首页 > 最新文献

International Symposium on Applications and the Internet Workshops (SAINTW'06)最新文献

英文 中文
A translation method between 802.15.4 nodes and IPv6 nodes 一种802.15.4节点与IPv6节点之间的转换方法
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.3
S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe
There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication between both technologies is important, though it is not easy for IEEE 802.15.4 packet to carry IPv6 packet due to its limited features. This paper shows a translation method between IPv6 nodes and IEEE 802.15.4 nodes
基于非ip的控制网络有很多种,如BA(楼宇自动化)、FA(工厂自动化)和PA(过程自动化)。IPv6和无线技术有望改善这些网络。IEEE 802.15.4是控制网络无线技术的候选标准,因为它具有低功耗和小实现等特点。这两种技术之间的无缝通信是很重要的,尽管IEEE 802.15.4数据包由于其有限的特性而不容易携带IPv6数据包。本文给出了一种IPv6节点与IEEE 802.15.4节点之间的转换方法
{"title":"A translation method between 802.15.4 nodes and IPv6 nodes","authors":"S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe","doi":"10.1109/SAINT-W.2006.3","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.3","url":null,"abstract":"There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication between both technologies is important, though it is not easy for IEEE 802.15.4 packet to carry IPv6 packet due to its limited features. This paper shows a translation method between IPv6 nodes and IEEE 802.15.4 nodes","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Extendable product traceability system from small start 可扩展的产品追溯系统从小开始
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.18
S. Wakayama, Yusuke Doi, S. Ozaki, Atsushi Inoue
A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databases and ID-hash values. We have evaluated the proper operation of this system with a trial system and plan to analyze its qualitative behavior through large-scale experiments
引入产品追溯系统的一种成本效益高且简单的方法是从一个小系统开始,逐步扩展到大型系统。在现有的现场测试中使用的跟踪系统不适合大规模部署,因为它们使用单一的、集中的数据库。本文描述了东芝公司提出的一种可扩展的可追溯系统,该系统采用分布式数据库和id -哈希值。我们已经通过试验系统评估了该系统的正常运行,并计划通过大规模实验来分析其定性行为
{"title":"Extendable product traceability system from small start","authors":"S. Wakayama, Yusuke Doi, S. Ozaki, Atsushi Inoue","doi":"10.1109/SAINT-W.2006.18","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.18","url":null,"abstract":"A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databases and ID-hash values. We have evaluated the proper operation of this system with a trial system and plan to analyze its qualitative behavior through large-scale experiments","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context-aware, ontology-based recommendations 上下文感知的、基于本体的建议
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.13
C. Räck, S. Arbanowski, S. Steglich
In this paper we study the synergy between user behavior, context data, and semantic information in order to enable future services to adapt to different situations based on the recommendations of a service-independent recommender. Therefore, we propose a system that delivers context-aware recommendations, which are based on provided feedback, context data, and an ontology-based content categorization scheme. We provide a detailed overview of the specification, a short description of a possible service scenario and a discussion of the results
在本文中,我们研究了用户行为、上下文数据和语义信息之间的协同作用,以使未来的服务能够基于独立于服务的推荐者的推荐来适应不同的情况。因此,我们提出了一个基于提供的反馈、上下文数据和基于本体的内容分类方案提供上下文感知推荐的系统。我们提供了规范的详细概述、可能的服务场景的简短描述以及对结果的讨论
{"title":"Context-aware, ontology-based recommendations","authors":"C. Räck, S. Arbanowski, S. Steglich","doi":"10.1109/SAINT-W.2006.13","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.13","url":null,"abstract":"In this paper we study the synergy between user behavior, context data, and semantic information in order to enable future services to adapt to different situations based on the recommendations of a service-independent recommender. Therefore, we propose a system that delivers context-aware recommendations, which are based on provided feedback, context data, and an ontology-based content categorization scheme. We provide a detailed overview of the specification, a short description of a possible service scenario and a discussion of the results","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Experimental study on UHF passive RFID readability degradation 超高频无源RFID读写性能下降的实验研究
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.17
J. Mitsugi, H. Hada
Readability of passive RFID fundamentally depends on the tag empowering. The minimum required power, usually referred to as sensitivity, depends on the chip and antenna manufacturing. The sensitivity affects the readability but it is not the sole determinant of readability. The readability of RFID comprises a number of factors, particularly in the UHF band. This paper proposes a classification of tag readability degradation factors and measurement methods to quantify the factors. It is shown that tag performance change at the attachment may affect the readability. A tag probe, a power measurement antenna at the position of tag attachment, can monitor essential data to comprehend the situation and establish a countermeasure to improve the tag readability. The operating environment, involving reader antenna positions and standing waves result from the multipath fading, is another important factor for the readability. The characteristics of the environment could be also grasped by using the tag probe.
