首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
XScale hardware acceleration on cryptographic algorithms for IPSec applications IPSec应用中加密算法的XScale硬件加速
Hung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin
Internet protocol security (IPSec) is proposed to provide security services at the IP layer in both the IPv4 and the IPv6 environment. It is composed of a set of protocols that utilizes cryptographic algorithms to encrypt and authenticate packets. This security mechanism has been widely deployed to implement virtual private networks (VPNs). To protect data during transmission and ensure data integration after transmission, both of the forward and the inverse cryptographic operations suffer from a very high cost of computation load. To lower down this cost, various hardware accelerators have been developed to offload these operations from the core CPU. Among them, Intel had integrated three security accelerators in its XScale core. On top of them, we had developed software modules to upgrade the performance of IPSec applications. Results show that acceleration has been achieved. In terms of network throughput, hardware-aided solutions have an average of 2.7 times faster than the software solutions.
IPSec (Internet protocol security)是为了在IPv4和IPv6环境下提供IP层的安全服务而提出的。它由一组协议组成,这些协议利用加密算法对数据包进行加密和认证。这种安全机制已被广泛应用于实现虚拟专用网(vpn)。为了保证传输过程中的数据保护和传输后的数据集成,正向和反向加密操作的计算负荷成本都非常高。为了降低这个成本,已经开发了各种硬件加速器来从核心CPU中卸载这些操作。其中,英特尔在其XScale核心中集成了三个安全加速器。在此基础上,我们开发了软件模块来提升IPSec应用程序的性能。结果表明,实现了加速。在网络吞吐量方面,硬件辅助解决方案的平均速度是软件解决方案的2.7倍。
{"title":"XScale hardware acceleration on cryptographic algorithms for IPSec applications","authors":"Hung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin","doi":"10.1109/ITCC.2005.304","DOIUrl":"https://doi.org/10.1109/ITCC.2005.304","url":null,"abstract":"Internet protocol security (IPSec) is proposed to provide security services at the IP layer in both the IPv4 and the IPv6 environment. It is composed of a set of protocols that utilizes cryptographic algorithms to encrypt and authenticate packets. This security mechanism has been widely deployed to implement virtual private networks (VPNs). To protect data during transmission and ensure data integration after transmission, both of the forward and the inverse cryptographic operations suffer from a very high cost of computation load. To lower down this cost, various hardware accelerators have been developed to offload these operations from the core CPU. Among them, Intel had integrated three security accelerators in its XScale core. On top of them, we had developed software modules to upgrade the performance of IPSec applications. Results show that acceleration has been achieved. In terms of network throughput, hardware-aided solutions have an average of 2.7 times faster than the software solutions.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A classifier-based text mining approach for evaluating semantic relatedness using support vector machines 一种基于分类器的文本挖掘方法,用于使用支持向量机评估语义相关性
Chung-Hong Lee, Hsin-Chang Yang
The quantification of evaluating semantic relatedness among texts has been a challenging issue that pervades much of machine learning and natural language processing. This paper presents a hybrid approach of a text-mining technique for measuring semantic relatedness among texts. In this work we develop several text classifiers using support vector machines (SVM) method to supporting acquisition of relatedness among texts. First, we utilized our developed text mining algorithms, including text mining techniques based on classification of texts in several text collections. After that, we employ various SVM classifiers to deal with evaluation of relatedness of the target documents. The results indicate that this approach can also be fitted to other research work, such as information filtering, and recategorizing resulting documents of search engine queries.
