首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
How Can Semantic Be Introduced in GIS Mobile Applications: Expectations, Theory and Reality 如何在GIS移动应用中引入语义:期望、理论与现实
Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro
With the advent of GPS and the spread of smart phones (iPhone, Android, etc.) have proliferated applications dealing with geographic information. Many of these applications are beginning to provide semantic information through: 1) the classification of tourist attractions in categories (thesauri tourism categories Open Street Map, etc.), and 2) the representation of metadata (Linked Geo Data, Crossing, etc.). However, mobile devices do not still uses all this potential. This paper presents a comprehensive study on the main formalisms to include Semantic and Geographic Data within a mobile device, and how to get them work efficiently just in the mobile, without internet connection. The article presents several options to implement these technologies and, for every option shows the limitations of such implementation. Therefore provides a glimpse into the various options available to implement semantic geographic applications on mobile devices. To mark the goal, the study shows a case study where ontologies have been used to provide semantics to a travel assistant that runs on mobile devices. The goal is an application able to offer personalized touristic routes different for every single user, that take into account, for example, the user interests and time available, and all the processes must be run within the mobile device. The main contribution of the paper is to manage and combine semantic data and geographic information within a mobile device, and doing it without internet connection, and for an end-user application.
随着GPS的出现和智能手机(iPhone、Android等)的普及,处理地理信息的应用程序激增。许多这样的应用程序开始通过以下方式提供语义信息:1)旅游景点的分类(叙词表旅游类别开放街道地图等),以及2)元数据的表示(关联地理数据,十字路口等)。然而,移动设备并没有充分发挥这些潜力。本文全面研究了在移动设备中包含语义和地理数据的主要形式,以及如何使它们在没有互联网连接的情况下仅在移动设备中有效地工作。本文提出了实现这些技术的几种选择,并针对每种选择展示了这种实现的局限性。因此,提供了在移动设备上实现语义地理应用程序的各种可用选项。为了实现这一目标,该研究展示了一个案例研究,其中使用本体为运行在移动设备上的旅行助手提供语义。目标是一个应用程序能够为每个用户提供不同的个性化旅游路线,考虑到用户的兴趣和可用时间,所有的过程都必须在移动设备中运行。本文的主要贡献是在移动设备中管理和组合语义数据和地理信息,并且在没有互联网连接的情况下为最终用户应用程序进行。
{"title":"How Can Semantic Be Introduced in GIS Mobile Applications: Expectations, Theory and Reality","authors":"Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro","doi":"10.1109/iNCoS.2012.61","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.61","url":null,"abstract":"With the advent of GPS and the spread of smart phones (iPhone, Android, etc.) have proliferated applications dealing with geographic information. Many of these applications are beginning to provide semantic information through: 1) the classification of tourist attractions in categories (thesauri tourism categories Open Street Map, etc.), and 2) the representation of metadata (Linked Geo Data, Crossing, etc.). However, mobile devices do not still uses all this potential. This paper presents a comprehensive study on the main formalisms to include Semantic and Geographic Data within a mobile device, and how to get them work efficiently just in the mobile, without internet connection. The article presents several options to implement these technologies and, for every option shows the limitations of such implementation. Therefore provides a glimpse into the various options available to implement semantic geographic applications on mobile devices. To mark the goal, the study shows a case study where ontologies have been used to provide semantics to a travel assistant that runs on mobile devices. The goal is an application able to offer personalized touristic routes different for every single user, that take into account, for example, the user interests and time available, and all the processes must be run within the mobile device. The main contribution of the paper is to manage and combine semantic data and geographic information within a mobile device, and doing it without internet connection, and for an end-user application.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing Security to Computer-Supported Collaborative Learning: An Overview 为计算机支持的协作学习提供安全:概述
Jorge Miguel, S. Caballé, Josep Prieto
Over the last two decades, a great variety of forms of e-Learning has been widely adopted and intensively exploited in most of educational institutions. As a result, e-Learning needs have been evolving accordingly with more and more demanding pedagogical and technological requirements. Given the added pedagogical value of group work, Computer-Supported Collaborative Learning has become one of the most influencing educational paradigms devoted to improve teaching and learning by the use of modern ICT. On the other hand, recently, there has been an increasing attention and demand of new requirements related to information security, with the aim to enhance the learning efficacy by adopting a secure perspective for each and every learning process and resource, as well as the information transmitted and shared. However, the development of CSCL systems guided by security as a key and transversal requirement has been, to the best of our knowledge, little investigated. In order to fill this gap, this paper provides firstly an overview of the current developments of CSCL systems from the security perspective. Then, the paper discusses on the problems caused in collaborative learning processes by the lack of security. Finally, the main guidelines for the design of secure CSCL systems are proposed to guide developers to incorporate security as an essential requirement into the collaborative learning process.