无源射频识别的可读性从根本上取决于标签授权。所需的最小功率,通常称为灵敏度,取决于芯片和天线的制造。灵敏度影响可读性,但它不是可读性的唯一决定因素。RFID的可读性包括许多因素,特别是在UHF频段。本文提出了一种标签可读性退化因素的分类方法和量化这些因素的测量方法。结果表明,标签性能在附件处的变化可能会影响可读性。标签探针,即位于标签附着位置的功率测量天线,可以监测关键数据以了解情况并制定对策以提高标签的可读性。操作环境,包括读取器天线位置和多径衰落产生的驻波,是影响可读性的另一个重要因素。利用标签探针还可以掌握环境的特征。
{"title":"Experimental study on UHF passive RFID readability degradation","authors":"J. Mitsugi, H. Hada","doi":"10.1109/SAINT-W.2006.17","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.17","url":null,"abstract":"Readability of passive RFID fundamentally depends on the tag empowering. The minimum required power, usually referred to as sensitivity, depends on the chip and antenna manufacturing. The sensitivity affects the readability but it is not the sole determinant of readability. The readability of RFID comprises a number of factors, particularly in the UHF band. This paper proposes a classification of tag readability degradation factors and measurement methods to quantify the factors. It is shown that tag performance change at the attachment may affect the readability. A tag probe, a power measurement antenna at the position of tag attachment, can monitor essential data to comprehend the situation and establish a countermeasure to improve the tag readability. The operating environment, involving reader antenna positions and standing waves result from the multipath fading, is another important factor for the readability. The characteristics of the environment could be also grasped by using the tag probe.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Problems on IPv4-IPv6 network transition IPv4-IPv6网络转换问题
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.33
Ruri Hiromi, Hideaki Yoshifuji
IPv6 (Internet protocol version 6) is now available in various OSs and applications. It is also deployed in major ISP backbone networks. Although most of all IPv6 features work as they were designed, we may have potential problems with them and they might exist in IPv4-IPv6 dual stack environment. On the other hand, we don't have much opportunity to exchange enough information about dual stack network operation. We build a special research group named "IPv6-Fix" in WIDE Project in Japan, to investigate the potential issues related to IPv6 deployment. We concern about the problems on IPv4-IPv6 dual stack environment from various perspectives, such as specification, implementation and network operation. From our survey and analysis, we found some problems to be fixed. In this paper, we show some error cases taken by harmful specification, poor implementations and wrong operation. For the healthy coexistence of IPv4-IPv6, we share and consider how we should design and operate dual stack network
IPv6 (Internet protocol version 6)现在可以在各种操作系统和应用程序中使用。它也部署在主要的ISP骨干网中。虽然大多数IPv6功能都按照设计工作,但我们可能会遇到潜在的问题,并且它们可能存在于IPv4-IPv6双栈环境中。另一方面,我们没有太多的机会来交换关于双栈网络运行的足够的信息。我们在日本的WIDE项目中建立了一个名为“IPv6- fix”的专门研究小组,研究IPv6部署的潜在问题。我们从规范、实现和网络运行等多个角度关注IPv4-IPv6双栈环境存在的问题。从我们的调查和分析中,我们发现了一些需要解决的问题。本文列举了一些由于规范不良、实现不良和操作错误而导致的错误案例。为了ipv4和ipv6的健康共存,我们分享并考虑了双栈网络的设计和运行方式
{"title":"Problems on IPv4-IPv6 network transition","authors":"Ruri Hiromi, Hideaki Yoshifuji","doi":"10.1109/SAINT-W.2006.33","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.33","url":null,"abstract":"IPv6 (Internet protocol version 6) is now available in various OSs and applications. It is also deployed in major ISP backbone networks. Although most of all IPv6 features work as they were designed, we may have potential problems with them and they might exist in IPv4-IPv6 dual stack environment. On the other hand, we don't have much opportunity to exchange enough information about dual stack network operation. We build a special research group named \"IPv6-Fix\" in WIDE Project in Japan, to investigate the potential issues related to IPv6 deployment. We concern about the problems on IPv4-IPv6 dual stack environment from various perspectives, such as specification, implementation and network operation. From our survey and analysis, we found some problems to be fixed. In this paper, we show some error cases taken by harmful specification, poor implementations and wrong operation. For the healthy coexistence of IPv4-IPv6, we share and consider how we should design and operate dual stack network","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An L3-driven fast handover mechanism in IPv6 mobility IPv6迁移中l3驱动的快速切换机制
