首页 > 最新文献

2009 6th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
Device Driver Isolation within Virtualized Embedded Platforms 虚拟化嵌入式平台中的设备驱动程序隔离
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784877
Sebastian Sumpf, J. Brakensiek
Mobile device manufacturers are facing the challenge, to maintain device drivers across an increasing number of product variants. Isolation of device drivers into a separate domain using virtualization technology offers a way out of the resulting porting dilemma. This paper explains the architecture concept based on the L4/Fiasco microkernel, using an exemplary block device. The paper specifically details challenges and solutions with respect to enabling DMA access and ensuring access protection in the virtualized environment. Benchmark results are given to show the performance impact of the chosen architecture.
移动设备制造商正面临着一个挑战,即在越来越多的产品变体中维护设备驱动程序。使用虚拟化技术将设备驱动程序隔离到单独的域中,可以解决由此产生的移植困境。本文使用一个示例块设备解释了基于L4/Fiasco微内核的体系结构概念。本文详细介绍了在虚拟化环境中实现DMA访问和确保访问保护方面的挑战和解决方案。给出了基准测试结果,以显示所选架构对性能的影响。
{"title":"Device Driver Isolation within Virtualized Embedded Platforms","authors":"Sebastian Sumpf, J. Brakensiek","doi":"10.1109/CCNC.2009.4784877","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784877","url":null,"abstract":"Mobile device manufacturers are facing the challenge, to maintain device drivers across an increasing number of product variants. Isolation of device drivers into a separate domain using virtualization technology offers a way out of the resulting porting dilemma. This paper explains the architecture concept based on the L4/Fiasco microkernel, using an exemplary block device. The paper specifically details challenges and solutions with respect to enabling DMA access and ensuring access protection in the virtualized environment. Benchmark results are given to show the performance impact of the chosen architecture.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effects of Mobility in Hierarchical Mobile Ad Hoc Networks 分层移动自组网中移动性的影响
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784895
P. S. Prasad, P. Agrawal, K. Sivalingam
In this paper, we study the effects of mobility on network parameters in hierarchical ad hoc networks. Several mobility models have been designed and studied to mimic the behavior of real world mobility in networks. They have been successful in modeling the movement of mobile nodes in simulations. However, in this work, we show that several mobility models fall short of extending the same result to hierarchical networks. Most mobility models can only predict the movement of nodes in a single cell or cluster. When mobile nodes start moving into adjacent clusters, the time required for handoff and other protocol overhead issues alter the throughput. This leads to drastic drop in throughput and increased latency in packet delivery. Also, commonly used routing protocols do not adequately support handling high mobility and frequent route discovery issues. We evaluate the performances of various routing protocols and mobility models in a highly mobile hierarchical ad hoc network using NS2 simulation.
本文研究了分层自组织网络中移动性对网络参数的影响。为了模拟现实世界网络中的移动行为,已经设计和研究了几个移动模型。他们已经成功地在模拟中模拟了移动节点的运动。然而,在这项工作中,我们表明一些移动性模型无法将相同的结果扩展到分层网络。大多数迁移模型只能预测单个细胞或集群中节点的迁移。当移动节点开始移动到相邻集群时,切换所需的时间和其他协议开销问题会改变吞吐量。这将导致吞吐量急剧下降,并增加数据包传递的延迟。此外,常用的路由协议不能充分支持处理高移动性和频繁的路由发现问题。我们使用NS2仿真评估了在高度移动的分层自组织网络中各种路由协议和移动模型的性能。
{"title":"Effects of Mobility in Hierarchical Mobile Ad Hoc Networks","authors":"P. S. Prasad, P. Agrawal, K. Sivalingam","doi":"10.1109/CCNC.2009.4784895","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784895","url":null,"abstract":"In this paper, we study the effects of mobility on network parameters in hierarchical ad hoc networks. Several mobility models have been designed and studied to mimic the behavior of real world mobility in networks. They have been successful in modeling the movement of mobile nodes in simulations. However, in this work, we show that several mobility models fall short of extending the same result to hierarchical networks. Most mobility models can only predict the movement of nodes in a single cell or cluster. When mobile nodes start moving into adjacent clusters, the time required for handoff and other protocol overhead issues alter the throughput. This leads to drastic drop in throughput and increased latency in packet delivery. Also, commonly used routing protocols do not adequately support handling high mobility and frequent route discovery issues. We evaluate the performances of various routing protocols and mobility models in a highly mobile hierarchical ad hoc network using NS2 simulation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication 智能普适网络认证:基于S/Key的设备认证
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784994
Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee
The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety of threats. Intelligent pervasive environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose authentication in a intelligent pervasive environment security for guaranteeing reliability and availability including authentication, authorization system. We proposed S/Key based authentication, scheme for secure remote access in intelligent pervasive environments. Furthermore, we describes smart environment authentication which is the basic and essential element in the pervasive network security. And our device authentication concept can offer pervasive network service users convenience and security.
