首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks 基于区块链的新型车辆自组织网络信任管理协议
Ohoud Alboqomi, Tahani Gazdar, A. Munshi
Trust establishment in Smart Transportation environments is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, the applications context requires that the lifetime of data messages be short, so the vehicles have to authenticate the reliability of the received messages timely to make decision accordingly. In this paper work, we conduct a comprehensive review of the recent schemes dealing with trust management in vehicular environments, particularly, blockchain-based ones. Besides, we propose a dependable trust management scheme based on blockchain aiming to calculate for each vehicle a unique and up-to-date trust metric available to all other vehicles to solve the cold-start problem.
在智能交通环境中,信任的建立是一项具有挑战性的任务,主要是由于车辆的高速度、长距离和网络拓扑动态。此外,应用程序上下文要求数据消息的生命周期较短,因此车辆必须及时验证接收到的消息的可靠性,以便做出相应的决策。在本文中,我们对最近处理车辆环境中信任管理的方案进行了全面审查,特别是基于区块链的方案。此外,我们提出了一种基于区块链的可靠信任管理方案,旨在为每辆车计算一个唯一的、最新的、可供所有其他车辆使用的信任度量,以解决冷启动问题。
{"title":"A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks","authors":"Ohoud Alboqomi, Tahani Gazdar, A. Munshi","doi":"10.1145/3440749.3442642","DOIUrl":"https://doi.org/10.1145/3440749.3442642","url":null,"abstract":"Trust establishment in Smart Transportation environments is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, the applications context requires that the lifetime of data messages be short, so the vehicles have to authenticate the reliability of the received messages timely to make decision accordingly. In this paper work, we conduct a comprehensive review of the recent schemes dealing with trust management in vehicular environments, particularly, blockchain-based ones. Besides, we propose a dependable trust management scheme based on blockchain aiming to calculate for each vehicle a unique and up-to-date trust metric available to all other vehicles to solve the cold-start problem.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Methodology for testing LPWAN networks with mesh topology 用网状拓扑测试LPWAN网络的方法学
Y. Avakyan, E. S. Kuznetsova, R. Kirichek
The paper presents a methodology for testing LPWAN network with a mesh topology. Network testing is essential to identify and resolve problems before deploying the network on a large scale. Deploying a network without preliminary testing increases the number of wasted resources and does not guarantee the expected network performance. The methodology provided in this article allows testing the network and determining the main parameters, which will allow identifying the faults of the network before implementation. The proposed methodology is based on the IETF RFC 2544 specification. Model-based testing allows automating the testing process. For this, a simulation model of an LPWAN network with mesh topology based on LoRaWAN was developed in the OMNeT++ simulation environment.
本文提出了一种测试具有网状拓扑结构的LPWAN网络的方法。在大规模部署网络之前,网络测试对于识别和解决问题至关重要。在没有进行初步测试的情况下部署网络会增加浪费资源的数量,并且不能保证预期的网络性能。本文提供的方法允许测试网络并确定主要参数,这将允许在实施之前识别网络的故障。建议的方法基于IETF RFC 2544规范。基于模型的测试允许自动化测试过程。为此,在omnet++仿真环境下,建立了基于LoRaWAN的网状拓扑LPWAN网络仿真模型。
{"title":"Methodology for testing LPWAN networks with mesh topology","authors":"Y. Avakyan, E. S. Kuznetsova, R. Kirichek","doi":"10.1145/3440749.3442623","DOIUrl":"https://doi.org/10.1145/3440749.3442623","url":null,"abstract":"The paper presents a methodology for testing LPWAN network with a mesh topology. Network testing is essential to identify and resolve problems before deploying the network on a large scale. Deploying a network without preliminary testing increases the number of wasted resources and does not guarantee the expected network performance. The methodology provided in this article allows testing the network and determining the main parameters, which will allow identifying the faults of the network before implementation. The proposed methodology is based on the IETF RFC 2544 specification. Model-based testing allows automating the testing process. For this, a simulation model of an LPWAN network with mesh topology based on LoRaWAN was developed in the OMNeT++ simulation environment.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Canny edge detection towards deep learning Arabic document classification 面向深度学习阿拉伯语文档分类的精细边缘检测
Taghreed Alghamdi, S. Snoussi, L. Hsairi
The paper describes the implementation of deep learning-based edge detection in image processing. A set of points in an image at which image brightness changes formally or sharply is called edge detection. Using edge detection filters, we can extract the feature of an object. In our work, we aim to develop a deep learning system to classify Arabic document images into four classes as follows: printed, handwritten, historical, and signboard and applying edge detection filters to extract features from document images. We will be using two edge detection methods namely Sobel, and Canny edge detection that are applied in 1000 Arabic document images to extract edges. Analyzing the performance factors are done in the terms of accuracy on the premise of Mean Squared Error (MSE) and python is employed for edge detection implementation. The experimental results show that the Canny edge detection technique results higher than the Sobel edge detection technique.