在过去的二十年里,各种各样的电子学习形式在大多数教育机构中被广泛采用和深入利用。因此,随着对教学和技术的要求越来越高,电子学习的需求也随之发生了变化。鉴于小组工作的附加教学价值,计算机支持的协作学习已成为最具影响力的教育范式之一,致力于通过使用现代信息通信技术改善教与学。另一方面,近年来,人们越来越关注和要求新的信息安全要求,目的是通过对每一个学习过程和资源,以及传输和共享的信息采取安全的观点来提高学习效能。然而,据我们所知,以安全作为关键和横向要求为指导的CSCL系统的发展很少得到调查。为了填补这一空白,本文首先从安全的角度对CSCL系统的发展现状进行了概述。然后,讨论了由于缺乏安全性而导致的协作学习过程中的问题。最后,提出了安全CSCL系统设计的主要指导方针,以指导开发人员将安全性作为协作学习过程的基本要求。
{"title":"Providing Security to Computer-Supported Collaborative Learning: An Overview","authors":"Jorge Miguel, S. Caballé, Josep Prieto","doi":"10.1109/iNCoS.2012.60","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.60","url":null,"abstract":"Over the last two decades, a great variety of forms of e-Learning has been widely adopted and intensively exploited in most of educational institutions. As a result, e-Learning needs have been evolving accordingly with more and more demanding pedagogical and technological requirements. Given the added pedagogical value of group work, Computer-Supported Collaborative Learning has become one of the most influencing educational paradigms devoted to improve teaching and learning by the use of modern ICT. On the other hand, recently, there has been an increasing attention and demand of new requirements related to information security, with the aim to enhance the learning efficacy by adopting a secure perspective for each and every learning process and resource, as well as the information transmitted and shared. However, the development of CSCL systems guided by security as a key and transversal requirement has been, to the best of our knowledge, little investigated. In order to fill this gap, this paper provides firstly an overview of the current developments of CSCL systems from the security perspective. Then, the paper discusses on the problems caused in collaborative learning processes by the lack of security. Finally, the main guidelines for the design of secure CSCL systems are proposed to guide developers to incorporate security as an essential requirement into the collaborative learning process.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel 提高MIMO Y信道自由度的优化传输
Yong Wang, Aixiang Guo, Hong He, Hui Li
In this paper, we consider K-user multiple input and multiple output (MIMO) Y channel where each user is equipped with M antennas and the relay N antennas. A scheme that each user exchanges d pairs of messages with each of the other users simultaneously via an intermediate relay is proposed. It is accomplished by utilizing signal space alignment for network coding and interference nulling beam forming combined with receiving antenna selection technique. By using multiple antennas at both ends of wireless links, more diversity gain can be obtained if d is small, while more degrees of freedom (DOF) can be achieved if d becomes larger. The feasibility conditions and the achievable DOF are verified at last.
在本文中,我们考虑k用户多输入多输出(MIMO) Y通道,其中每个用户配备M天线和中继N天线。提出了一种每个用户通过中间中继与其他用户同时交换d对消息的方案。利用信号空间对准进行网络编码,并结合接收天线选择技术进行干扰零波束形成。通过在无线链路的两端使用多个天线,当d较小时可以获得更多的分集增益,而当d较大时可以获得更多的自由度。最后验证了该方法的可行性条件和可实现的自由度。
{"title":"Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel","authors":"Yong Wang, Aixiang Guo, Hong He, Hui Li","doi":"10.1109/iNCoS.2012.56","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.56","url":null,"abstract":"In this paper, we consider K-user multiple input and multiple output (MIMO) Y channel where each user is equipped with M antennas and the relay N antennas. A scheme that each user exchanges d pairs of messages with each of the other users simultaneously via an intermediate relay is proposed. It is accomplished by utilizing signal space alignment for network coding and interference nulling beam forming combined with receiving antenna selection technique. By using multiple antennas at both ends of wireless links, more diversity gain can be obtained if d is small, while more degrees of freedom (DOF) can be achieved if d becomes larger. The feasibility conditions and the achievable DOF are verified at last.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption 在k-CCA2假设下构造指定验证者环签名和环签名加密
Fu Xiao-tong, Liu Wen
Ring signatures are one of the signatures that can enhance the anonymity of the users who want to sign documents not only in the way of authentication but also privacy. In this paper, we propose a simple but secure designated verifier ring signature scheme from bilinear pairing. The security of the scheme is proved under the k-CAA2 assumption. Furthermore, a ring signcryption scheme is also presented from the new designated verifier ring signature scheme.
