首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications (aina 2008)最新文献

英文 中文
Development and Evaluation of a Collaborative Virtual Environment Supporting Self Feedbacks of Electroencephalogram 支持脑电图自我反馈的协同虚拟环境的开发与评价
Akihiro Miyata, Shota Yamamoto, Masaki Hayashi, Takefumi Hayashi, H. Shigeno, Ken-ichi Okada
Currently, there are many occasions to communicate with each other in the collaborative virtual environment. However, it is more difficult to keep high-motivation for participating in communication in such virtual environment than in face-to-face environment. It is considered that the reasons are 1) the difficulty of understanding how their own motivations are and 2) the boring expression due to the fixed view point. To address this issue, we display electroencephalogram information to a virtual space by forward-backward model - zoom in/out of whole virtual space. According to the results of experiment, our system successfully provides an environment in which people can keep high-motivations for participating in communication.
目前,在协作虚拟环境中有很多相互通信的场合。然而,在这样的虚拟环境中,要保持参与交流的高动机比在面对面的环境中更难。人们认为原因是1)很难理解自己的动机是什么,2)由于固定的观点,表达很无聊。为了解决这一问题,我们采用前后向模型将脑电图信息显示到虚拟空间中——放大/缩小整个虚拟空间。实验结果表明,我们的系统成功地为人们提供了一个保持参与交流的高动机的环境。
{"title":"Development and Evaluation of a Collaborative Virtual Environment Supporting Self Feedbacks of Electroencephalogram","authors":"Akihiro Miyata, Shota Yamamoto, Masaki Hayashi, Takefumi Hayashi, H. Shigeno, Ken-ichi Okada","doi":"10.1109/AINA.2008.99","DOIUrl":"https://doi.org/10.1109/AINA.2008.99","url":null,"abstract":"Currently, there are many occasions to communicate with each other in the collaborative virtual environment. However, it is more difficult to keep high-motivation for participating in communication in such virtual environment than in face-to-face environment. It is considered that the reasons are 1) the difficulty of understanding how their own motivations are and 2) the boring expression due to the fixed view point. To address this issue, we display electroencephalogram information to a virtual space by forward-backward model - zoom in/out of whole virtual space. According to the results of experiment, our system successfully provides an environment in which people can keep high-motivations for participating in communication.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space 强连通性和低存储空间传感器节点的有效密钥预分配
H. Chien, R. Chen, An-Ni Shen
One of the challenges to secure wireless sensor networks (WSNs) is to design secure pair-wise key agreement between any pair of resources-limited sensors while keeping strong connectivity. In this paper, we point out the fatal security weaknesses of Cheng-Agrawal's pair-wise key agreement scheme for WSNs, and then propose a new scheme. Compared to the existing schemes, the proposed scheme owns two outstanding merits- assurance of connectivity between any pair of nodes and security robustness against node capture attack.
安全无线传感器网络面临的挑战之一是在资源有限的任意一对传感器之间设计安全的双密钥协议,同时保持强连通性。本文指出了Cheng-Agrawal的无线传感器网络配对密钥协议方案存在的致命安全缺陷,并提出了一种新的方案。与现有方案相比,该方案具有保证任意对节点之间的连通性和抗节点捕获攻击的安全鲁棒性两个突出优点。
{"title":"Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space","authors":"H. Chien, R. Chen, An-Ni Shen","doi":"10.1109/AINA.2008.24","DOIUrl":"https://doi.org/10.1109/AINA.2008.24","url":null,"abstract":"One of the challenges to secure wireless sensor networks (WSNs) is to design secure pair-wise key agreement between any pair of resources-limited sensors while keeping strong connectivity. In this paper, we point out the fatal security weaknesses of Cheng-Agrawal's pair-wise key agreement scheme for WSNs, and then propose a new scheme. Compared to the existing schemes, the proposed scheme owns two outstanding merits- assurance of connectivity between any pair of nodes and security robustness against node capture attack.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Evaluation of the Processing Workload for Two Models of Communication Control in IP Networks IP网络中两种通信控制模式的处理工作量评估
Kazuya Odagiri, G. Marco, Nao Tanoue, Rihito Yaegashi, M. Tadauchi, N. Ishii
In standard IP networks, the control of communication of individual connections is an important aspect of network management. Generally, we distinguish two models of communication control. One is based on the exploitation of standard mechanisms, such as IP filtering, port blocking, routing rules, deployed along the path between the client and the server. We refer to these mechanisms as infrastructure-based management model. On the other hand, the control can be carried out by controlling the client machines of every user. This new model is a client-side management model, and it has been realized in our previous work, by means of a dedicated framework we called DACS. Essentially, DACS distributes the control within the client machines. Therefore, also the network management processing workload is distributed. While in our previous work we investigated functions of DACS scheme and network services, here we are more concerned with analyzing the processing workload due to communication control demanded to the client machines in practical networks. In this regard, we evaluate DACS performance from the point of view of the processing load and demonstrate by some preliminary experiments that DACS framework is better than infrastructure-based management models. From this result, we conclude that, DACS outperforms existing solutions for the communication control problem, because it can control a whole local area network by distributed control of client machines, with an acceptable increase of the processing workload.
