首页 > 最新文献

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

英文 中文
Public-device resource management preventing danger of exposure 公共设备资源管理,防止暴露危险
Ken'ichiro Kanehana, H. Saito, Y. Tobe
In this paper we propose a new scheme of managing resources on public devices used by private devices. Due to the advancement of wireless LAN technologies, wireless hot spots are becoming popular in the cities. In such hot spots, we can expect that public devices such as large displays and printers be available in the future as well. Assuming that these public devices are used by anonymous group of users, there are several threats of group-secret information being exposed or unintentionally left on public devices. To overcome the problems, secure management of personalization association (SAPEA) is introduced. SAPEA has two fundamental mechanisms: accessible-zone based and soft-state management of public devices. In particular, files which are the fundamental resources in SAPEA can be extinguished even when they are being used to avoid exposure to illegitimate users. In this paper we describe the design and implementation of SAPEA on Linux PCs with Bluetooth.
本文提出了一种管理私有设备使用的公共设备资源的新方案。由于无线局域网技术的进步,无线热点在城市中越来越流行。在这样的热点地区,我们可以期待大型显示器和打印机等公共设备在未来也可以使用。假设这些公共设备是由匿名用户组使用的,则存在一些组秘密信息被暴露或无意中留在公共设备上的威胁。为了克服这些问题,引入了个性化关联安全管理(SAPEA)。SAPEA有两个基本机制:基于可访问区域和公共设备的软状态管理。特别是作为SAPEA基础资源的文件,即使在使用时也可以被删除,以避免被非法用户使用。本文介绍了基于蓝牙的Linux pc机SAPEA的设计与实现。
{"title":"Public-device resource management preventing danger of exposure","authors":"Ken'ichiro Kanehana, H. Saito, Y. Tobe","doi":"10.1109/AINA.2004.1283856","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283856","url":null,"abstract":"In this paper we propose a new scheme of managing resources on public devices used by private devices. Due to the advancement of wireless LAN technologies, wireless hot spots are becoming popular in the cities. In such hot spots, we can expect that public devices such as large displays and printers be available in the future as well. Assuming that these public devices are used by anonymous group of users, there are several threats of group-secret information being exposed or unintentionally left on public devices. To overcome the problems, secure management of personalization association (SAPEA) is introduced. SAPEA has two fundamental mechanisms: accessible-zone based and soft-state management of public devices. In particular, files which are the fundamental resources in SAPEA can be extinguished even when they are being used to avoid exposure to illegitimate users. In this paper we describe the design and implementation of SAPEA on Linux PCs with Bluetooth.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A packet scheduling scheme for broadband wireless networks with heterogeneous services 一种面向异构业务宽带无线网络的分组调度方案
Haw-Yun Shin, Jean-Lien C. Wu, Yi-Hsien Wu
A frame-based packet scheduling scheme, the pinwheel scheduling (PWS) scheme, is proposed and investigated at the medium access control (MAC) layer in broadband wireless networks. The objective of the proposed scheduling scheme is to provide, respectively, low delay and low jitter for real-time traffic and short queue length for nonreal-time traffic. We have demonstrated in this paper that the proposed PWS scheme not only satisfies the packet-level QoS requirements but also has low implementation cost. As the number of constant bit rate (CBR) connections increases, variable bit rate (VBR) traffic would suffer a larger jitter, the PWS with modular strategy (PWS/MS) scheme is proposed to further enhance the PWS scheme. We also introduce two different slot-reuse strategies named real-time traffic first (RTF) and longest queue first (LQF), respectively, to improve the resource utilization. In order to demonstrate the performance of the PWS and PWS/MS schemes, comparisons are made with existing schemes such as the round-robin (RR) and weighted-round-robin (WRR) by using the OPNET software. Simulation results show that the proposed schemes are capable of maintaining the lowest delay and jitter for VBR and CBR traffic while not sacrificing the available bit rate (ABR) traffic.
