首页 > 最新文献

2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)最新文献

英文 中文
A Secure Real-time Communication Method Between Networks Based on Restful Interface 基于Restful接口的网络间安全实时通信方法
Tao Chuan, Bo Wu, Yao Lv, Zhenfei Qi, Wei Guo
For different security domains, generally low-level security domains (such as bank office networks) need to access high-level security domains (such as banking business systems). This problem can be achieved with the help of gatekeepers, but there are great security risks. High-level security domain networks are vulnerable to be attacked. So it needs a secure communication method to ensure the security of high-level security domains. This article proposes a restful information exchange system and method for different levels of secure networks, which can realize the data exchange of different levels of security networks and can protect high-level security networks. The secure data exchange method proposed in the article realizes data exchange between security domains with different security requirements and has broad application prospects. The combined security detection method adopted can maximize the protection of advanced security domains, and enable the enterprise entities to perform necessary information exchanges while ensuring network security. The resource white-list and token checking based on the restful architecture not only reduces network attacks, but also minimizes the pressure on advanced security domain servers. The web attack detection proposed in the scheme is put on the front-end to minimize the security pressure of the advanced security domain server.
对于不同的安全域,一般低级别安全域(如银行办公网络)需要访问高级别安全域(如银行业务系统)。这个问题可以在看门人的帮助下实现,但存在很大的安全风险。高级别安全域网络容易受到攻击。因此需要一种安全的通信方式来保证高安全域的安全性。本文提出了一种针对不同安全级别网络的rest式信息交换系统和方法,可以实现不同安全级别网络的数据交换,保护高级别安全网络。本文提出的安全数据交换方法实现了不同安全要求的安全域之间的数据交换,具有广阔的应用前景。采用组合安全检测方法,可以最大限度地保护高级安全域,使企业实体在保证网络安全的同时进行必要的信息交换。基于rest架构的资源白名单和令牌检测,既减少了网络攻击,又将高级安全域服务器的压力降至最低。方案中提出的web攻击检测放在前端,最大限度地减少了高级安全域服务器的安全压力。
{"title":"A Secure Real-time Communication Method Between Networks Based on Restful Interface","authors":"Tao Chuan, Bo Wu, Yao Lv, Zhenfei Qi, Wei Guo","doi":"10.1109/ISCEIC51027.2020.00048","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00048","url":null,"abstract":"For different security domains, generally low-level security domains (such as bank office networks) need to access high-level security domains (such as banking business systems). This problem can be achieved with the help of gatekeepers, but there are great security risks. High-level security domain networks are vulnerable to be attacked. So it needs a secure communication method to ensure the security of high-level security domains. This article proposes a restful information exchange system and method for different levels of secure networks, which can realize the data exchange of different levels of security networks and can protect high-level security networks. The secure data exchange method proposed in the article realizes data exchange between security domains with different security requirements and has broad application prospects. The combined security detection method adopted can maximize the protection of advanced security domains, and enable the enterprise entities to perform necessary information exchanges while ensuring network security. The resource white-list and token checking based on the restful architecture not only reduces network attacks, but also minimizes the pressure on advanced security domain servers. The web attack detection proposed in the scheme is put on the front-end to minimize the security pressure of the advanced security domain server.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"3 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127466810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of network planning and business application based on PeOTN technology 基于PeOTN技术的网络规划及业务应用分析
Haitao Chen, Youcheng Liang, Chunyu Hou
Optical transmission network (OTN) is a transmission network which realizes the transmission, multiplexing, routing and monitoring of service signals in the optical domain, and ensures its performance index and survivability. Packet enhanced optical transmission network (PeOTN), as a new generation of optical transmission network technology, takes on the efficient bandwidth of DWDM/OTN technology, saves optical fiber, and smoothly upgrades the network form. It also integrates the open network form of flexible service scheduling, reliable network management and flexible protection mechanism of SDH/MSTP technology. Based on the technical development of optical transmission network, this paper analyzes the new demand of transmission network in service carrying, discusses the related planning scheme and service application mode of packet enhanced optical transmission network equipment construction carrying network, and provides reference basis for the construction of transmission network in communication network.
