首页 > 最新文献

2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)最新文献

英文 中文
User centered and context dependent personalization through experiential transcoding 通过体验式转码实现以用户为中心和上下文相关的个性化
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940520
S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni
The pervasive presence of devices exploited to use and deliver entertainment text-based content can make reading easier to get but more difficult to enjoy, in particular for people with reading-related disabilities. The main solutions that allow overcoming some of the difficulties experienced by users with specific and special needs are based on content adaptation and user profiling. This paper presents a system that aims to improve content legibility by exploiting experiential transcoding techniques. The system we propose tracks users' behaviors so as to provide a tailored adaptation of textual content, in order to fit the needs of a specific user on the several different devices she/he actually uses.
使用和传递娱乐文本内容的设备无处不在,这使得阅读更容易获得,但更难享受,尤其是对有阅读障碍的人来说。能够克服具有特定和特殊需求的用户所遇到的一些困难的主要解决方案是基于内容适应和用户分析。本文提出了一个系统,旨在提高内容易读性利用经验转码技术。我们提出的系统跟踪用户的行为,从而提供量身定制的文本内容,以适应特定用户在其实际使用的几种不同设备上的需求。
{"title":"User centered and context dependent personalization through experiential transcoding","authors":"S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni","doi":"10.1109/CCNC.2014.6940520","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940520","url":null,"abstract":"The pervasive presence of devices exploited to use and deliver entertainment text-based content can make reading easier to get but more difficult to enjoy, in particular for people with reading-related disabilities. The main solutions that allow overcoming some of the difficulties experienced by users with specific and special needs are based on content adaptation and user profiling. This paper presents a system that aims to improve content legibility by exploiting experiential transcoding techniques. The system we propose tracks users' behaviors so as to provide a tailored adaptation of textual content, in order to fit the needs of a specific user on the several different devices she/he actually uses.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
IoT gadget control on wireless AP at home 物联网小工具控制无线AP在家里
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940525
Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi
This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScriptbased objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring, and control on the wireless AP. In addition, generating mash-up instances by connecting multiple gadgets and controlling them together is performed.
本文演示了在家中的无线AP(接入点)上托管物联网设备。为此,需要将物联网设备的流程和配置文件虚拟化为基于javascript的对象。然后,为了在无线AP上执行和控制虚拟物联网对象的实例,需要一种新的实例管理方法。演示了IoT小工具在无线AP上的注册、监控和控制。此外,还通过连接多个小工具并将它们一起控制来生成mashup实例。
{"title":"IoT gadget control on wireless AP at home","authors":"Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi","doi":"10.1109/CCNC.2014.6940525","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940525","url":null,"abstract":"This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScriptbased objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring, and control on the wireless AP. In addition, generating mash-up instances by connecting multiple gadgets and controlling them together is performed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiplatform games for Dyslexia identification in preschoolers 学龄前儿童阅读障碍识别的多平台游戏
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940496
A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino
Dyslexia is a learning disability affecting the ability to process written and sometimes even spoken language. It affects educational opportunities of about 10% of children, regardless of their intelligence. One of the main challenges is to be able to identify Dyslexia in preschoolers. To this aim we have developed a set of serious games that are the core of this demo. Our games have been created with a multiplatform approach so as to generate, in a single effort, game versions for mobile platforms and the Web. They have also been designed to be adequately challenging and fun for their target users, as well as effective.
阅读障碍是一种学习障碍,影响处理书面语言,有时甚至是口头语言的能力。它影响了大约10%的儿童的受教育机会,无论他们的智力如何。主要的挑战之一是能够识别学龄前儿童的阅读障碍。为了达到这个目的,我们开发了一套严肃的游戏,作为这个演示的核心。我们的游戏是基于多平台方法而创造的,所以我们能够一次性创造出面向手机平台和网页的游戏版本。它们还被设计成对目标用户具有足够的挑战性和乐趣,同时也很有效。
{"title":"Multiplatform games for Dyslexia identification in preschoolers","authors":"A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino","doi":"10.1109/CCNC.2014.6940496","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940496","url":null,"abstract":"Dyslexia is a learning disability affecting the ability to process written and sometimes even spoken language. It affects educational opportunities of about 10% of children, regardless of their intelligence. One of the main challenges is to be able to identify Dyslexia in preschoolers. To this aim we have developed a set of serious games that are the core of this demo. Our games have been created with a multiplatform approach so as to generate, in a single effort, game versions for mobile platforms and the Web. They have also been designed to be adequately challenging and fun for their target users, as well as effective.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Gas leak detection and localization system through Wireless Sensor Networks 无线传感器网络气体泄漏检测与定位系统
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940506
P. Spachos, Liang Song, D. Hatzinakos
In this demonstration proposal we use a prototype of a Wireless Sensor Network (WSN) to monitor and locate gas leaks of a complex indoor environment. Specifically, a mobile node is moving inside a building to monitor any leakage of carbon dioxide (CO2), supporting and displaying the level and the location of the leakage. Throughout the demonstration, the technological advantages of cognitive networking along with multihop routing are explored.