提出并研究了宽带无线网络介质访问控制(MAC)层一种基于帧的分组调度方案——风车调度(PWS)方案。所提出的调度方案的目标是分别为实时流量提供低延迟和低抖动,为非实时流量提供短队列长度。本文的研究表明,所提出的PWS方案不仅满足分组级QoS要求,而且具有较低的实现成本。随着恒比特率(CBR)连接数量的增加,可变比特率(VBR)流量将遭受更大的抖动,提出了PWS模块化策略(PWS/MS)方案来进一步改进PWS方案。我们还引入了两种不同的插槽重用策略,分别称为实时流量优先(RTF)和最长队列优先(LQF),以提高资源利用率。为了验证PWS和PWS/MS方案的性能,利用OPNET软件与现有的轮询(RR)和加权轮询(WRR)方案进行了比较。仿真结果表明,该方案能够在不牺牲可用比特率(ABR)的情况下,保持VBR和CBR业务的最低延迟和抖动。
{"title":"A packet scheduling scheme for broadband wireless networks with heterogeneous services","authors":"Haw-Yun Shin, Jean-Lien C. Wu, Yi-Hsien Wu","doi":"10.1109/AINA.2004.1283821","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283821","url":null,"abstract":"A frame-based packet scheduling scheme, the pinwheel scheduling (PWS) scheme, is proposed and investigated at the medium access control (MAC) layer in broadband wireless networks. The objective of the proposed scheduling scheme is to provide, respectively, low delay and low jitter for real-time traffic and short queue length for nonreal-time traffic. We have demonstrated in this paper that the proposed PWS scheme not only satisfies the packet-level QoS requirements but also has low implementation cost. As the number of constant bit rate (CBR) connections increases, variable bit rate (VBR) traffic would suffer a larger jitter, the PWS with modular strategy (PWS/MS) scheme is proposed to further enhance the PWS scheme. We also introduce two different slot-reuse strategies named real-time traffic first (RTF) and longest queue first (LQF), respectively, to improve the resource utilization. In order to demonstrate the performance of the PWS and PWS/MS schemes, comparisons are made with existing schemes such as the round-robin (RR) and weighted-round-robin (WRR) by using the OPNET software. Simulation results show that the proposed schemes are capable of maintaining the lowest delay and jitter for VBR and CBR traffic while not sacrificing the available bit rate (ABR) traffic.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A secure m-commerce model based on wireless local area network 基于无线局域网的安全移动商务模型
Xiaohui Li, W. Kou
The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.
本文重点研究了一种基于无线局域网的安全移动商务模型。通过接入流程、漫游管理流程和电子交易流程对该模型进行了研究。为了解决无线局域网中的安全问题,提出了一种新的无线局域网认证方法,该方法通过接入点(AP)和移动代理(MA)对移动节点(MN)进行两次认证,并使用PKI/CA机制在注册过程中对所有设备进行认证。最后,分析了该模型的优点。
{"title":"A secure m-commerce model based on wireless local area network","authors":"Xiaohui Li, W. Kou","doi":"10.1109/AINA.2004.1283857","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283857","url":null,"abstract":"The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A small IP forwarding table using hashing 一个使用哈希的小IP转发表
Yeim-Kuan Chang, Wen-Hsin Cheng
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per second. Reducing the required memory size of the forwarding table is a possible solution since small forward table can be integrated into the application specific integrated circuit (ASIC). In this paper a hash technique is developed to make the IP forwarding table as small as possible. The experiments show that the required memory size of the proposed scheme is smaller than other existing schemes for a large routing table.
随着互联网对高带宽需求的增加,需要构建每秒转发数百万数据包的下一代路由器。减小转发表所需的内存大小是一种可能的解决方案,因为小的转发表可以集成到专用集成电路(ASIC)中。本文提出了一种使IP转发表尽可能小的哈希技术。实验结果表明,对于大型路由表,该方案所需的内存比现有方案要小。
{"title":"A small IP forwarding table using hashing","authors":"Yeim-Kuan Chang, Wen-Hsin Cheng","doi":"10.1109/AINA.2004.1283956","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283956","url":null,"abstract":"As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per second. Reducing the required memory size of the forwarding table is a possible solution since small forward table can be integrated into the application specific integrated circuit (ASIC). In this paper a hash technique is developed to make the IP forwarding table as small as possible. The experiments show that the required memory size of the proposed scheme is smaller than other existing schemes for a large routing table.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed replication and caching: a mechanism for architecting responsive Web services 分布式复制和缓存:用于构建响应式Web服务的机制
V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido
The focus is on the mechanism that supports the provision of the adequate service level by relying on Web system architecture with multinode clustering. Replication of Web documents can improve both performance and reliability of the Web service. Server selection algorithms allow Web clients to select one of the replicated servers which is "close " to them and thereby minimize the response time of the Web service.