智能普适性网络环境是将无形的、不可见的计算机通过网络相互连接,使用户可以随时使用计算机的东西。随着大量普适网络服务的出现和智能环境向普适计算环境的扩展,我们需要保护智能普适环境系统免受非法访问和各种威胁。智能普适性环境由于接入互联网,容易受到各种网络攻击,包括黑客攻击、恶意代码、蠕虫、病毒、DoS攻击、窃听等。为此,本文提出了一种智能普适环境下的身份认证系统,以保证系统的可靠性和可用性。针对智能普适环境下的安全远程访问,提出了基于S/Key的认证方案。在此基础上,介绍了普适网络安全中最基本、最基本的智能环境认证技术。我们的设备认证理念可以为普适网络服务用户提供便利性和安全性。
{"title":"Intelligent Pervasive Network Authentication: S/Key Based Device Authentication","authors":"Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee","doi":"10.1109/CCNC.2009.4784994","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784994","url":null,"abstract":"The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety of threats. Intelligent pervasive environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose authentication in a intelligent pervasive environment security for guaranteeing reliability and availability including authentication, authorization system. We proposed S/Key based authentication, scheme for secure remote access in intelligent pervasive environments. Furthermore, we describes smart environment authentication which is the basic and essential element in the pervasive network security. And our device authentication concept can offer pervasive network service users convenience and security.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Legal Environment for Copyright Protection and Trust Management in China 中国版权保护的法律环境与信托管理
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784942
Lei Sun, Li Zhao, Xin Tong, W. Carey
This paper surveys the legal and regulatory environment surrounding copyright protection technologies, focusing on China in particular. The paper begins with a discussion of some of the interactions between law and technology in copyright protection, which has led to the creation of international treaties to protect the technologies that protect copyrights. A comparison of the various national responses to these conventions is presented, followed by a discussion of the structure and development of the relatively advanced Chinese system for copyright protection technology. The last section outlines some of the unique challenges that have arisen in China for copyright protection technologies and the businesses that depend upon them.
本文调查了版权保护技术的法律和监管环境,并以中国为重点。本文首先讨论了版权保护中法律和技术之间的一些相互作用,这导致了国际条约的产生,以保护保护版权的技术。本文比较了各国对这些公约的反应,然后讨论了中国相对先进的版权保护技术体系的结构和发展。最后一部分概述了中国在版权保护技术和依赖这些技术的企业方面出现的一些独特挑战。
{"title":"The Legal Environment for Copyright Protection and Trust Management in China","authors":"Lei Sun, Li Zhao, Xin Tong, W. Carey","doi":"10.1109/CCNC.2009.4784942","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784942","url":null,"abstract":"This paper surveys the legal and regulatory environment surrounding copyright protection technologies, focusing on China in particular. The paper begins with a discussion of some of the interactions between law and technology in copyright protection, which has led to the creation of international treaties to protect the technologies that protect copyrights. A comparison of the various national responses to these conventions is presented, followed by a discussion of the structure and development of the relatively advanced Chinese system for copyright protection technology. The last section outlines some of the unique challenges that have arisen in China for copyright protection technologies and the businesses that depend upon them.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G Mobile Phone Concept 5G手机概念
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784727
T. Janevski
Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to-end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.