在这个演示方案中,我们使用无线传感器网络(WSN)的原型来监测和定位复杂室内环境中的气体泄漏。具体来说,一个移动节点正在建筑物内移动,以监测二氧化碳(CO2)的任何泄漏,支持并显示泄漏的水平和位置。在整个演示中,探讨了认知网络与多跳路由的技术优势。
{"title":"Gas leak detection and localization system through Wireless Sensor Networks","authors":"P. Spachos, Liang Song, D. Hatzinakos","doi":"10.1109/CCNC.2014.6940506","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940506","url":null,"abstract":"In this demonstration proposal we use a prototype of a Wireless Sensor Network (WSN) to monitor and locate gas leaks of a complex indoor environment. Specifically, a mobile node is moving inside a building to monitor any leakage of carbon dioxide (CO2), supporting and displaying the level and the location of the leakage. Throughout the demonstration, the technological advantages of cognitive networking along with multihop routing are explored.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New gait metrics for biometric authentication using a 3-axis acceleration 使用3轴加速度的生物识别认证的新步态度量
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940501
Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn
Biometric authentication mechanisms are excellent alternatives to often inconvenient interaction authentication methods such as PIN numbers in mobile devices. This research introduces the new concept of using gait signature metrics for biometric authentication. This procedure verifies each subject using only acceleration. We first use a single wireless sensor device to collect data on subjects' gait patterns. By dividing each gait cycle into an Acceleration Phase and a Deceleration Phase, we derive seven periodic and characteristic gait signature metrics. Gait signature metrics can be classified as acceleration metrics, deceleration metrics, and ratio metric. Acceleration metrics represent a degree of dynamic activity when heel-strike actions and mid-stance actions occur, whereas deceleration metrics measure a degree of dynamic activity when mid-stance actions and successive heel-strike of other foot. The last metric, ratio metric, present the relationship between the acceleration metrics and the deceleration metrics. Using the gait signature metrics, we succeeded in differentiating each subject with 100% accuracy.
生物识别身份验证机制是替代通常不方便的交互身份验证方法(如移动设备中的PIN号码)的绝佳选择。本研究引入了利用步态特征度量进行生物特征认证的新概念。此过程仅使用加速度验证每个主题。我们首先使用一个无线传感器设备来收集受试者步态模式的数据。通过将每个步态周期划分为加速阶段和减速阶段,得到了7个周期特征步态特征指标。步态特征度量可以分为加速度量、减速度量和比率度量。当脚后跟撞击动作和中位动作发生时,加速度指标代表一定程度的动态活动,而减速指标衡量中位动作和连续的另一只脚的脚后跟撞击时的动态活动程度。最后一个度量,比率度量,表示加速度度量和减速度量之间的关系。利用步态特征指标,我们成功地以100%的准确率区分了每个受试者。
{"title":"New gait metrics for biometric authentication using a 3-axis acceleration","authors":"Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn","doi":"10.1109/CCNC.2014.6940501","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940501","url":null,"abstract":"Biometric authentication mechanisms are excellent alternatives to often inconvenient interaction authentication methods such as PIN numbers in mobile devices. This research introduces the new concept of using gait signature metrics for biometric authentication. This procedure verifies each subject using only acceleration. We first use a single wireless sensor device to collect data on subjects' gait patterns. By dividing each gait cycle into an Acceleration Phase and a Deceleration Phase, we derive seven periodic and characteristic gait signature metrics. Gait signature metrics can be classified as acceleration metrics, deceleration metrics, and ratio metric. Acceleration metrics represent a degree of dynamic activity when heel-strike actions and mid-stance actions occur, whereas deceleration metrics measure a degree of dynamic activity when mid-stance actions and successive heel-strike of other foot. The last metric, ratio metric, present the relationship between the acceleration metrics and the deceleration metrics. Using the gait signature metrics, we succeeded in differentiating each subject with 100% accuracy.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Is sensor deployment using gaussian distribution energy balanced? 传感器部署使用高斯分布能量平衡?