本文描述了基于深度学习的边缘检测在图像处理中的实现。图像中图像亮度发生正式或剧烈变化的一组点称为边缘检测。利用边缘检测滤波器,我们可以提取目标的特征。在我们的工作中,我们的目标是开发一个深度学习系统,将阿拉伯语文档图像分为以下四类:印刷,手写,历史和招牌,并应用边缘检测滤波器从文档图像中提取特征。我们将使用两种边缘检测方法,即Sobel和Canny边缘检测,这两种方法应用于1000个阿拉伯文档图像中提取边缘。在均方误差(Mean Squared Error, MSE)的前提下,从精度角度分析了性能因素,并采用python实现边缘检测。实验结果表明,Canny边缘检测技术的检测效果优于Sobel边缘检测技术。
{"title":"Canny edge detection towards deep learning Arabic document classification","authors":"Taghreed Alghamdi, S. Snoussi, L. Hsairi","doi":"10.1145/3440749.3442641","DOIUrl":"https://doi.org/10.1145/3440749.3442641","url":null,"abstract":"The paper describes the implementation of deep learning-based edge detection in image processing. A set of points in an image at which image brightness changes formally or sharply is called edge detection. Using edge detection filters, we can extract the feature of an object. In our work, we aim to develop a deep learning system to classify Arabic document images into four classes as follows: printed, handwritten, historical, and signboard and applying edge detection filters to extract features from document images. We will be using two edge detection methods namely Sobel, and Canny edge detection that are applied in 1000 Arabic document images to extract edges. Analyzing the performance factors are done in the terms of accuracy on the premise of Mean Squared Error (MSE) and python is employed for edge detection implementation. The experimental results show that the Canny edge detection technique results higher than the Sobel edge detection technique.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple Level Action Embedding for Penetration Testing 用于渗透测试的多级动作嵌入
Hoang Nguyen, H. Nguyen, T. Uehara
Penetration Testing (PT) is one of the most effective and widely used methods to increase the defence of a system by looking for potential vulnerabilities. Reinforcement learning (RL), a powerful type of machine learning in self-decision making, is demonstrated to be applicable in PT to increase automation as well as reduce implementation costs. However, RL algorithms are still having difficulty on PT problems which have large network size and high complexity. This paper proposes a multiple level action embedding applied with Wolpertinger architect (WA) to enhance the accuracy and performance of the RL, especially in large and complicated environments. The main purpose of the action embedding is to be able to represent the elements in the RL action space as an n-dimensional vector while preserving their properties and accurately representing the relationship between them. Experiments are conducted to evaluate the logical accuracy of the action embedding. The deep Q-network algorithm is also used as a baseline for comparing with WA using the multiple level action embedding.