如今,3G移动系统已经开始为实时和非实时服务提供IP连接。另一方面,有许多无线技术已被证明是重要的,其中最重要的是802.11无线局域网(WLAN)和802.16无线城域网(WMAN),以及用于数字电视和无线电广播的自组织无线个人局域网(WPAN)和无线网络。然后,4G的概念已经被广泛讨论,几乎可以肯定的是,4G将在一个共同的保护伞下包括几个标准,类似于3G,但使用IEEE 802。从一开始就包含Xx无线移动网络。本文的主要贡献是5G(第五代)移动网络概念的定义,它被视为以用户为中心的概念,而不是像3G那样以运营商为中心的概念或像4G那样以服务为中心的概念。在提出的概念中,移动用户是最重要的。5G终端将拥有软件定义的无线电和调制方案,以及新的错误控制方案,可以在运行中从互联网下载。用户终端的发展被视为5G移动网络的一个重点。终端将同时访问不同的无线技术,终端应该能够组合来自不同技术的不同流量。每个网络将负责处理用户移动性,而终端将为给定的服务在不同的无线/移动接入网络提供商之间做出最终选择。本文还提出了智能互联网电话的概念,在单次端到端连接过程中,手机可以根据所选择的约束条件选择最佳连接并动态更改。与现有的3G和即将到来的4G移动技术相比,本文中的提议是移动网络理念的根本转变,这个概念在这里被称为5G。
{"title":"5G Mobile Phone Concept","authors":"T. Janevski","doi":"10.1109/CCNC.2009.4784727","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784727","url":null,"abstract":"Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to-end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Parallelization and analysis of speech recognition on mobile multi-core processor 移动多核处理器上语音识别的并行化与分析
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784794
Seung Mo Cho, D. Im, H. Song
Speech recognition is an important application which requires large amount of computation and data. We parallelized speech recognition on ARM11-mpcore, one of the mobile multi-core processors. We achieved 1.92 times speed-up using four cores. We argue that this is sufficiently close to the theoretical best regarding Amdahl's law. We also evaluated it on Intel Core2Quad to derive requirements for future mobile multi-core platforms.
语音识别是一个需要大量计算量和数据量的重要应用。我们在arm11 mpcore(一种移动多核处理器)上并行化了语音识别。我们使用四核实现了1.92倍的加速。我们认为这已经足够接近阿姆达尔定律的理论最佳值。我们还在英特尔Core2Quad上对其进行了评估,以得出未来移动多核平台的需求。
{"title":"Parallelization and analysis of speech recognition on mobile multi-core processor","authors":"Seung Mo Cho, D. Im, H. Song","doi":"10.1109/CCNC.2009.4784794","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784794","url":null,"abstract":"Speech recognition is an important application which requires large amount of computation and data. We parallelized speech recognition on ARM11-mpcore, one of the mobile multi-core processors. We achieved 1.92 times speed-up using four cores. We argue that this is sufficiently close to the theoretical best regarding Amdahl's law. We also evaluated it on Intel Core2Quad to derive requirements for future mobile multi-core platforms.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Refresh-Based Tag Identification Schemes 基于刷新的标签识别方案研究
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784992
Jihoon Cho
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.
给出了一种使用刷新技术的标签识别方案的定义。我们还为这种方案定义了隐私的概念,它准确地反映了现实世界的威胁和标记功能。通用重加密作为一种刷新技术,被提出作为普适计算环境下增强隐私的一种方法。然而,它允许在标签识别方案中隐藏对抗性通信信道。不可破坏加密随后被引入以解决这一限制。我们展示了如何使用这两种加密技术的安全属性来帮助增强基于刷新的标签识别方案中的隐私,并讨论了它们的局限性。我们还建议在RFID应用中实际使用刷新方法。
{"title":"On Refresh-Based Tag Identification Schemes","authors":"Jihoon Cho","doi":"10.1109/CCNC.2009.4784992","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784992","url":null,"abstract":"We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RealClass: An Interactive-Enable Multi-Channel Live Teaching System on Overlay Service Network RealClass:基于覆盖业务网络的交互式多通道实时教学系统
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784999
Weizhan Zhang, Q. Zheng, Yanze Lian, Xingzhuo Liu, Jixin Hou
In this demonstration, a prototype of live teaching system on overlay service network is presented. The system evolves the following novel characteristics: (1) Firstly, an infrastructure-based overlay multicast structure is introduced, providing multi-channel live media delivery with service differentiation on shared overlay service network. (2) Secondly, the system can support two-way interactive media as well as one-way live media at the same time. The enabling technology is a dynamic user interaction adjustment based on pre-reserved resources in the top layers of the tree. In the demonstration, diversified real-time services will be presented, including audio, video, instant message delivery for multi-channel live teaching scenario, and flexible interactive communication for group discussion.