评估文本之间语义相关性的量化一直是一个具有挑战性的问题,它遍及机器学习和自然语言处理的许多领域。本文提出了一种文本挖掘技术的混合方法来测量文本之间的语义相关性。在这项工作中,我们使用支持向量机(SVM)方法开发了几个文本分类器来支持文本之间相关性的获取。首先,我们利用我们开发的文本挖掘算法,包括基于几个文本集合中的文本分类的文本挖掘技术。然后,我们使用各种支持向量机分类器来处理目标文档的相关性评估。结果表明,该方法也可以适用于其他研究工作,如信息过滤和搜索引擎查询结果文档的重新分类。
{"title":"A classifier-based text mining approach for evaluating semantic relatedness using support vector machines","authors":"Chung-Hong Lee, Hsin-Chang Yang","doi":"10.1109/ITCC.2005.2","DOIUrl":"https://doi.org/10.1109/ITCC.2005.2","url":null,"abstract":"The quantification of evaluating semantic relatedness among texts has been a challenging issue that pervades much of machine learning and natural language processing. This paper presents a hybrid approach of a text-mining technique for measuring semantic relatedness among texts. In this work we develop several text classifiers using support vector machines (SVM) method to supporting acquisition of relatedness among texts. First, we utilized our developed text mining algorithms, including text mining techniques based on classification of texts in several text collections. After that, we employ various SVM classifiers to deal with evaluation of relatedness of the target documents. The results indicate that this approach can also be fitted to other research work, such as information filtering, and recategorizing resulting documents of search engine queries.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122206055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Estimating software cost contingency using options theory 运用期权理论估算软件成本偶然性
Said Boukendour
This paper aims to estimate the project cost contingency regardless the individual utility function and risk aversion. Considering a project alike a short selling, the option pricing theory is used to value the contingency as a risk premium that would be required by the market if the project was a traded security.
本文的目的是在不考虑个体效用函数和风险规避的情况下估计项目成本偶然性。考虑到项目类似于卖空,期权定价理论用于将或有风险作为风险溢价进行估值,如果项目是交易证券,市场将要求风险溢价。
{"title":"Estimating software cost contingency using options theory","authors":"Said Boukendour","doi":"10.1109/ITCC.2005.147","DOIUrl":"https://doi.org/10.1109/ITCC.2005.147","url":null,"abstract":"This paper aims to estimate the project cost contingency regardless the individual utility function and risk aversion. Considering a project alike a short selling, the option pricing theory is used to value the contingency as a risk premium that would be required by the market if the project was a traded security.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compression standards roles in image processing: case study 压缩标准在图像处理中的作用:案例研究
Mohammad Eyadat, I. M. El-Ddin
With the rapid spread of image and video processing applications and the further development of multimedia technologies, compression standards become more and more important every day. This study was conducted to investigate the role of compression standards in image processing. Digital watermarking algorithm for securing multimedia application is considered one of the most important applications heavily rely on compression standards. It was selected to perform our experimental study by employing wavelet and JPEG compression standards. An analysis of the experiment results indicated that the wavelet outperform JPEG compression standard and applications implemented wavelet have better performance than those implemented JPEG.
随着图像和视频处理应用的迅速普及以及多媒体技术的进一步发展,压缩标准的重要性与日俱增。本研究旨在探讨压缩标准在图像处理中的作用。数字水印算法被认为是保护多媒体应用安全的最重要的应用之一,它严重依赖于压缩标准。我们选择小波和JPEG压缩标准来进行实验研究。实验结果分析表明,小波压缩优于JPEG压缩标准,实现小波压缩的应用比实现JPEG压缩的应用具有更好的性能。
{"title":"Compression standards roles in image processing: case study","authors":"Mohammad Eyadat, I. M. El-Ddin","doi":"10.1109/ITCC.2005.109","DOIUrl":"https://doi.org/10.1109/ITCC.2005.109","url":null,"abstract":"With the rapid spread of image and video processing applications and the further development of multimedia technologies, compression standards become more and more important every day. This study was conducted to investigate the role of compression standards in image processing. Digital watermarking algorithm for securing multimedia application is considered one of the most important applications heavily rely on compression standards. It was selected to perform our experimental study by employing wavelet and JPEG compression standards. An analysis of the experiment results indicated that the wavelet outperform JPEG compression standard and applications implemented wavelet have better performance than those implemented JPEG.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using unfamiliar platforms in software engineering projects 在软件工程项目中使用不熟悉的平台
Gregory A. Hall
This paper describes the use of programming projects for handheld devices within software engineering project classes. There are several benefits associated with using an unfamiliar platform and development tools in upper-level software engineering courses. The student's lack of familiarity with the development environment forces more time to be spent early on in the requirements and design of the project. In addition, the increasing popularity of mobile computing devices has made handheld programming experience valuable to graduating students in their job searches. This paper addresses the motivation for using handheld device programming projects, the technical issues associated with such projects, and the results of several semesters worth of teaching experience and student feedback.