环签名是一种既能增强签名用户身份验证的匿名性,又能增强用户隐私性的签名方式。本文提出了一种简单而安全的双线性配对指定验证者环签名方案。在k-CAA2假设下证明了该方案的安全性。此外,在新的指定验证者环签名方案的基础上,提出了环签名加密方案。
{"title":"Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption","authors":"Fu Xiao-tong, Liu Wen","doi":"10.1109/INCOS.2012.58","DOIUrl":"https://doi.org/10.1109/INCOS.2012.58","url":null,"abstract":"Ring signatures are one of the signatures that can enhance the anonymity of the users who want to sign documents not only in the way of authentication but also privacy. In this paper, we propose a simple but secure designated verifier ring signature scheme from bilinear pairing. The security of the scheme is proved under the k-CAA2 assumption. Furthermore, a ring signcryption scheme is also presented from the new designated verifier ring signature scheme.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks 双向中继多用户网络中的联合信号空间对准与预编码
Yong Wang, Liu Yang, Y. Ai, Hui Li, Weidong Zhang
A new multi-user two-way transmission network is considered to fully utilize wireless system resource, and ensure transmission reliability, with assistant of an amplify-and-forward relay. In multiple access channel (MAC) phase, signal space alignment technique is employed, which cancel the multi-user interference. In broadcast channel (BC) phase, a new multiple-input multiple-output (MIMO) precoding matrix is designed to reduce the decoding complexity. Simulation result shows the average sum rate performance of the proposed system, and the achievable the degrees of freedom is evaluated.
考虑了一种新的多用户双向传输网络,充分利用无线系统资源,保证传输可靠性,并辅以放大转发中继。在多址信道(MAC)阶段,采用信号空间对准技术,消除了多用户干扰。在广播信道(BC)阶段,设计了一种新的多输入多输出(MIMO)预编码矩阵来降低解码复杂度。仿真结果表明了系统的平均和速率性能,并对系统可实现的自由度进行了评价。
{"title":"Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks","authors":"Yong Wang, Liu Yang, Y. Ai, Hui Li, Weidong Zhang","doi":"10.1109/iNCoS.2012.55","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.55","url":null,"abstract":"A new multi-user two-way transmission network is considered to fully utilize wireless system resource, and ensure transmission reliability, with assistant of an amplify-and-forward relay. In multiple access channel (MAC) phase, signal space alignment technique is employed, which cancel the multi-user interference. In broadcast channel (BC) phase, a new multiple-input multiple-output (MIMO) precoding matrix is designed to reduce the decoding complexity. Simulation result shows the average sum rate performance of the proposed system, and the achievable the degrees of freedom is evaluated.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO Systems 一种基于泄漏的认知多用户MIMO预编码方案
Chuiqiang Sun, J. Ge, Xinxin Bao, Xiaoye Shi
In this paper, we develop linear precoding schemes for cognitive radio (CR) multiuser multiple-input multiple-output (MU-MIMO) downlink systems. A secondary user base station (SBS) with multiple secondary users (SUs) sharing the primary user (PU) spectrum is considered. In the proposed scheme, the block diagonalization (BD) algorithm is adopted to remove the co-channel interference from the SBS to the PU completely, and the matching weighted signal-to-leakage-and-noise ratio (SLNR) maximization algorithm is proposed to mitigate interference between SUs. The proposed scheme does not require a strict restriction on the number of transmit and receive antennas. Simulation results show that the proposed scheme can achieve high sum rate throughput with affordable complexity.