在演示中,提出了一种基于覆盖业务网络的实时教学系统原型。该系统具有以下新特点:(1)首先,引入了一种基于基础设施的覆盖组播结构,在共享覆盖业务网络上提供服务差异化的多通道媒体直播。(2)其次,系统可以同时支持双向互动媒体和单向直播媒体。使能技术是基于树的顶层预预留资源的动态用户交互调整。在演示中,将展示多样化的实时服务,包括音频、视频、多通道实时教学场景的即时消息传递,以及小组讨论的灵活互动交流。
{"title":"RealClass: An Interactive-Enable Multi-Channel Live Teaching System on Overlay Service Network","authors":"Weizhan Zhang, Q. Zheng, Yanze Lian, Xingzhuo Liu, Jixin Hou","doi":"10.1109/CCNC.2009.4784999","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784999","url":null,"abstract":"In this demonstration, a prototype of live teaching system on overlay service network is presented. The system evolves the following novel characteristics: (1) Firstly, an infrastructure-based overlay multicast structure is introduced, providing multi-channel live media delivery with service differentiation on shared overlay service network. (2) Secondly, the system can support two-way interactive media as well as one-way live media at the same time. The enabling technology is a dynamic user interaction adjustment based on pre-reserved resources in the top layers of the tree. In the demonstration, diversified real-time services will be presented, including audio, video, instant message delivery for multi-channel live teaching scenario, and flexible interactive communication for group discussion.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasibility of a Socially Aware Authentication Scheme 社会感知认证方案的可行性
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784910
Andrew Frankel, Muthucumaru Maheswaran
Social interaction is already a proven component of informal identification: humans are naturally skilled at recognizing other people and are unlikely to be duped by impersonation. Based on this premise, a fourth-factor, someone-you-know, has already been proposed as an emergency authentication method. This paper explores leveraging a user's preexisting social actions as a primary authentication tool, one that operates transparently and automatically without explicit user guidance. Specifically, we describe the feasibility of capturing a user's local social context using short range wireless devices and evaluate the uniqueness of that context in comparison to that of possible aggressors.
社会互动已经被证明是非正式身份的一个组成部分:人类天生擅长识别他人,不太可能被模仿所欺骗。基于这个前提,第四个因素,你认识的人,已经被提议作为一种紧急身份验证方法。本文探讨了利用用户先前存在的社交行为作为主要身份验证工具,这种工具可以透明且自动地运行,无需明确的用户指导。具体来说,我们描述了使用短距离无线设备捕获用户本地社会背景的可行性,并与可能的攻击者相比评估了该背景的独特性。
{"title":"Feasibility of a Socially Aware Authentication Scheme","authors":"Andrew Frankel, Muthucumaru Maheswaran","doi":"10.1109/CCNC.2009.4784910","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784910","url":null,"abstract":"Social interaction is already a proven component of informal identification: humans are naturally skilled at recognizing other people and are unlikely to be duped by impersonation. Based on this premise, a fourth-factor, someone-you-know, has already been proposed as an emergency authentication method. This paper explores leveraging a user's preexisting social actions as a primary authentication tool, one that operates transparently and automatically without explicit user guidance. Specifically, we describe the feasibility of capturing a user's local social context using short range wireless devices and evaluate the uniqueness of that context in comparison to that of possible aggressors.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TLS-Tandem: A Smart Card for WEB Applications TLS-Tandem:用于WEB应用程序的智能卡
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784998
P. Urien
This demonstration shows a WEB application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the WEB site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.
这个演示展示了一个提供多媒体内容的WEB应用程序,其访问完全由一张智能卡根据一个名为TLS-Tandem的创新上下文控制。WEB站点所需和智能卡使用的凭据(证书、私钥)通过AJAX设施分发。
{"title":"TLS-Tandem: A Smart Card for WEB Applications","authors":"P. Urien","doi":"10.1109/CCNC.2009.4784998","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784998","url":null,"abstract":"This demonstration shows a WEB application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the WEB site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2009 6th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1