光传输网络(OTN)是实现业务信号在光域的传输、复用、路由和监控,并保证其性能指标和生存性的传输网络。分组增强型光传输网络(Packet enhanced optical transmission network,简称PeOTN)作为新一代的光传输网络技术,承担了DWDM/OTN技术的高效带宽,节省了光纤,实现了网络形态的平稳升级。它还融合了SDH/MSTP技术灵活的业务调度、可靠的网络管理和灵活的保护机制等开放式网络形式。基于光传输网的技术发展,分析了业务承载对传输网的新需求,探讨了分组增强型光传输网设备建设承载网的相关规划方案和业务应用模式,为通信网中传输网的建设提供参考依据。
{"title":"Analysis of network planning and business application based on PeOTN technology","authors":"Haitao Chen, Youcheng Liang, Chunyu Hou","doi":"10.1109/ISCEIC51027.2020.00040","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00040","url":null,"abstract":"Optical transmission network (OTN) is a transmission network which realizes the transmission, multiplexing, routing and monitoring of service signals in the optical domain, and ensures its performance index and survivability. Packet enhanced optical transmission network (PeOTN), as a new generation of optical transmission network technology, takes on the efficient bandwidth of DWDM/OTN technology, saves optical fiber, and smoothly upgrades the network form. It also integrates the open network form of flexible service scheduling, reliable network management and flexible protection mechanism of SDH/MSTP technology. Based on the technical development of optical transmission network, this paper analyzes the new demand of transmission network in service carrying, discusses the related planning scheme and service application mode of packet enhanced optical transmission network equipment construction carrying network, and provides reference basis for the construction of transmission network in communication network.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Procedural Representation Based Cross-CAD data Exchange 基于过程表示的跨cad数据交换
Jiping Li, Wanrong Gu, Kai Zhu
The problem of exchanging CAD models together with construction history is a crucial issue to realize a complete Product Lifecycle Management (PLM) strategy in current highly distributed product development environments. The more design data can be re-used effectively, the larger its positive impacts on the overall product lifecycle process. This paper will discuss some theoretic and practical issues that, at present, hinder the exchange of procedurally defined shape models between different CAD systems. Some approaches proposed in literatures are summarized and critically discussed.
在当前高度分布式的产品开发环境中,CAD模型与施工历史的交换问题是实现完整的产品生命周期管理(PLM)策略的关键问题。设计数据越能被有效再利用,其对整个产品生命周期过程的积极影响就越大。本文将讨论目前阻碍不同CAD系统之间程序定义形状模型交换的一些理论和实际问题。对文献中提出的一些方法进行了总结和批判性讨论。
{"title":"Procedural Representation Based Cross-CAD data Exchange","authors":"Jiping Li, Wanrong Gu, Kai Zhu","doi":"10.1109/ISCEIC51027.2020.00033","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00033","url":null,"abstract":"The problem of exchanging CAD models together with construction history is a crucial issue to realize a complete Product Lifecycle Management (PLM) strategy in current highly distributed product development environments. The more design data can be re-used effectively, the larger its positive impacts on the overall product lifecycle process. This paper will discuss some theoretic and practical issues that, at present, hinder the exchange of procedurally defined shape models between different CAD systems. Some approaches proposed in literatures are summarized and critically discussed.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Print Counting, Status Inspection and Type Identification of Printing Devices based on Smart Sensor 基于智能传感器的打印设备打印计数、状态检测和类型识别
Faming Chen, Gao Wang, Ning Liu, Z. Zhong
Most of the factories still employ traditional equipment without interfaces of status parameters transmission and standard communication protocol. The inspection of traditional equipment has become a difficult and key point in the development of manufacture. The present study aimed to count printing, inspect status and identify types of traditional printing devices. A smart sensor-based system is proposed in this work. Variational mode decomposition (VMD) is utilized to extract feature values, and back-propagation neural network (BPNN) models are built for type identification and status inspection of the printing devices. Experiment results show that: the accuracy of print counting, status inspection and type identification of printing devices were 100%, 86.6% and 93.3% respectively. The methodologies and system proposed in the present study can be adapted to other industrial equipment identification and inspection, which can significantly facilitate the development of industrial technologies.