Pub Date : 2014-11-03 DOI: 10.1007/978-3-319-03859-9_5
Subir Halder, Amrita Ghosal
{"title":"Is sensor deployment using gaussian distribution energy balanced?","authors":"Subir Halder, Amrita Ghosal","doi":"10.1007/978-3-319-03859-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-03859-9_5","url":null,"abstract":"","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
SNC: Scalable NDN-based conferencing architecture SNC:基于ndn的可扩展会议架构
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.7056330
Debessay Fesehaye, Jun Wei
We present a scalable NDN-based conferencing architecture for conference control and management. Conference control functions are divided into individual service modules and are loaded into different control servers. Control servers are added into the control cluster as the number of parcitipants increases. Participants are allowed to register and receive variety of conference control services from any control servers within the cluster. Participant registration and access records are maintained locally by specific control servers. This work presents essential building blocks using (1) light-weighted metadata for effective participant record management, (2) distributed and self-organized storage and replication of participant records, (3) efficient, secure and distributed conference access mechanisms, and (4) dynamic and effective control server discovery. This system enables quick and efficient cluster access by supporting seamless participant mobility and automatic server load balancing. The control cluster is self-organized and self-healing and able to scale to large size of participants. It can also be extended to host multiple conferences. Using CCNx toolkits, we have demonstrated how SNC can automatically (seamlessly) select the closest (small delay) server avoiding congested (under-attack) and far away servers. Using simulation experiments, we have also shown the effectiveness of interest response suppression mechanisms which SNC can employ.
我们提出了一个可扩展的基于ndn的会议架构,用于会议控制和管理。会议控制功能分为单独的业务模块,加载到不同的控制服务器中。随着参与者数量的增加,控制服务器被添加到控制集群中。允许参与者从集群内的任何控制服务器注册和接收各种会议控制服务。参与者注册和访问记录由特定的控制服务器在本地维护。这项工作提出了基本的构建模块,使用(1)轻量级元数据进行有效的参与者记录管理,(2)分布式和自组织的参与者记录存储和复制,(3)高效、安全和分布式的会议访问机制,以及(4)动态和有效的控制服务器发现。该系统通过支持无缝的参与者移动性和自动服务器负载平衡,实现了快速高效的集群访问。控制集群是自组织和自修复的,能够扩展到大型参与者。它还可以扩展为举办多个会议。使用CCNx工具包,我们已经演示了SNC如何自动(无缝)选择最近的(小延迟)服务器,避免拥塞(受到攻击)和遥远的服务器。通过模拟实验,我们也证明了SNC可以采用的兴趣反应抑制机制的有效性。
{"title":"SNC: Scalable NDN-based conferencing architecture","authors":"Debessay Fesehaye, Jun Wei","doi":"10.1109/CCNC.2014.7056330","DOIUrl":"https://doi.org/10.1109/CCNC.2014.7056330","url":null,"abstract":"We present a scalable NDN-based conferencing architecture for conference control and management. Conference control functions are divided into individual service modules and are loaded into different control servers. Control servers are added into the control cluster as the number of parcitipants increases. Participants are allowed to register and receive variety of conference control services from any control servers within the cluster. Participant registration and access records are maintained locally by specific control servers. This work presents essential building blocks using (1) light-weighted metadata for effective participant record management, (2) distributed and self-organized storage and replication of participant records, (3) efficient, secure and distributed conference access mechanisms, and (4) dynamic and effective control server discovery. This system enables quick and efficient cluster access by supporting seamless participant mobility and automatic server load balancing. The control cluster is self-organized and self-healing and able to scale to large size of participants. It can also be extended to host multiple conferences. Using CCNx toolkits, we have demonstrated how SNC can automatically (seamlessly) select the closest (small delay) server avoiding congested (under-attack) and far away servers. Using simulation experiments, we have also shown the effectiveness of interest response suppression mechanisms which SNC can employ.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127542536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flexible end-to-end content security in CCN CCN中灵活的端到端内容安全性
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940528
Christopher A. Wood, E. Uzun
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.