在标准IP网络中,对单个连接的通信控制是网络管理的一个重要方面。一般来说,我们区分两种通信控制模型。一种是基于利用标准机制,如IP过滤、端口阻塞、路由规则,沿着客户端和服务器之间的路径部署。我们将这些机制称为基于基础设施的管理模型。另一方面,可以通过控制每个用户的客户机来实现控制。这个新模型是一个客户端管理模型,它已经在我们之前的工作中通过我们称为DACS的专用框架实现了。实质上,DACS在客户机机器中分配控制。因此,网络管理处理的工作负载也是分布式的。在我们之前的工作中,我们研究了DACS方案和网络服务的功能,而在这里,我们更关心的是分析实际网络中由于客户端机器需要通信控制而产生的处理工作量。在这方面,我们从处理负载的角度评估DACS性能,并通过一些初步实验证明DACS框架优于基于基础设施的管理模型。从这个结果,我们得出结论,DACS在通信控制问题上优于现有的解决方案,因为它可以通过分布式控制客户端机器来控制整个局域网,而处理工作量的增加是可以接受的。
{"title":"Evaluation of the Processing Workload for Two Models of Communication Control in IP Networks","authors":"Kazuya Odagiri, G. Marco, Nao Tanoue, Rihito Yaegashi, M. Tadauchi, N. Ishii","doi":"10.1109/AINA.2008.63","DOIUrl":"https://doi.org/10.1109/AINA.2008.63","url":null,"abstract":"In standard IP networks, the control of communication of individual connections is an important aspect of network management. Generally, we distinguish two models of communication control. One is based on the exploitation of standard mechanisms, such as IP filtering, port blocking, routing rules, deployed along the path between the client and the server. We refer to these mechanisms as infrastructure-based management model. On the other hand, the control can be carried out by controlling the client machines of every user. This new model is a client-side management model, and it has been realized in our previous work, by means of a dedicated framework we called DACS. Essentially, DACS distributes the control within the client machines. Therefore, also the network management processing workload is distributed. While in our previous work we investigated functions of DACS scheme and network services, here we are more concerned with analyzing the processing workload due to communication control demanded to the client machines in practical networks. In this regard, we evaluate DACS performance from the point of view of the processing load and demonstrate by some preliminary experiments that DACS framework is better than infrastructure-based management models. From this result, we conclude that, DACS outperforms existing solutions for the communication control problem, because it can control a whole local area network by distributed control of client machines, with an acceptable increase of the processing workload.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Composite Subscription and Matching Algorithm for RFID Applications RFID应用中的复合订阅与匹配算法
Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long
RFID technology facilitates monitoring and managing products. In most RFID applications, users pay much attention to temporal and logical event patterns, which is further strengthened by highly temporal RFID data. If RFID events or other kinds of events are disseminated to users through Pub/Sub service, visibility of product states will be greatly increased and fast processing these events will become possible. However, the traditional Pub/Sub systems cannot support composite events involving abundant temporal constraints. Therefore, they cannot fully meet the needs of RFID applications. Aiming at RFID-related application scenarios, this paper designs a composite subscription language embedded with diversified temporal operators and proposes a matching algorithm for detecting composite events which has been implemented in our Pub/Sub system OncePubSub. Performance evaluation results indicate our algorithm is more efficient than the two systems based on Siena and JESS respectively.