大多数工厂仍然使用传统设备,没有状态参数传输接口和标准通信协议。传统设备的检测已成为制造业发展的难点和重点。本研究旨在统计印刷,检查现状和识别传统印刷设备的类型。本文提出了一种基于智能传感器的系统。利用变分模态分解(VMD)提取特征值,建立反向传播神经网络(BPNN)模型进行打印设备的类型识别和状态检测。实验结果表明:印刷装置的打印计数、状态检测和类型识别准确率分别为100%、86.6%和93.3%。本研究提出的方法和系统可适用于其他工业设备的识别和检测,对工业技术的发展具有重要的促进作用。
{"title":"Print Counting, Status Inspection and Type Identification of Printing Devices based on Smart Sensor","authors":"Faming Chen, Gao Wang, Ning Liu, Z. Zhong","doi":"10.1109/ISCEIC51027.2020.00034","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00034","url":null,"abstract":"Most of the factories still employ traditional equipment without interfaces of status parameters transmission and standard communication protocol. The inspection of traditional equipment has become a difficult and key point in the development of manufacture. The present study aimed to count printing, inspect status and identify types of traditional printing devices. A smart sensor-based system is proposed in this work. Variational mode decomposition (VMD) is utilized to extract feature values, and back-propagation neural network (BPNN) models are built for type identification and status inspection of the printing devices. Experiment results show that: the accuracy of print counting, status inspection and type identification of printing devices were 100%, 86.6% and 93.3% respectively. The methodologies and system proposed in the present study can be adapted to other industrial equipment identification and inspection, which can significantly facilitate the development of industrial technologies.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116028926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Digital Multimedia Steganography Scheme Based on Complex Number Base 一种基于复数基的数字多媒体隐写新方案
Xu Yuhua, Sun Wei, Lee WanLung
In this paper, we propose a new digital multimedia steganography scheme based on complex number base. Based on this idea, all kinds of digital information can be represented by 0–1 sequences, so there may be some relationship between the two sequences. In order to find this relationship, we focus on the coding of complex number and study the mapping function between points on the complex plane. The general process of our method can be summarized as follows: mapping the secret and public binary sequence into points on the complex plane, constructing a spline curve that goes through all secret and public points, and then, hiding the point differences in another public spline curve image for future secret message recovery. The experiment result shows the proposed method has relative stability and can accurately recover the secret information.
本文提出了一种新的基于复数基的数字多媒体隐写方案。基于这种思想,各种数字信息都可以用0-1序列表示,因此这两个序列之间可能存在某种关系。为了找到这种关系,我们重点研究了复数的编码,并研究了复平面上点之间的映射函数。我们的方法的总体过程可以概括为:将秘密和公开的二值序列映射到复平面上的点,构造一条经过所有秘密和公开点的样条曲线,然后将点的差异隐藏在另一张公开样条曲线图像中,以便将来的秘密消息恢复。实验结果表明,该方法具有相对的稳定性,能够准确地恢复秘密信息。
{"title":"A New Digital Multimedia Steganography Scheme Based on Complex Number Base","authors":"Xu Yuhua, Sun Wei, Lee WanLung","doi":"10.1109/ISCEIC51027.2020.00039","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00039","url":null,"abstract":"In this paper, we propose a new digital multimedia steganography scheme based on complex number base. Based on this idea, all kinds of digital information can be represented by 0–1 sequences, so there may be some relationship between the two sequences. In order to find this relationship, we focus on the coding of complex number and study the mapping function between points on the complex plane. The general process of our method can be summarized as follows: mapping the secret and public binary sequence into points on the complex plane, constructing a spline curve that goes through all secret and public points, and then, hiding the point differences in another public spline curve image for future secret message recovery. The experiment result shows the proposed method has relative stability and can accurately recover the secret information.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Monitoring Unit for Railway Trackside Signal Equipment 铁路轨旁信号设备监控单元的设计
Long Shi, Bocai Xie, Shulin Tan, Zhixin Wang
Aiming at the function and environmental requirements of monitoring railway trackside signal equipment, a general monitoring unit providing rich data acquisition interface, powerful digital processing ability and reliable communication transmission function is designed, which is available for monitoring most of railway trackside equipment. Based on the unit, a device to monitor the trackside equipment of track circuit system, which possesses the largest number, the widest distribution and the most complex application environment, is realized in this paper.
针对铁路轨旁信号设备监控的功能和环境要求,设计了一种具有丰富的数据采集接口、强大的数字处理能力和可靠的通信传输功能的通用监控单元,可用于铁路轨旁大部分设备的监控。在此基础上,实现了一种数量最多、分布最广、应用环境最复杂的轨道电路系统轨旁设备监控装置。
{"title":"Design of a Monitoring Unit for Railway Trackside Signal Equipment","authors":"Long Shi, Bocai Xie, Shulin Tan, Zhixin Wang","doi":"10.1109/ISCEIC51027.2020.00043","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00043","url":null,"abstract":"Aiming at the function and environmental requirements of monitoring railway trackside signal equipment, a general monitoring unit providing rich data acquisition interface, powerful digital processing ability and reliable communication transmission function is designed, which is available for monitoring most of railway trackside equipment. Based on the unit, a device to monitor the trackside equipment of track circuit system, which possesses the largest number, the widest distribution and the most complex application environment, is realized in this paper.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research on User Privacy Protection of library Intelligent Service 图书馆智能服务中用户隐私保护研究
Xie Ziyue, Chen Ya
With the continuous deepening of the concept of intelligent service, the insecurity factor of library users’ privacy data those are leaked is increasing. Under the background of the fusion of technology application and concept innovation, establishing a set of user privacy protection mechanism to balance the use of library data and the protection of user privacy in order to facilitate the construction of library service. Implementing the design of user privacy protection mechanism from three levels of macro background, core elements and service supervision by reviewing the existing literature resources, introducing data life cycle model, and setting up the model of potential threats constitution for library user privacy. Under the scope of intelligent service, the library realizes the balance of rights and responsibilities between data mining and privacy protection and the organic integration of policy ideas and technology applications.