以内容为中心的网络(CCN)项目是信息为中心的网络(ICN)的一种,通过将重点从主机和接口转移到信息上来将数据从源解耦。因此,内容可以在网络中直接访问和路由。在这种以数据为中心的范例中,维护内容机密性和隐私性的技术通常依赖于类似于现代数字版权管理(DRM)应用程序中使用的加密技术,这些技术通常需要传输多个消费者到生产者(端到端)消息,以建立身份、获取许可和访问加密的内容。本文提出了一种基于代理重加密的CCN安全内容分发体系结构。我们的设计提供了强大的端到端内容安全性,并减少了用户身份验证和密钥检索所需的协议消息的数量。与广泛部署的解决方案不同,我们的解决方案还能够利用CCN中的机会网络缓存。我们还通过实验比较了两种可用于实现该架构的代理再加密方案,并描述了我们在CCNx上开发的概念验证应用程序。
{"title":"Flexible end-to-end content security in CCN","authors":"Christopher A. Wood, E. Uzun","doi":"10.1109/CCNC.2014.6940528","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940528","url":null,"abstract":"Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel implementation of public key cryptosystems using Web workers 使用Web工作者并行实现公钥密码系统
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940513
T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi
Web Workers is a specification that defines an API which allows Web application developers to use background workers running scripts in parallel. Web Workers is used with JavaScript and is platform-independent. Hence, Web applications written in JavaScript can be used for a wide variety of purposes. There are many Web applications and some of them, for instance Internet election campaign and real-time broadcasting, need secure communications. We can include digital signatures with such Web applications to guarantee their security of communications. In this demonstration proposal, we assess the performance of parallel implementations of public key cryptosystems on several Web browsers (Internet Explorer, Google Chrome, Opera, and Firefox). With our implementation, it is possible to verify a message in 1.03 milliseconds on a Windows PC and 5.49 milliseconds on an Android tablet (Nexus 7). We also propose cryptography applications for Web browsers.
Web Workers是一种规范,它定义了一个API,允许Web应用程序开发人员使用并行运行脚本的后台worker。Web Workers与JavaScript一起使用,并且是独立于平台的。因此,用JavaScript编写的Web应用程序可以用于各种各样的目的。有许多Web应用程序,其中一些应用程序(例如Internet竞选和实时广播)需要安全通信。我们可以在这样的Web应用程序中包含数字签名,以保证其通信的安全性。在这个演示提案中,我们评估了几种Web浏览器(Internet Explorer、Google Chrome、Opera和Firefox)上公钥密码系统并行实现的性能。通过我们的实现,在Windows PC上验证消息的时间为1.03毫秒,在Android平板电脑(Nexus 7)上验证消息的时间为5.49毫秒。我们还为Web浏览器提出了加密应用程序。
{"title":"Parallel implementation of public key cryptosystems using Web workers","authors":"T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi","doi":"10.1109/CCNC.2014.6940513","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940513","url":null,"abstract":"Web Workers is a specification that defines an API which allows Web application developers to use background workers running scripts in parallel. Web Workers is used with JavaScript and is platform-independent. Hence, Web applications written in JavaScript can be used for a wide variety of purposes. There are many Web applications and some of them, for instance Internet election campaign and real-time broadcasting, need secure communications. We can include digital signatures with such Web applications to guarantee their security of communications. In this demonstration proposal, we assess the performance of parallel implementations of public key cryptosystems on several Web browsers (Internet Explorer, Google Chrome, Opera, and Firefox). With our implementation, it is possible to verify a message in 1.03 milliseconds on a Windows PC and 5.49 milliseconds on an Android tablet (Nexus 7). We also propose cryptography applications for Web browsers.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green symbiotic heterogeneous networks 绿色共生异质网络
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940505
H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai
This paper proposes a symbiotic and distributed communication paradigm for heterogeneous networks. The green and adaptive approach entails the simultaneous use of multiple communication interfaces, enabling efficient resource utilization. The judiciously designed architecture allows multiple users to access multiple mediums concomitantly, for both uplink and downlink, via virtualized communication ports and Internet Protocol (IP) schematic. Principal theoretic feasibility of the hypothesis is established by the linear increase in communication ca-pacity, with minimal energy requirement. Promising simulation and experimental results of a static scenario are shown, User Equipment's (UEs) connecting to multiple Communication Mediums (CMs).
本文提出了一种异构网络的共生分布式通信模式。绿色和自适应的方法需要同时使用多个通信接口,从而实现有效的资源利用。明智的设计架构允许多个用户同时访问多种媒体,上行和下行链路,通过虚拟通信端口和互联网协议(IP)原理图。该假设的主要理论可行性是在最小能量需求下,通信容量线性增加。给出了用户设备(ue)连接多种通信介质(CMs)静态场景的仿真和实验结果。
{"title":"Green symbiotic heterogeneous networks","authors":"H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai","doi":"10.1109/CCNC.2014.6940505","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940505","url":null,"abstract":"This paper proposes a symbiotic and distributed communication paradigm for heterogeneous networks. The green and adaptive approach entails the simultaneous use of multiple communication interfaces, enabling efficient resource utilization. The judiciously designed architecture allows multiple users to access multiple mediums concomitantly, for both uplink and downlink, via virtualized communication ports and Internet Protocol (IP) schematic. Principal theoretic feasibility of the hypothesis is established by the linear increase in communication ca-pacity, with minimal energy requirement. Promising simulation and experimental results of a static scenario are shown, User Equipment's (UEs) connecting to multiple Communication Mediums (CMs).","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1