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.6
Kazutaka Gogo, R. Shibui, F. Teraoka
Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes a network layer (L3) driven fast handover mechanism by using the abstract link layer information. The L3-driven fast handover mechanism was implemented on FreeBSD. The measurement results show that the gap time of an L3 handover is only 3-4 msec in our outdoor test network consisting of eight IEEE 802.11a subnets
为了在IPv6中实现无缝移动,提出了几种快速切换机制。这些建议假设移动节点的网络层可以使用链路层信息。但是,它们都没有定义如何抽象和利用链路层信息。为了实现IPv6中链路层信息的快速切换,本文定义了链路层信息的抽象。利用抽象链路层信息,提出了一种网络层(L3)驱动的快速切换机制。l3驱动的快速切换机制在FreeBSD上实现。测试结果表明,在由8个IEEE 802.11a子网组成的室外测试网络中,L3切换的间隔时间仅为3-4 msec
{"title":"An L3-driven fast handover mechanism in IPv6 mobility","authors":"Kazutaka Gogo, R. Shibui, F. Teraoka","doi":"10.1109/SAINT-W.2006.6","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.6","url":null,"abstract":"Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes a network layer (L3) driven fast handover mechanism by using the abstract link layer information. The L3-driven fast handover mechanism was implemented on FreeBSD. The measurement results show that the gap time of an L3 handover is only 3-4 msec in our outdoor test network consisting of eight IEEE 802.11a subnets","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA 基于动态马尔可夫链和双时间尺度SPSA的RFID低成本目标识别
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.28
Shweta Singh
The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme which not only claims but also proves that cost involved in RFID tag collision can be reduced and also the throughput can be increased by adopting the so designed model of communication. The model is basically the combination of slotted aloha and two time scale SPSA. Finally the mathematical results have been obtained by pro grammatically simulating the above designed model
本文的重点是如何在完全成熟的RFID模型不具有成本效益的情况下降低RFID系统的成本。当我们更关心将这种技术用作简单的身份信息收集器,并以最小的中断将其嵌入到现有的it系统中时,低成本方法的问题就出现了。我们提出的方案是一种增强的防碰撞方案,不仅声称而且证明了采用这种设计的通信模型可以降低RFID标签碰撞所涉及的成本并提高吞吐量。该模型基本上是开槽aloha和双时间尺度SPSA的组合。最后对所设计的模型进行了程序模拟,得到了数学结果
{"title":"Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA","authors":"Shweta Singh","doi":"10.1109/SAINT-W.2006.28","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.28","url":null,"abstract":"The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme which not only claims but also proves that cost involved in RFID tag collision can be reduced and also the throughput can be increased by adopting the so designed model of communication. The model is basically the combination of slotted aloha and two time scale SPSA. Finally the mathematical results have been obtained by pro grammatically simulating the above designed model","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposal of a method for protecting private information in user context 提出一种在用户环境中保护私人信息的方法
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.35
Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh
In a ubiquitous computing environment, people can obtain and transmit information anytime, anywhere. In this situation, a user's context plays a key role. Unfortunately, the ubiquitous environment introduces some problems. The first is ease of access to what users truly want. The second important problem is handling private information. In utilizing a ubiquitous environment, all of a user's context is held online, and applications may share them to propose advanced services. Therefore, a user's context is automatically transmitted or attached as metadata. The context, however, includes the user's private information. Therefore, we need a system that separates information into private and public elements and treats them differently. In view of this, we consider how to attach metadata and how to extract and protect transmitted private information, in the specific case of blog entries. We propose a method of protecting private information that expands the existing item definition format in the CaTaC platform. This method will support the establishment of new communication methods using blogs in the near future