渗透测试(PT)是通过寻找潜在漏洞来增强系统防御的最有效和最广泛使用的方法之一。强化学习(RL)是一种强大的自我决策机器学习类型,被证明适用于PT,以提高自动化程度并降低实施成本。然而,对于网络规模大、复杂度高的PT问题,强化学习算法仍然存在困难。本文提出了一种基于Wolpertinger架构(WA)的多层动作嵌入方法,以提高强化学习的精度和性能,特别是在大型和复杂的环境中。动作嵌入的主要目的是能够将RL动作空间中的元素表示为n维向量,同时保留它们的属性并准确地表示它们之间的关系。通过实验来评估动作嵌入的逻辑准确性。深度q -网络算法也被用作基线,用于与使用多层动作嵌入的WA进行比较。
{"title":"Multiple Level Action Embedding for Penetration Testing","authors":"Hoang Nguyen, H. Nguyen, T. Uehara","doi":"10.1145/3440749.3442660","DOIUrl":"https://doi.org/10.1145/3440749.3442660","url":null,"abstract":"Penetration Testing (PT) is one of the most effective and widely used methods to increase the defence of a system by looking for potential vulnerabilities. Reinforcement learning (RL), a powerful type of machine learning in self-decision making, is demonstrated to be applicable in PT to increase automation as well as reduce implementation costs. However, RL algorithms are still having difficulty on PT problems which have large network size and high complexity. This paper proposes a multiple level action embedding applied with Wolpertinger architect (WA) to enhance the accuracy and performance of the RL, especially in large and complicated environments. The main purpose of the action embedding is to be able to represent the elements in the RL action space as an n-dimensional vector while preserving their properties and accurately representing the relationship between them. Experiments are conducted to evaluate the logical accuracy of the action embedding. The deep Q-network algorithm is also used as a baseline for comparing with WA using the multiple level action embedding.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reducing the Impact of Outliers on the One-Class Classification Decision Rule 减少离群值对单类分类决策规则的影响
A. Larin, O. Seredin, A. Kopylov
A modified version of one-class classification criterion reducing the impact of outliers on the one-class classification decision rule is proposed based on support vector data description (SVDD) by D. Tax. The optimization method utilizes the substitution of nondifferentiable objective function by the smooth one. A comparative experimental study of existing one-class methods shows the superiority of the proposed criterion in anomaly detection.
D. Tax基于支持向量数据描述(SVDD)提出了一种改进的一类分类准则,减少了异常值对一类分类决策规则的影响。该优化方法利用不可微目标函数替换为光滑目标函数。通过与现有一类方法的对比实验研究,证明了该准则在异常检测中的优越性。
{"title":"Reducing the Impact of Outliers on the One-Class Classification Decision Rule","authors":"A. Larin, O. Seredin, A. Kopylov","doi":"10.1145/3440749.3442662","DOIUrl":"https://doi.org/10.1145/3440749.3442662","url":null,"abstract":"A modified version of one-class classification criterion reducing the impact of outliers on the one-class classification decision rule is proposed based on support vector data description (SVDD) by D. Tax. The optimization method utilizes the substitution of nondifferentiable objective function by the smooth one. A comparative experimental study of existing one-class methods shows the superiority of the proposed criterion in anomaly detection.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123626258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction 基于联合透射图估计和大气光提取的雾霾去除方法
A. Filin, I. Gracheva, A. Kopylov
This paper proposes a new computationally effective method of haze removal based on joint transmission map estimation and atmospheric-light extraction using the probabilistic gamma-normal model. The enhanced version of universal atmospheric light extractor allows reducing the influence of localized light sources to result of processing. Experimental results show that the proposed method has comparable quality results and lower computation time than other haze removal methods.
