of a simple organized subscription that was obtained by accessing a website only once, then each time afterwards the RSS feed automatically presents the updated information. The various subscribed RSS feeds can be organized to create personalized displays, much like a customized online newspaper, with stories, articles, podcasts, video, or graphics of interest tailored to each user. Given the plethora of daily Internet information, RSS is a real-time organizer that may save users time and frustration in covering the most with the least effort. Figure 1. Web browser with a simple RSS reader add-on displaying a RSS feed with three items. 2 Sweettenham ~ Technical Evaluation Report 58: RSS Windows Editors: First impressions Given this potential communication connectivity, I was interested in exploring how one adds RSS feeds to their own web site so that items can easily be “pushed” to interested subscribers, much as is available by subscribing to the RSS feed for this journal (www.irrodl.org).
    [Show full text]