本文描述了在软件工程项目类中手持设备的编程项目的使用。在高级软件工程课程中使用不熟悉的平台和开发工具有几个好处。学生对开发环境的不熟悉迫使他们将更多的时间花在项目的需求和设计上。此外,移动计算设备的日益普及使得手持编程经验对毕业生找工作很有价值。本文阐述了使用手持设备编程项目的动机,与此类项目相关的技术问题,以及几个学期的教学经验和学生反馈的结果。
{"title":"Using unfamiliar platforms in software engineering projects","authors":"Gregory A. Hall","doi":"10.1109/ITCC.2005.289","DOIUrl":"https://doi.org/10.1109/ITCC.2005.289","url":null,"abstract":"This paper describes the use of programming projects for handheld devices within software engineering project classes. There are several benefits associated with using an unfamiliar platform and development tools in upper-level software engineering courses. The student's lack of familiarity with the development environment forces more time to be spent early on in the requirements and design of the project. In addition, the increasing popularity of mobile computing devices has made handheld programming experience valuable to graduating students in their job searches. This paper addresses the motivation for using handheld device programming projects, the technical issues associated with such projects, and the results of several semesters worth of teaching experience and student feedback.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disciplined methods of software specification: a case study 规范的软件规范方法:一个案例研究
R. Baber, D. Parnas, S. Vilkomir, P. Harrison, Tony O'Connor
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and to help practitioners who want to apply such methods by allowing them to pick the best one for their problem. The object for the case study is software used by Dell Products for testing the functionality of the keyboards on notebook computers. Starting from informal documents, we developed a variety of tabular representations of finite state machine specifications and tabular trace specifications. We found that the discipline required by these methods raised issues that had never been considered and resulted in documents that were both more complete and much clearer. The various tabular representations are compared from a user's point of view, i.e., clarity, consistency, unambiguity, completeness, suitability, etc.
我们描述了将表格数学方法应用于软件规格说明的经验。我们的目的是展示编写表格规范的可选方法,并帮助那些希望应用这些方法的实践者,让他们为自己的问题选择最好的方法。案例研究的对象是戴尔产品公司用于测试笔记本电脑键盘功能的软件。从非正式文档开始,我们开发了有限状态机规范和表格跟踪规范的各种表格表示。我们发现,这些方法所要求的纪律提出了从未被考虑过的问题,并导致了更完整和更清晰的文档。从用户的角度比较各种表格表示,即,清晰度,一致性,无歧义性,完整性,适用性等。
{"title":"Disciplined methods of software specification: a case study","authors":"R. Baber, D. Parnas, S. Vilkomir, P. Harrison, Tony O'Connor","doi":"10.1109/ITCC.2005.132","DOIUrl":"https://doi.org/10.1109/ITCC.2005.132","url":null,"abstract":"We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and to help practitioners who want to apply such methods by allowing them to pick the best one for their problem. The object for the case study is software used by Dell Products for testing the functionality of the keyboards on notebook computers. Starting from informal documents, we developed a variety of tabular representations of finite state machine specifications and tabular trace specifications. We found that the discipline required by these methods raised issues that had never been considered and resulted in documents that were both more complete and much clearer. The various tabular representations are compared from a user's point of view, i.e., clarity, consistency, unambiguity, completeness, suitability, etc.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123376789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Simulation of mobility and routing in ad hoc networks using ant colony algorithms 用蚁群算法模拟自组织网络中的移动性和路由
T. Ahmed
Mobile ad-hoc networks (MANET's) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important in communication and networking. Routing is one of the most important and difficult aspects in ad hoc network since ad hoc network topology frequently changes. Conventional routing algorithms are difficult to be applied to a dynamic network topology, therefore modeling and design an efficient routing protocol in such dynamic networks is an important issue. One of the meta-heuristic algorithms which is inspired by the behavior of real ants is called ant colony optimization (ACO) algorithm, it can definitely be used as a tool to tackle the mercurial scenarios present in this dynamic environment. In this paper, the author has designed a model, which combines ant colony behavior and queuing network analysis to evaluate end-to-end packet delay in MANET.