重点是通过依赖具有多节点集群的Web系统体系结构来支持提供适当服务级别的机制。Web文档的复制可以提高Web服务的性能和可靠性。服务器选择算法允许Web客户机选择与它们“接近”的复制服务器之一,从而最小化Web服务的响应时间。
{"title":"Distributed replication and caching: a mechanism for architecting responsive Web services","authors":"V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido","doi":"10.1109/AINA.2004.1283805","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283805","url":null,"abstract":"The focus is on the mechanism that supports the provision of the adequate service level by relying on Web system architecture with multinode clustering. Replication of Web documents can improve both performance and reliability of the Web service. Server selection algorithms allow Web clients to select one of the replicated servers which is \"close \" to them and thereby minimize the response time of the Web service.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bandwidth efficiency of an image compression method for information hiding 一种用于信息隐藏的图像压缩方法的带宽效率
Chinchen Chang, T. Lu, Yi-Long Liu
In order to improve the compression rate of vector quantization (VQ) during compression, a re-encoding scheme, called spiral scan re-encoding (SSR), was designed to compact the indices in VQ. Based on the SSR scheme, we propose a novel lossless hiding scheme, called IHSSR. When the scheme is used, information is hidden in the compression code for increasing the bandwidth efficiency of the compressed code. The IHSSR system was developed to test the performance of the IHSSR scheme. According to the experimental results, the IHSSR system can efficiently hide secret information in the compression code of indices without modifying its content. The decoding process can obtain the hidden secret information and the indices. Only a small number of extra bits are needed to record the corresponding information.
为了提高矢量量化(VQ)在压缩过程中的压缩率,设计了一种螺旋扫描重编码(SSR)方案来压缩矢量量化(VQ)中的指标。在此基础上,提出了一种新的无损隐藏方案——IHSSR。该方案将信息隐藏在压缩码中,提高了压缩码的带宽效率。为了测试IHSSR方案的性能,开发了IHSSR系统。实验结果表明,该系统可以在不修改索引压缩码内容的情况下,有效地隐藏索引压缩码中的秘密信息。解码过程可以获得隐藏的秘密信息和索引。只需要少量额外的比特来记录相应的信息。
{"title":"Bandwidth efficiency of an image compression method for information hiding","authors":"Chinchen Chang, T. Lu, Yi-Long Liu","doi":"10.1109/AINA.2004.1283947","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283947","url":null,"abstract":"In order to improve the compression rate of vector quantization (VQ) during compression, a re-encoding scheme, called spiral scan re-encoding (SSR), was designed to compact the indices in VQ. Based on the SSR scheme, we propose a novel lossless hiding scheme, called IHSSR. When the scheme is used, information is hidden in the compression code for increasing the bandwidth efficiency of the compressed code. The IHSSR system was developed to test the performance of the IHSSR scheme. According to the experimental results, the IHSSR system can efficiently hide secret information in the compression code of indices without modifying its content. The decoding process can obtain the hidden secret information and the indices. Only a small number of extra bits are needed to record the corresponding information.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A graph-based methodology for analyzing IP spoofing attack 基于图的IP欺骗攻击分析方法
Voravud Santiraveewan, Y. Permpoontanalarp
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards a victim. We propose a new methodology for verifying the vulnerability of firewall configurations to IP spoofing attack and for synthesizing IP spoofing-free configurations. Our methodology is based on graph theory, which provides a simple and intuitive approach to the vulnerability analysis of the attack.
防火墙为私有网络提供针对内部和外部攻击的保护。然而,配置防火墙以确保保护是一项艰巨的任务。主要原因是缺乏分析防火墙配置安全性的方法。IP欺骗攻击是攻击者冒充他人攻击受害者的一种攻击。我们提出了一种新的方法来验证防火墙配置对IP欺骗攻击的脆弱性,以及合成无IP欺骗配置。我们的方法基于图论,它为攻击的漏洞分析提供了一种简单直观的方法。
{"title":"A graph-based methodology for analyzing IP spoofing attack","authors":"Voravud Santiraveewan, Y. Permpoontanalarp","doi":"10.1109/AINA.2004.1283792","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283792","url":null,"abstract":"Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards a victim. We propose a new methodology for verifying the vulnerability of firewall configurations to IP spoofing attack and for synthesizing IP spoofing-free configurations. Our methodology is based on graph theory, which provides a simple and intuitive approach to the vulnerability analysis of the attack.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks 延迟可微公平排队(D/sup 2/FQ):一种用于分组交换网络的低复杂度调度算法
M. Yan, C. K. Li
In a packet-switched network, latency is unavoidable and its characteristic always depends on the type of traffic flows and operating conditions. These affect the kind of services that the network can support as well as the quality of service (QoS) that the system can provide. Providing a fair service for users is always the main concern for operators as well as service providers. A fair delay-differentiable queueing algorithm with QoS support called Delay-Differentiable Fair Queueing (D/sup 2/FQ) is proposed. In the proposed algorithm, an additional delay-slot is used to re-order the departure order of flows according to its delay weight. D/sup 2/FQ can also protect the honest flows in delay and throughput when a node is attacked by defense of service (DoS) and the overall computation of the proposed D/sup 2/FQ is shown to be O(1). Algorithm analysis and simulation results are presented and the performance of D/sup 2/FQ is evaluated.