在本文中,我们开发了用于认知无线电(CR)多用户多输入多输出(MU-MIMO)下行系统的线性预编码方案。考虑一个由多个辅助用户共享主用户频谱的辅助用户基站SBS (secondary user base station)。在该方案中,采用块对角化(BD)算法完全消除SBS对PU的同信道干扰,并提出匹配加权信噪比(SLNR)最大化算法来减轻su之间的干扰。该方案不需要对发射和接收天线的数量进行严格限制。仿真结果表明,该方案可以在可承受的复杂度下实现较高的和速率吞吐量。
{"title":"A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO Systems","authors":"Chuiqiang Sun, J. Ge, Xinxin Bao, Xiaoye Shi","doi":"10.1109/iNCoS.2012.33","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.33","url":null,"abstract":"In this paper, we develop linear precoding schemes for cognitive radio (CR) multiuser multiple-input multiple-output (MU-MIMO) downlink systems. A secondary user base station (SBS) with multiple secondary users (SUs) sharing the primary user (PU) spectrum is considered. In the proposed scheme, the block diagonalization (BD) algorithm is adopted to remove the co-channel interference from the SBS to the PU completely, and the matching weighted signal-to-leakage-and-noise ratio (SLNR) maximization algorithm is proposed to mitigate interference between SUs. The proposed scheme does not require a strict restriction on the number of transmit and receive antennas. Simulation results show that the proposed scheme can achieve high sum rate throughput with affordable complexity.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131446477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Relational Approach to Collaborative Fairness 合作公平的关系方法
M. Köppen, Rodrigo Verschae, M. Tsuru
In the relational approach to fairness, fairness is considered as a social choice that coincides with the maximum set of a fairness relation. Here we consider the application of this approach to achieve general fairness in collaborative systems. The approach is based on posing additional conditions on the fairness relation based on representation of collaboration among agents by a social graph, and various social types of agents. The relation can be used for the formal analysis of various collaboration scenarios by justifying tractable sizes of maximum sets of corresponding collaborative fairness relations. As an example result, the introduction of cliques of larger size appears to be in favor of achievability of collaborate fairness.
在公平的关系理论中,公平被认为是与公平关系的最大集合一致的一种社会选择。在这里,我们考虑应用这种方法来实现协作系统中的一般公平性。该方法基于社会图和不同社会类型的代理对公平关系的附加条件来表示代理之间的协作。通过证明相应的协作公平关系的最大集的可处理大小,该关系可用于各种协作场景的形式化分析。作为一个示例结果,引入更大规模的集团似乎有利于实现协作公平。
{"title":"A Relational Approach to Collaborative Fairness","authors":"M. Köppen, Rodrigo Verschae, M. Tsuru","doi":"10.1109/iNCoS.2012.92","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.92","url":null,"abstract":"In the relational approach to fairness, fairness is considered as a social choice that coincides with the maximum set of a fairness relation. Here we consider the application of this approach to achieve general fairness in collaborative systems. The approach is based on posing additional conditions on the fairness relation based on representation of collaboration among agents by a social graph, and various social types of agents. The relation can be used for the formal analysis of various collaboration scenarios by justifying tractable sizes of maximum sets of corresponding collaborative fairness relations. As an example result, the introduction of cliques of larger size appears to be in favor of achievability of collaborate fairness.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opengate on OpenFlow: System Outline OpenFlow上的开放:系统概要
Mitsuhiro Suenaga, M. Otani, Hisaharu Tanaka, Kenzi Watanabe
Open gate is a user authentication gateway system for network in the environment opened to public. This system has been operating for controlling the campus-wide open network in Saga University since 2001. In this research, we propose to implement hOpengateh onto next-generation network hOpen Flowh and show how to distribute the load by access.
开放网关是一种面向公众开放的网络环境下的用户认证网关系统。该系统自2001年开始在佐贺大学运行,用于控制全校开放网络。在本研究中,我们提出在下一代网络hOpen flow上实现hOpengateh,并展示了如何通过访问分配负载。
{"title":"Opengate on OpenFlow: System Outline","authors":"Mitsuhiro Suenaga, M. Otani, Hisaharu Tanaka, Kenzi Watanabe","doi":"10.1109/iNCoS.2012.84","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.84","url":null,"abstract":"Open gate is a user authentication gateway system for network in the environment opened to public. This system has been operating for controlling the campus-wide open network in Saga University since 2001. In this research, we propose to implement hOpengateh onto next-generation network hOpen Flowh and show how to distribute the load by access.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114914846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Identity Based Signcryption Scheme in the Standard Model 标准模型中一种新的基于身份的签名加密方案
Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, J. Domingo-Ferrer
Signcryption is a useful cryptographic primitive which simultaneously performs encryption and signature with cost less than the signature-then-encryption approach. Identity-based signcryption (IBSC) eliminates the complicated management of certificates in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Most IBSC schemes are constructed in the random oracle model, while it is unknown how to instantiate a really "random" oracle in the real world. By exploiting Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature, this paper proposes a new IBSC scheme in the standard model. It is proven that our IBSC scheme satisfies semantic security and strong unforgeability under the bilinear decision Diffie-Hellman (BDDH) assumption. The proofs do not rely on random oracles. Performance analysis shows that our scheme is also efficient and practical.