在普适计算环境下,人们可以随时随地获取和传输信息。在这种情况下,用户的上下文起着关键作用。不幸的是,无处不在的环境带来了一些问题。首先是方便地获得用户真正想要的东西。第二个重要问题是处理私人信息。在利用无处不在的环境中,用户的所有上下文都在线保存,应用程序可以共享它们以提供高级服务。因此,用户的上下文将自动作为元数据传输或附加。但是,上下文包含用户的私人信息。因此,我们需要一个系统,将信息分为私人和公共元素,并区别对待它们。鉴于此,我们考虑如何附加元数据以及如何提取和保护传输的私有信息,具体以博客条目为例。我们提出了一种保护私有信息的方法,该方法扩展了CaTaC平台中现有的条目定义格式。这种方法将支持在不久的将来使用博客建立新的通信方法
{"title":"Proposal of a method for protecting private information in user context","authors":"Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh","doi":"10.1109/SAINT-W.2006.35","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.35","url":null,"abstract":"In a ubiquitous computing environment, people can obtain and transmit information anytime, anywhere. In this situation, a user's context plays a key role. Unfortunately, the ubiquitous environment introduces some problems. The first is ease of access to what users truly want. The second important problem is handling private information. In utilizing a ubiquitous environment, all of a user's context is held online, and applications may share them to propose advanced services. Therefore, a user's context is automatically transmitted or attached as metadata. The context, however, includes the user's private information. Therefore, we need a system that separates information into private and public elements and treats them differently. In view of this, we consider how to attach metadata and how to extract and protect transmitted private information, in the specific case of blog entries. We propose a method of protecting private information that expands the existing item definition format in the CaTaC platform. This method will support the establishment of new communication methods using blogs in the near future","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product specific security features based on RFID technology 产品特定的安全功能基于RFID技术
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.34
Zoltán Nochta, T. Staake, E. Fleisch
In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach utilizes RFID technology: transponders hold unique and cryptographically secured data that uniquely binds a given product to a given tag, and thus makes duplication or re-application of tags difficult
在当今的商业中,产品假冒和盗版问题日益严重。犯罪分子拥有相当多的专业知识和资源,使他们能够生产和销售假冒产品。提出的解决方案旨在为给定产品提供唯一和安全的认证机制,以区分正品和假冒产品。作为底层技术,该方法利用RFID技术:转发器保存唯一且加密安全的数据,该数据将给定产品唯一地绑定到给定标签,从而使标签的复制或重新应用变得困难
{"title":"Product specific security features based on RFID technology","authors":"Zoltán Nochta, T. Staake, E. Fleisch","doi":"10.1109/SAINT-W.2006.34","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.34","url":null,"abstract":"In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach utilizes RFID technology: transponders hold unique and cryptographically secured data that uniquely binds a given product to a given tag, and thus makes duplication or re-application of tags difficult","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
IPv6 R&D activities in WIDE Project 广域项目的IPv6研发活动
Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.26
H. Esaki, A. Kato, J. Murai
The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of WIDE project has been IPv6 technology and has established IPv6 testbed since 1998. Basically, all of R&D activities in WIDE project are based on the IPv6. This paper describes the overview of WIDE project's IPv6 R&D activities, such as KAME/USAGI/TAHI/Nautikus6 projects
WIDE项目(www.wide.ad.jp)是工业界和学术界的一个研究联盟。WIDE项目由来自100多家私营公司和40多所大学的400多名活跃研究人员组成。WIDE项目运营着与许多其他研发试验台相连的全国性研发试验台,以及日本最大的试验台NSPIXPs。WIDE项目的主要重点是IPv6技术,并自1998年以来建立了IPv6测试平台。基本上,WIDE项目的所有研发活动都是基于IPv6的。本文概述了WIDE项目的IPv6研发活动,如KAME/USAGI/TAHI/Nautikus6项目
{"title":"IPv6 R&D activities in WIDE Project","authors":"H. Esaki, A. Kato, J. Murai","doi":"10.1109/SAINT-W.2006.26","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.26","url":null,"abstract":"The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of WIDE project has been IPv6 technology and has established IPv6 testbed since 1998. Basically, all of R&D activities in WIDE project are based on the IPv6. This paper describes the overview of WIDE project's IPv6 R&D activities, such as KAME/USAGI/TAHI/Nautikus6 projects","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Symposium on Applications and the Internet Workshops (SAINTW'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1