RFID技术便于对产品进行监控和管理。在大多数RFID应用中,用户非常关注时间和逻辑事件模式,高度时间化的RFID数据进一步加强了这一点。如果通过Pub/Sub服务将RFID事件或其他类型的事件传播给用户,将大大增加产品状态的可见性,并使快速处理这些事件成为可能。然而,传统的Pub/Sub系统不能支持包含大量时间约束的组合事件。因此,它们不能完全满足RFID应用的需求。针对rfid相关的应用场景,设计了一种嵌入多种时间算子的复合订阅语言,提出了一种用于检测复合事件的匹配算法,并在我们的Pub/Sub系统OncePubSub中实现。性能评估结果表明,我们的算法比分别基于Siena和JESS的两种系统效率更高。
{"title":"Composite Subscription and Matching Algorithm for RFID Applications","authors":"Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long","doi":"10.1109/AINA.2008.49","DOIUrl":"https://doi.org/10.1109/AINA.2008.49","url":null,"abstract":"RFID technology facilitates monitoring and managing products. In most RFID applications, users pay much attention to temporal and logical event patterns, which is further strengthened by highly temporal RFID data. If RFID events or other kinds of events are disseminated to users through Pub/Sub service, visibility of product states will be greatly increased and fast processing these events will become possible. However, the traditional Pub/Sub systems cannot support composite events involving abundant temporal constraints. Therefore, they cannot fully meet the needs of RFID applications. Aiming at RFID-related application scenarios, this paper designs a composite subscription language embedded with diversified temporal operators and proposes a matching algorithm for detecting composite events which has been implemented in our Pub/Sub system OncePubSub. Performance evaluation results indicate our algorithm is more efficient than the two systems based on Siena and JESS respectively.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Distributed Trust Management Based on Authorizing Negotiation in Open and Dynamic Environments 开放动态环境下基于授权协商的分布式信任管理
Shangyuan Guan, Xiaoshe Dong, Weiguo Wu, Yiduo Mei, Guofu Feng
Trust has been recognized as an important factor for information security in open and dynamic environments, such as Internet applications, p2p systems etc. On the basis of analyzing existing trust management systems, this paper proposes a Distributed Trust Management based on Authorizing Negotiation (DTMAN). DTMAN presents a number of innovative features. First, it can authorize strangers by using authorizing negotiation, so it is very suitable for open and dynamic environments. Second, a high efficient algorithm for compliance checking is developed to support DTMAN, whose time complexity and space complexity are both O(n) (where n is the cardinality of the set of authorization credentials). The experimental result shows that the algorithm of DTMAN is more efficient than others.
信任已被认为是开放和动态环境中信息安全的重要因素,如互联网应用、p2p系统等。在分析现有信任管理系统的基础上,提出了一种基于授权协商的分布式信任管理(DTMAN)。DTMAN呈现出许多创新特性。首先,它可以通过授权协商对陌生人进行授权,因此非常适合于开放和动态的环境。其次,开发了一种高效的符合性检查算法来支持DTMAN,其时间复杂度和空间复杂度均为O(n为授权凭证集的基数)。实验结果表明,DTMAN算法比其他算法效率更高。
{"title":"A Distributed Trust Management Based on Authorizing Negotiation in Open and Dynamic Environments","authors":"Shangyuan Guan, Xiaoshe Dong, Weiguo Wu, Yiduo Mei, Guofu Feng","doi":"10.1109/AINA.2008.25","DOIUrl":"https://doi.org/10.1109/AINA.2008.25","url":null,"abstract":"Trust has been recognized as an important factor for information security in open and dynamic environments, such as Internet applications, p2p systems etc. On the basis of analyzing existing trust management systems, this paper proposes a Distributed Trust Management based on Authorizing Negotiation (DTMAN). DTMAN presents a number of innovative features. First, it can authorize strangers by using authorizing negotiation, so it is very suitable for open and dynamic environments. Second, a high efficient algorithm for compliance checking is developed to support DTMAN, whose time complexity and space complexity are both O(n) (where n is the cardinality of the set of authorization credentials). The experimental result shows that the algorithm of DTMAN is more efficient than others.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems 基于tcam的网络入侵检测系统改进预过滤
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su
With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network intrusion detection system (NIDS) is developed to identify these network attacks by a set of rules. However, searching for multiple patterns is a computationally expensive task in NIDS. Traditional software-based solutions can not meet the high bandwidth demanded in current high-speed networks. In the past, the pre-filtering designed for NIDS is an effective technique that can reduce the processing overhead significantly. A FNP- like TCAM searching engine (FTSE) is an example that uses an 2-stage architecture to detect whether an incoming string contains patterns. In this paper, we propose two techniques to improve the performance of FTSE that utilizes ternary content addressable memory (TCAM) as pre-filter to achieve gigabit performance. The first technique performs the w-byte suffix pattern match instead of using w-byte prefix. The second technique finds the matching results from all groups rather than first group. We finally present the simulation result using Snort pattern set and DEFCON packet traces.