在分组交换网络中,延迟是不可避免的,其特征总是取决于业务流的类型和操作条件。这些会影响网络所能支持的服务种类以及系统所能提供的服务质量(QoS)。为用户提供公平的服务一直是运营商和服务提供商关注的主要问题。提出了一种支持QoS的公平可延迟可微排队算法D/sup 2/FQ。在该算法中,增加了一个延迟槽,根据延迟权值对流的出发顺序进行重新排序。当节点受到DoS攻击时,D/sup 2/FQ在延迟和吞吐量上也能保护诚实流,所提出的D/sup 2/FQ的总计算量为0(1)。给出了算法分析和仿真结果,评价了D/sup 2/FQ的性能。
{"title":"Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks","authors":"M. Yan, C. K. Li","doi":"10.1109/AINA.2004.1283896","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283896","url":null,"abstract":"In a packet-switched network, latency is unavoidable and its characteristic always depends on the type of traffic flows and operating conditions. These affect the kind of services that the network can support as well as the quality of service (QoS) that the system can provide. Providing a fair service for users is always the main concern for operators as well as service providers. A fair delay-differentiable queueing algorithm with QoS support called Delay-Differentiable Fair Queueing (D/sup 2/FQ) is proposed. In the proposed algorithm, an additional delay-slot is used to re-order the departure order of flows according to its delay weight. D/sup 2/FQ can also protect the honest flows in delay and throughput when a node is attacked by defense of service (DoS) and the overall computation of the proposed D/sup 2/FQ is shown to be O(1). Algorithm analysis and simulation results are presented and the performance of D/sup 2/FQ is evaluated.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrecePt: a privacy-enhancing license management protocol for digital rights management 规则:用于数字版权管理的增强隐私的许可管理协议
Bok-Nyong Park, Jae-Won Kim, Wonjun Lee
One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.
数字版权管理(DRM)系统提出的主要问题之一涉及用户隐私的保护和内容的匿名消费。但是,大多数现有的DRM系统不支持对每个用户的个人信息进行保护。本文提出了一种隐私增强许可管理协议,命名为PrecePt (privacy- enhanced license management protocol,隐私增强许可管理协议),它是一种在DRM中对个人信息进行更强大保护的协议。为了保护用户标识符的暴露,该协议使用临时ID和令牌来保证匿名性。该方案还使用了ECDH加密形式的会话密钥和公钥,以保护个人信息的泄露和用户隐私。
{"title":"PrecePt: a privacy-enhancing license management protocol for digital rights management","authors":"Bok-Nyong Park, Jae-Won Kim, Wonjun Lee","doi":"10.1109/AINA.2004.1283971","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283971","url":null,"abstract":"One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
RED with optimized dynamic threshold deployment on shared buffer RED在共享缓冲区上优化了动态阈值部署
Chengchen Hu, B. Liu
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, our goal is to deploy the Random Early Detection (RED) algorithm in routers on shared buffer and solve these problems. A novel buffer management scheme that dynamically adjusts the parameters of RED named RED-ODT is proposed. Simulations under uniform traffic load and nonuniform traffic load are given, the results of which ascertain and demonstrate the superiority of the proposed scheme in terms of low packet drop ratio, satisfying buffer utilization and fairness. Simulation also shows that RED-ODT is insensitive to congestion level.
以往的研究表明,RED算法在共享缓冲区的多队列系统上的部署存在不公平的问题,并且通过静态设置参数对拥塞程度敏感。在本文中,我们的目标是在共享缓冲区上的路由器上部署随机早期检测(RED)算法并解决这些问题。提出了一种动态调整RED参数的缓冲区管理方案RED- odt。给出了均匀流量负载和非均匀流量负载下的仿真结果,验证了该方案在低丢包率、满足缓冲区利用率和公平性方面的优越性。仿真还表明,RED-ODT对拥塞程度不敏感。
{"title":"RED with optimized dynamic threshold deployment on shared buffer","authors":"Chengchen Hu, B. Liu","doi":"10.1109/AINA.2004.1283842","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283842","url":null,"abstract":"Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, our goal is to deploy the Random Early Detection (RED) algorithm in routers on shared buffer and solve these problems. A novel buffer management scheme that dynamically adjusts the parameters of RED named RED-ODT is proposed. Simulations under uniform traffic load and nonuniform traffic load are given, the results of which ascertain and demonstrate the superiority of the proposed scheme in terms of low packet drop ratio, satisfying buffer utilization and fairness. Simulation also shows that RED-ODT is insensitive to congestion level.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1