随着智能服务理念的不断深入,图书馆用户隐私数据泄露的不安全因素越来越大。在技术应用与理念创新融合的背景下,建立一套用户隐私保护机制,平衡图书馆数据的使用与用户隐私的保护,以促进图书馆服务的建设。通过回顾现有文献资源,引入数据生命周期模型,建立图书馆用户隐私潜在威胁构成模型,从宏观背景、核心要素和服务监督三个层面实施用户隐私保护机制设计。在智能服务范围下,图书馆实现了数据挖掘与隐私保护之间的权责平衡,实现了政策理念与技术应用的有机融合。
{"title":"The Research on User Privacy Protection of library Intelligent Service","authors":"Xie Ziyue, Chen Ya","doi":"10.1109/ISCEIC51027.2020.00050","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00050","url":null,"abstract":"With the continuous deepening of the concept of intelligent service, the insecurity factor of library users’ privacy data those are leaked is increasing. Under the background of the fusion of technology application and concept innovation, establishing a set of user privacy protection mechanism to balance the use of library data and the protection of user privacy in order to facilitate the construction of library service. Implementing the design of user privacy protection mechanism from three levels of macro background, core elements and service supervision by reviewing the existing literature resources, introducing data life cycle model, and setting up the model of potential threats constitution for library user privacy. Under the scope of intelligent service, the library realizes the balance of rights and responsibilities between data mining and privacy protection and the organic integration of policy ideas and technology applications.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124346357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach to Single Tube Irrigation System with Adaptive Water Control 单管灌溉系统自适应水量控制的新方法
Ju-Hwan Yu
Water is a precious and limited resource for human, which signifies the importance for researches on effective water usage. In particular, researches on irrigated agriculture are vital as it is one of the major water-consuming sectors in the world. Nevertheless, traditional irrigation has several shortcomings in terms of water usage efficiency, namely the undistributed watering amount across fields which causes significant waste of water resources. In this paper, a novel approach toward improving the efficiency of single tube irrigation is introduced, particularly how it can be adaptively applied to different shaped fields to best utilize the water resource while increasing its water coverage. An irrigation prototype was built through an inventive combination of PID controller and raindrop sensors. Experiments have shown that this system will be significantly useful in areas where water is scarce, as it is 12% more efficient than the conventional approach.
水是人类宝贵而有限的资源,研究有效利用水资源的重要性不言而喻。特别是对灌溉农业的研究至关重要,因为它是世界上主要的用水部门之一。然而,传统灌溉在水利用效率方面存在一些不足,即田地间的水量不均匀,造成了水资源的严重浪费。本文介绍了一种提高单管灌溉效率的新方法,特别是如何将其自适应地应用于不同形状的农田,以最大限度地利用水资源,同时增加其水覆盖率。通过PID控制器和雨滴传感器的创造性组合,建立了一个灌溉原型。实验表明,该系统在缺水地区将非常有用,因为它比传统方法效率高12%。
{"title":"A Novel Approach to Single Tube Irrigation System with Adaptive Water Control","authors":"Ju-Hwan Yu","doi":"10.1109/ISCEIC51027.2020.00035","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00035","url":null,"abstract":"Water is a precious and limited resource for human, which signifies the importance for researches on effective water usage. In particular, researches on irrigated agriculture are vital as it is one of the major water-consuming sectors in the world. Nevertheless, traditional irrigation has several shortcomings in terms of water usage efficiency, namely the undistributed watering amount across fields which causes significant waste of water resources. In this paper, a novel approach toward improving the efficiency of single tube irrigation is introduced, particularly how it can be adaptively applied to different shaped fields to best utilize the water resource while increasing its water coverage. An irrigation prototype was built through an inventive combination of PID controller and raindrop sensors. Experiments have shown that this system will be significantly useful in areas where water is scarce, as it is 12% more efficient than the conventional approach.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132012481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Research And Auxiliary Tool For Custom Android ROMs Android自定义rom的实证研究与辅助工具
M. Suleman, Xiaojian Zhong, Yuxia Sun
As the most popular and the most widely used mobile operating system, Android OS is open source with rich features. Many developers customize it to fulfill their needs or what the end users demand. The advantages of custom ROMs are analyzed systematically in this paper. The customized ROMs are experimentally demonstrated to be better than the stock ROMs in terms of performance, storage, user interface etc.