随着互联网的日益增长,攻击和病毒的爆发严重影响着网络安全。网络入侵检测系统(NIDS)就是通过一套规则来识别这些网络攻击。然而,在NIDS中搜索多个模式是一项计算成本很高的任务。传统的基于软件的解决方案已不能满足当前高速网络对高带宽的需求。在过去,针对NIDS设计的预滤波是一种有效的技术,可以显著降低处理开销。类似于FNP的TCAM搜索引擎(FTSE)就是一个使用两阶段架构来检测输入字符串是否包含模式的例子。在本文中,我们提出了两种技术来提高FTSE的性能,利用三元内容可寻址存储器(TCAM)作为预滤波器来实现千兆性能。第一种技术执行w字节后缀模式匹配,而不是使用w字节前缀。第二种技术是从所有组而不是第一组中查找匹配结果。最后给出了使用Snort模式集和DEFCON数据包跟踪的仿真结果。
{"title":"Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems","authors":"Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su","doi":"10.1109/AINA.2008.120","DOIUrl":"https://doi.org/10.1109/AINA.2008.120","url":null,"abstract":"With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network intrusion detection system (NIDS) is developed to identify these network attacks by a set of rules. However, searching for multiple patterns is a computationally expensive task in NIDS. Traditional software-based solutions can not meet the high bandwidth demanded in current high-speed networks. In the past, the pre-filtering designed for NIDS is an effective technique that can reduce the processing overhead significantly. A FNP- like TCAM searching engine (FTSE) is an example that uses an 2-stage architecture to detect whether an incoming string contains patterns. In this paper, we propose two techniques to improve the performance of FTSE that utilizes ternary content addressable memory (TCAM) as pre-filter to achieve gigabit performance. The first technique performs the w-byte suffix pattern match instead of using w-byte prefix. The second technique finds the matching results from all groups rather than first group. We finally present the simulation result using Snort pattern set and DEFCON packet traces.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"77 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6 移动IPv6代理路由优化过程中防止乱序报文
Jong‐Hyouk Lee, Hyung-Jin Lim, Tai-Myung Chung
Proxy mobile IPv6 is one of network-based mobility support protocols which does not require a mobile host to be involved in mobility support signaling. Even though proxy mobile IPv6 has many advantages than client-based mobility support protocols such as mobile IPv6, unfortunately, it may cause an out-of-sequence problem during its route optimization procedure. Thus, in this paper, we develop an estimation function for an out- of-sequence time period and reveal the out-of-sequence problem caused by the route optimization procedure. Then we propose a scheme which minimizes the arrival of out-of-sequence packets to the mobile host and analyze the impact of out-of-sequence packets. The performance evaluation results demonstrate that the traffic rate and out-of-sequence time period mainly have an effect on the out-of-sequence problem.
代理移动IPv6是一种基于网络的移动支持协议,它不需要移动主机参与移动支持信令。尽管代理移动IPv6比基于客户端的移动支持协议(如移动IPv6)有许多优点,但不幸的是,它在路由优化过程中可能会导致乱序问题。因此,在本文中,我们建立了一个无序时段的估计函数,揭示了由路径优化过程引起的无序问题。然后,我们提出了一种最小化乱序数据包到达移动主机的方案,并分析了乱序数据包的影响。性能评价结果表明,流量速率和乱序时间段对乱序问题的影响主要有两个方面。
{"title":"Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6","authors":"Jong‐Hyouk Lee, Hyung-Jin Lim, Tai-Myung Chung","doi":"10.1109/AINA.2008.100","DOIUrl":"https://doi.org/10.1109/AINA.2008.100","url":null,"abstract":"Proxy mobile IPv6 is one of network-based mobility support protocols which does not require a mobile host to be involved in mobility support signaling. Even though proxy mobile IPv6 has many advantages than client-based mobility support protocols such as mobile IPv6, unfortunately, it may cause an out-of-sequence problem during its route optimization procedure. Thus, in this paper, we develop an estimation function for an out- of-sequence time period and reveal the out-of-sequence problem caused by the route optimization procedure. Then we propose a scheme which minimizes the arrival of out-of-sequence packets to the mobile host and analyze the impact of out-of-sequence packets. The performance evaluation results demonstrate that the traffic rate and out-of-sequence time period mainly have an effect on the out-of-sequence problem.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story" 利用视觉记忆图式改进用户认证:“故事图式”的开发
Takumi Yamamoto, Atsushi Harada, T. Isarida, M. Nishigaki
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original images corresponding to the unclear pass-images. These unclear images are meaningless to unauthorized users. Hence, it is difficult for attackers to memorize these unclear pass-images, even though they may have observed legitimate users' authentication trials. However, as long as the same pass-images are always used, it would not be completely impossible for unauthorized users to memorize unclear-images. Therefore, this paper discusses enhancement to the authentication system by permitting users to memorize a number of pass-images and using a different subset of pass-images at all authentication trials. To mitigate the burden imposed by memorizing additional pass-images in the enhanced system, we modified it by extracting a certain number of images from a video sequence. The pass-images were obtained by making the extracted images unclear. As only legitimate users were allowed to view the video sequence in their registration phase, only they could understand what the unclear pass-images meant. Thus, the unclear pass-images become easy for legitimate users to memorize. We verified the effectiveness of the enhanced system through comparative experiments.