签名加密是一种有用的密码原语,它可以同时执行加密和签名,且成本低于先签名后加密的方法。基于身份的签名加密(IBSC)消除了传统公钥基础设施(PKI)设置中签名加密方案中复杂的证书管理。大多数IBSC方案都是在随机oracle模型中构建的,而如何在现实世界中实例化一个真正的“随机”oracle是未知的。利用Boneh等人的强不可伪造签名和Paterson等人的基于身份的签名,提出了一种新的标准模型下的IBSC方案。在双线性决策Diffie-Hellman (BDDH)假设下,证明了IBSC方案满足语义安全性和强不可伪造性。这些证明并不依赖于随机的预言。性能分析表明了该方案的有效性和实用性。
{"title":"A New Identity Based Signcryption Scheme in the Standard Model","authors":"Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, J. Domingo-Ferrer","doi":"10.1109/iNCoS.2012.43","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.43","url":null,"abstract":"Signcryption is a useful cryptographic primitive which simultaneously performs encryption and signature with cost less than the signature-then-encryption approach. Identity-based signcryption (IBSC) eliminates the complicated management of certificates in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Most IBSC schemes are constructed in the random oracle model, while it is unknown how to instantiate a really \"random\" oracle in the real world. By exploiting Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature, this paper proposes a new IBSC scheme in the standard model. It is proven that our IBSC scheme satisfies semantic security and strong unforgeability under the bilinear decision Diffie-Hellman (BDDH) assumption. The proofs do not rely on random oracles. Performance analysis shows that our scheme is also efficient and practical.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Itiner@: Ontology for Personalizing Tourist Routes in Mobile Devices Itiner@:移动设备上个性化旅游路线的本体
Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro
Several applications that support users when doing tourism have appeared during the last years. These applications, though popular, have not become a reliable and dependable tourist assistant because they offer little personalization, which eventually may overwhelm users with too much information. An effective mobile application should store tourist information in a way that facilitates the identification of relevant points of interest to the user and the relevant information about them. The relevance of information depends also on the context. This paper presents an ontology that can store information about points of interest (POI), preferences and habits of users and time information. The presented ontology is aligned with the ontology Linked Geo Data to facilitate the importation of data to and from it. The ontology has been integrated into a mobile application called Itiner@ to create custom routes for each user based on his/her preferences, personal situation, means of transport, area to visit, date and duration of the visit. The main contribution of this work is to identify the relevant information to mobile touristic applications and to show how to use an ontology to improve the functionalities of geographic information system through the use of semantic information.
过去几年出现了一些支持用户旅游的应用程序。这些应用程序虽然很受欢迎,但还没有成为可靠可靠的旅游助手,因为它们提供的个性化服务很少,最终可能会让用户被过多的信息淹没。一个有效的移动应用程序应该以一种便于识别用户感兴趣的相关点及其相关信息的方式存储旅游信息。信息的相关性还取决于上下文。提出了一种能够存储兴趣点信息、用户偏好和习惯信息以及时间信息的本体。所呈现的本体与本体关联地理数据保持一致,以方便从本体导入数据。该本体已经集成到一个名为Itiner@的移动应用程序中,根据每个用户的偏好、个人情况、交通方式、访问区域、访问日期和持续时间,为每个用户创建自定义路线。本工作的主要贡献是识别移动旅游应用程序的相关信息,并展示如何使用本体通过使用语义信息来改进地理信息系统的功能。
{"title":"Itiner@: Ontology for Personalizing Tourist Routes in Mobile Devices","authors":"Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro","doi":"10.1109/iNCoS.2012.47","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.47","url":null,"abstract":"Several applications that support users when doing tourism have appeared during the last years. These applications, though popular, have not become a reliable and dependable tourist assistant because they offer little personalization, which eventually may overwhelm users with too much information. An effective mobile application should store tourist information in a way that facilitates the identification of relevant points of interest to the user and the relevant information about them. The relevance of information depends also on the context. This paper presents an ontology that can store information about points of interest (POI), preferences and habits of users and time information. The presented ontology is aligned with the ontology Linked Geo Data to facilitate the importation of data to and from it. The ontology has been integrated into a mobile application called Itiner@ to create custom routes for each user based on his/her preferences, personal situation, means of transport, area to visit, date and duration of the visit. The main contribution of this work is to identify the relevant information to mobile touristic applications and to show how to use an ontology to improve the functionalities of geographic information system through the use of semantic information.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1