作为目前最流行、应用最广泛的移动操作系统,Android操作系统是开源的,功能丰富。许多开发人员定制它以满足他们的需求或最终用户的需求。本文系统地分析了定制rom的优点。实验证明,定制rom在性能、存储、用户界面等方面都优于库存rom。
{"title":"Empirical Research And Auxiliary Tool For Custom Android ROMs","authors":"M. Suleman, Xiaojian Zhong, Yuxia Sun","doi":"10.1109/ISCEIC51027.2020.00011","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00011","url":null,"abstract":"As the most popular and the most widely used mobile operating system, Android OS is open source with rich features. Many developers customize it to fulfill their needs or what the end users demand. The advantages of custom ROMs are analyzed systematically in this paper. The customized ROMs are experimentally demonstrated to be better than the stock ROMs in terms of performance, storage, user interface etc.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verifiable Secret Sharing Scheme Using Merkle Tree 基于Merkle树的可验证秘密共享方案
Yin-qing Fang, Jian-bin Liao, Lian-you Lai
In Shamir’s (k,n) secret sharing scheme, the distributor splits a secret into n shares(shadows), and sends the shares to n participants. Each participant has a different share. In the phase of secret reconstruction, only K or more participants with their shares can reconstruct the secret together, less than K participants can’t reconstruct the secret, and know nothing about the secret. Shamir’s scheme is unconditionally secure in theory. However, this scheme can’t prevent adversaries from cheating. In asynchronous communication, a dishonest participant or a foreign adversary sends a fake share to the honest participants after he gets the shares from other participants and will reconstruct the secret alone while the other honest participants cannot reconstruct the secret. This scheme does not verify the share and identify the participants. In this paper, an efficient share verification method based on Merkel tree will be discussed, in which the root and authentication paths of a Merkel tree are used to verify shares between the participants, so that they can reconstruct secrets correctly after verifying and eliminating the fake shares. This method does not need complex algorithms and estimating the number of cheaters in advance, and will not increase the size of each share.
在Shamir的(k,n)秘密共享方案中,分发者将一个秘密分成n份(影子),并将这些股份发送给n个参与者。每个参与者都有不同的份额。在秘密重建阶段,只有K个或更多的参与者和他们的份额可以一起重建秘密,少于K个参与者不能重建秘密,并且对秘密一无所知。Shamir的方案在理论上是无条件安全的。然而,该方案不能防止对手作弊。在异步通信中,一个不诚实的参与者或外国对手在从其他参与者那里获得份额后,向诚实的参与者发送虚假的份额,并将单独重建秘密,而其他诚实的参与者无法重建秘密。该方案不验证共享并识别参与者。本文将讨论一种基于默克尔树的高效的共享验证方法,该方法利用默克尔树的根路径和认证路径对参与者之间的共享进行验证,使参与者在验证并消除虚假的共享后能够正确地重建秘密。这种方法不需要复杂的算法和预先估计作弊者的数量,也不会增加每个份额的大小。
{"title":"Verifiable Secret Sharing Scheme Using Merkle Tree","authors":"Yin-qing Fang, Jian-bin Liao, Lian-you Lai","doi":"10.1109/ISCEIC51027.2020.00008","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00008","url":null,"abstract":"In Shamir’s (k,n) secret sharing scheme, the distributor splits a secret into n shares(shadows), and sends the shares to n participants. Each participant has a different share. In the phase of secret reconstruction, only K or more participants with their shares can reconstruct the secret together, less than K participants can’t reconstruct the secret, and know nothing about the secret. Shamir’s scheme is unconditionally secure in theory. However, this scheme can’t prevent adversaries from cheating. In asynchronous communication, a dishonest participant or a foreign adversary sends a fake share to the honest participants after he gets the shares from other participants and will reconstruct the secret alone while the other honest participants cannot reconstruct the secret. This scheme does not verify the share and identify the participants. In this paper, an efficient share verification method based on Merkel tree will be discussed, in which the root and authentication paths of a Merkel tree are used to verify shares between the participants, so that they can reconstruct secrets correctly after verifying and eliminating the fake shares. This method does not need complex algorithms and estimating the number of cheaters in advance, and will not increase the size of each share.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127522509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1