提出了一种使用“不清晰图像”作为pass-image的用户认证系统,只有合法用户才能通过查看不清晰图像对应的原始图像来理解其含义。这些不清晰的图像对未经授权的用户来说毫无意义。因此,攻击者很难记住这些不清楚的密码映像,即使他们可能已经观察到合法用户的身份验证试验。但是,只要始终使用相同的pass-image,对于未经授权的用户来说,记住不清晰的image并不是完全不可能的。因此,本文讨论了通过允许用户记忆一些通过图像并在所有身份验证试验中使用不同的通过图像子集来增强身份验证系统。为了减轻在增强系统中记忆额外的传递图像所带来的负担,我们通过从视频序列中提取一定数量的图像来对其进行修改。通过对提取的图像进行模糊处理,获得通过图像。由于只有合法用户在注册阶段才被允许观看视频序列,所以只有他们才能理解不清楚的密码图像是什么意思。因此,不清晰的密码图像对合法用户来说很容易记住。通过对比实验验证了增强系统的有效性。
{"title":"Improvement of User Authentication Using Schema of Visual Memory: Exploitation of \"Schema of Story\"","authors":"Takumi Yamamoto, Atsushi Harada, T. Isarida, M. Nishigaki","doi":"10.1109/AINA.2008.40","DOIUrl":"https://doi.org/10.1109/AINA.2008.40","url":null,"abstract":"A user authentication system using \"unclear images\" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original images corresponding to the unclear pass-images. These unclear images are meaningless to unauthorized users. Hence, it is difficult for attackers to memorize these unclear pass-images, even though they may have observed legitimate users' authentication trials. However, as long as the same pass-images are always used, it would not be completely impossible for unauthorized users to memorize unclear-images. Therefore, this paper discusses enhancement to the authentication system by permitting users to memorize a number of pass-images and using a different subset of pass-images at all authentication trials. To mitigate the burden imposed by memorizing additional pass-images in the enhanced system, we modified it by extracting a certain number of images from a video sequence. The pass-images were obtained by making the extracted images unclear. As only legitimate users were allowed to view the video sequence in their registration phase, only they could understand what the unclear pass-images meant. Thus, the unclear pass-images become easy for legitimate users to memorize. We verified the effectiveness of the enhanced system through comparative experiments.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Priority Ordering Algorithm for Scalable Video Coding Transmission over Heterogeneous Network 异构网络上可扩展视频编码传输的优先级排序算法
Song Xiao, Chengke Wu, Yunsong Li, Jianchao Du, C.-C. Jay Kuo
Scalable video representation of the state-of-art scalable extension of the H.264/MPEG-4 AVC (SVC) and its combined 3d scalability feature offer an excellent solution to flexible video multicast over IP network. In order to relieve the impact of the severe bandwidth fluctuations and packet loss to the reconstructed quality in heterogeneous networks like the internet, a GOP-adaptive layer-based priority ordering algorithm for SVC is proposed in this paper. The method ordered the SVC bit stream according to the rate distortion contribution of different layer to the whole performance within a GOP, which makes the transmission more efficient and robust under the same bandwidth condition. Simulation results of different sequences are given to demonstrate that the proposed algorithms offer better performance in video quality as compared the default SVC ordering method and the SNR-based ordering method.