移动自组织网络(MANET’s)最近引起了研究界和工业界的广泛关注。这项技术在通信和网络中变得越来越重要。由于自组织网络拓扑结构的频繁变化,路由是自组织网络中最重要也是最困难的问题之一。传统的路由算法难以适用于动态网络拓扑,因此在动态网络中建模和设计高效的路由协议是一个重要的问题。其中一种启发于真实蚂蚁行为的元启发式算法被称为蚁群优化(ACO)算法,它绝对可以用作解决这个动态环境中存在的多变场景的工具。在本文中,作者设计了一个结合蚁群行为和排队网络分析的模型来评估MANET中的端到端数据包延迟。
{"title":"Simulation of mobility and routing in ad hoc networks using ant colony algorithms","authors":"T. Ahmed","doi":"10.1109/ITCC.2005.257","DOIUrl":"https://doi.org/10.1109/ITCC.2005.257","url":null,"abstract":"Mobile ad-hoc networks (MANET's) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important in communication and networking. Routing is one of the most important and difficult aspects in ad hoc network since ad hoc network topology frequently changes. Conventional routing algorithms are difficult to be applied to a dynamic network topology, therefore modeling and design an efficient routing protocol in such dynamic networks is an important issue. One of the meta-heuristic algorithms which is inspired by the behavior of real ants is called ant colony optimization (ACO) algorithm, it can definitely be used as a tool to tackle the mercurial scenarios present in this dynamic environment. In this paper, the author has designed a model, which combines ant colony behavior and queuing network analysis to evaluate end-to-end packet delay in MANET.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitives 用于非基于密钥的加密哈希原语的统一硬件架构的ASIC实现
T. Ganesh, T. Sudarshan
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present the ASIC implementation of 'HashChip', a hardware architecture aimed at providing a unified solution for three different commercial MDC (manipulation detection codes) hash primitives, namely MD5, SHA1 and RIPEMD160. The novelty of the work lies in the exploitation of the similarities in the structure of the three algorithms to obtain an optimized architecture. The performance analysis of a 0.18/spl mu/m ASIC implementation of the architecture has also been done.
哈希算法是一类用于满足密码学中完整性和身份验证要求的密码学原语。在本文中,我们提出并展示了“HashChip”的ASIC实现,这是一种硬件架构,旨在为三种不同的商业MDC(操作检测码)哈希原语,即MD5, SHA1和RIPEMD160提供统一的解决方案。这项工作的新颖之处在于利用了三种算法在结构上的相似性来获得优化的结构。并对该架构的0.18/spl μ m ASIC实现进行了性能分析。
{"title":"ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitives","authors":"T. Ganesh, T. Sudarshan","doi":"10.1109/ITCC.2005.91","DOIUrl":"https://doi.org/10.1109/ITCC.2005.91","url":null,"abstract":"Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present the ASIC implementation of 'HashChip', a hardware architecture aimed at providing a unified solution for three different commercial MDC (manipulation detection codes) hash primitives, namely MD5, SHA1 and RIPEMD160. The novelty of the work lies in the exploitation of the similarities in the structure of the three algorithms to obtain an optimized architecture. The performance analysis of a 0.18/spl mu/m ASIC implementation of the architecture has also been done.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using RoleOf relationship in design pattern instantiation 在设计模式实例化中使用RoleOf关系
Chengwan He, K. He, Fei He, Feng Yao, Jin Liu
The scattering of pattern logic (the attributes and methods of pattern role) is the most typical problem on design pattern instantiation, that is, pattern logic scatters across multiple business classes, which causes problems, such as, debasing the reusability of pattern logic, losing the instantiation information of pattern (traceability and overlapping problem) etc. To resolve these problems in design level, an approach to design pattern instantiation based on RoleOf relationship is proposed. It treats role as the independent modeling element and introduces RoleOf relationship between business class and role, which makes the business logic and the pattern logic completely separated, thus improves its reusability. Through the extension of UML, the meta-model and semantics of RoleOf relationship, and stereotypes and tagged values used for identify pattern information are provided, it resolves the traceability and overlapping problem. Finally, the implementation method of RoleOf relationship is discussed through an example.