H.264/MPEG-4 AVC (SVC)最先进的可扩展扩展的可扩展视频表示及其结合的3d可扩展性特性为IP网络上灵活的视频多播提供了一个极好的解决方案。为了缓解internet等异构网络中严重的带宽波动和丢包对重构质量的影响,提出了一种自适应gop的基于层的SVC优先级排序算法。该方法根据一个GOP内不同层的率失真对整体性能的贡献对SVC比特流进行排序,使在相同带宽条件下的传输更高效、鲁棒。不同序列的仿真结果表明,与默认SVC排序方法和基于信噪比的排序方法相比,所提算法在视频质量方面具有更好的性能。
{"title":"Priority Ordering Algorithm for Scalable Video Coding Transmission over Heterogeneous Network","authors":"Song Xiao, Chengke Wu, Yunsong Li, Jianchao Du, C.-C. Jay Kuo","doi":"10.1109/AINA.2008.149","DOIUrl":"https://doi.org/10.1109/AINA.2008.149","url":null,"abstract":"Scalable video representation of the state-of-art scalable extension of the H.264/MPEG-4 AVC (SVC) and its combined 3d scalability feature offer an excellent solution to flexible video multicast over IP network. In order to relieve the impact of the severe bandwidth fluctuations and packet loss to the reconstructed quality in heterogeneous networks like the internet, a GOP-adaptive layer-based priority ordering algorithm for SVC is proposed in this paper. The method ordered the SVC bit stream according to the rate distortion contribution of different layer to the whole performance within a GOP, which makes the transmission more efficient and robust under the same bandwidth condition. Simulation results of different sequences are given to demonstrate that the proposed algorithms offer better performance in video quality as compared the default SVC ordering method and the SNR-based ordering method.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129115333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Framework for Modeling B2B Applications B2B应用程序建模的框架
Z. Maamar, Philippe Thiran, N. Narendra, S. Subramanian
This paper presents a Web services-based framework for modeling business-to-business (B2B) applications. This framework consists of three levels namely strategic, application, and resource, with focus here on the first two levels. The strategic level is about the common vision that independent businesses define as part of their decision to join forces. And the application level is about the business processes that get virtually integrated as result of this common vision. To implement the strategic and application levels, this paper leverages from our earlier two projects referred to as context-aware Web services and coordination model for Web services, respectively. Hence in line with these projects we model B2B applications as context-aware Web services. Context-based modeling is used for modeling and tracking interactions among B2B applications, with emphasis on how conflicts among the applications are identified and managed. The application of our framework to a B2B scenario relies on a case study from the purchasing domain. We also present a prototype implementation of our framework on this domain.
本文提出了一个基于Web服务的框架,用于为企业对企业(B2B)应用程序建模。该框架由三个层次组成,即战略、应用和资源,这里重点介绍前两个层次。战略层面是关于共同愿景的,独立企业将其定义为其联合决策的一部分。应用程序级别是关于作为这个共同愿景的结果而虚拟集成的业务流程。为了实现战略和应用程序级别,本文利用了我们之前的两个项目,分别称为上下文感知Web服务和Web服务协调模型。因此,根据这些项目,我们将B2B应用程序建模为上下文感知的Web服务。基于上下文的建模用于B2B应用程序之间的交互建模和跟踪,重点是如何识别和管理应用程序之间的冲突。我们的框架在B2B场景中的应用依赖于来自采购领域的案例研究。我们还在这个领域给出了我们的框架的原型实现。
{"title":"A Framework for Modeling B2B Applications","authors":"Z. Maamar, Philippe Thiran, N. Narendra, S. Subramanian","doi":"10.1109/AINA.2008.74","DOIUrl":"https://doi.org/10.1109/AINA.2008.74","url":null,"abstract":"This paper presents a Web services-based framework for modeling business-to-business (B2B) applications. This framework consists of three levels namely strategic, application, and resource, with focus here on the first two levels. The strategic level is about the common vision that independent businesses define as part of their decision to join forces. And the application level is about the business processes that get virtually integrated as result of this common vision. To implement the strategic and application levels, this paper leverages from our earlier two projects referred to as context-aware Web services and coordination model for Web services, respectively. Hence in line with these projects we model B2B applications as context-aware Web services. Context-based modeling is used for modeling and tracking interactions among B2B applications, with emphasis on how conflicts among the applications are identified and managed. The application of our framework to a B2B scenario relies on a case study from the purchasing domain. We also present a prototype implementation of our framework on this domain.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"23 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116312877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
22nd International Conference on Advanced Information Networking and Applications (aina 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1