模式逻辑(模式角色的属性和方法)的分散是设计模式实例化中最典型的问题,即模式逻辑在多个业务类之间分散,从而导致模式逻辑的可重用性降低、模式实例化信息丢失(可追溯性和重叠问题)等问题。为了在设计层面解决这些问题,提出了一种基于RoleOf关系的设计模式实例化方法。将角色作为独立的建模元素,在业务类和角色之间引入RoleOf关系,使业务逻辑和模式逻辑完全分离,提高了可重用性。通过UML的扩展,提供了RoleOf关系的元模型和语义,以及用于标识模式信息的原型和标记值,解决了可追溯性和重叠问题。最后,通过实例讨论了RoleOf关系的实现方法。
{"title":"Using RoleOf relationship in design pattern instantiation","authors":"Chengwan He, K. He, Fei He, Feng Yao, Jin Liu","doi":"10.1109/ITCC.2005.288","DOIUrl":"https://doi.org/10.1109/ITCC.2005.288","url":null,"abstract":"The scattering of pattern logic (the attributes and methods of pattern role) is the most typical problem on design pattern instantiation, that is, pattern logic scatters across multiple business classes, which causes problems, such as, debasing the reusability of pattern logic, losing the instantiation information of pattern (traceability and overlapping problem) etc. To resolve these problems in design level, an approach to design pattern instantiation based on RoleOf relationship is proposed. It treats role as the independent modeling element and introduces RoleOf relationship between business class and role, which makes the business logic and the pattern logic completely separated, thus improves its reusability. Through the extension of UML, the meta-model and semantics of RoleOf relationship, and stereotypes and tagged values used for identify pattern information are provided, it resolves the traceability and overlapping problem. Finally, the implementation method of RoleOf relationship is discussed through an example.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126455972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient secure key issuing protocol in ID-based cryptosystems 基于id的密码系统中有效的安全密钥发布协议
Raju Gangishetti, M. C. Gorantla, M. Das, A. Saxena, V. Gulati
This paper presents an efficient and secure protocol for key issuing in ID-based cryptosystems using bilinear pairings. We use a simple blinding technique to eliminate the need of secure channel and multiple authorities approach to avoid the key escrow problem. We show that our protocol overcomes the disadvantages of other pairing based schemes and is efficient compared to the existing key issuing protocol.
本文利用双线性对提出了一种高效安全的基于id的密码系统密钥发布协议。我们使用一种简单的盲化技术来消除对安全通道的需求,并使用多授权方法来避免密钥托管问题。我们证明了我们的协议克服了其他基于配对的方案的缺点,并且与现有的密钥发布协议相比是有效的。
{"title":"An efficient secure key issuing protocol in ID-based cryptosystems","authors":"Raju Gangishetti, M. C. Gorantla, M. Das, A. Saxena, V. Gulati","doi":"10.1109/ITCC.2005.75","DOIUrl":"https://doi.org/10.1109/ITCC.2005.75","url":null,"abstract":"This paper presents an efficient and secure protocol for key issuing in ID-based cryptosystems using bilinear pairings. We use a simple blinding technique to eliminate the need of secure channel and multiple authorities approach to avoid the key escrow problem. We show that our protocol overcomes the disadvantages of other pairing based schemes and is efficient compared to the existing key issuing protocol.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1