本文提出了一种基于联合透射图估计和基于概率伽玛正态模型的大气光提取的雾霾去除新方法。增强版的通用大气光提取器允许减少局部光源对处理结果的影响。实验结果表明,该方法与其他雾霾去除方法相比具有相当的质量结果和更少的计算时间。
{"title":"Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction","authors":"A. Filin, I. Gracheva, A. Kopylov","doi":"10.1145/3440749.3442663","DOIUrl":"https://doi.org/10.1145/3440749.3442663","url":null,"abstract":"This paper proposes a new computationally effective method of haze removal based on joint transmission map estimation and atmospheric-light extraction using the probabilistic gamma-normal model. The enhanced version of universal atmospheric light extractor allows reducing the influence of localized light sources to result of processing. Experimental results show that the proposed method has comparable quality results and lower computation time than other haze removal methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes 基于ITU-T Q.3961建议书和ITU-T Q.3056建议书的基于探针的固定和移动通信网网速和网络参数测量系统的开发
Nikita Shustov, V. Zelenov, R. Kirichek
Today, the work of many organizations directly depends on the quality of the Internet connection. Using the method of measuring the speed of the Internet network and network parameters based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 using probes will allow monitoring the quality of the services provided. There are solutions for measuring the bandwidth of Internet connection such as Speedtest, 2IP, Netflix Fast, but they are not based on the international standard, hence measurements of these systems cannot be considered trusted. Therefore, to control the quality of the Internet connection using a trusted source, there is a need in the trusted method, which is discussed in this article. This article discusses developed methods for throughput, network latency, jitter. Measurement results of the methods shows reliability in testing conditions.
今天,许多组织的工作直接依赖于互联网连接的质量。使用基于ITU-T Q.3961建议书和ITU-T Q.3056建议书的使用探针测量互联网网络速度和网络参数的方法将允许监控所提供服务的质量。虽然有Speedtest、2IP、Netflix Fast等测量互联网连接带宽的解决方案,但它们并不是基于国际标准,因此这些系统的测量结果不可信。因此,为了控制使用可信源的Internet连接的质量,需要采用可信方法,本文对此进行了讨论。本文讨论了吞吐量、网络延迟、抖动的开发方法。测试结果表明,该方法在测试条件下是可靠的。
{"title":"Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes","authors":"Nikita Shustov, V. Zelenov, R. Kirichek","doi":"10.1145/3440749.3442608","DOIUrl":"https://doi.org/10.1145/3440749.3442608","url":null,"abstract":"Today, the work of many organizations directly depends on the quality of the Internet connection. Using the method of measuring the speed of the Internet network and network parameters based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 using probes will allow monitoring the quality of the services provided. There are solutions for measuring the bandwidth of Internet connection such as Speedtest, 2IP, Netflix Fast, but they are not based on the international standard, hence measurements of these systems cannot be considered trusted. Therefore, to control the quality of the Internet connection using a trusted source, there is a need in the trusted method, which is discussed in this article. This article discusses developed methods for throughput, network latency, jitter. Measurement results of the methods shows reliability in testing conditions.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121528098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Enabled Healthcare: Benefits, Issues and Challenges‏ 物联网医疗:好处、问题和挑战
Bassam Al-Shargabi, Simak Abuarqoub
The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies the key benefits and key drivers behind the development of IoT-enabled healthcare systems. Then, we focus on security and privacy issues as real threats and obstacles facing the wide adoption of IoT in healthcare applications. Finally, we outline the key challenges and opportunities with specific reference to the unique requirements of healthcare applications.
物联网(IoT)技术在医疗保健领域有许多应用。通过收集重要数据,物联网在自动化手动任务和改善患者预后方面发挥着至关重要的作用。本文概述了物联网架构和应用在医疗保健领域的影响和挑战。本文确定了物联网医疗系统开发背后的主要优势和主要驱动因素。然后,我们将重点放在安全和隐私问题上,这是物联网在医疗保健应用中广泛采用所面临的真正威胁和障碍。最后,我们概述了主要的挑战和机遇,具体参考了医疗保健应用的独特需求。
{"title":"IoT-Enabled Healthcare: Benefits, Issues and Challenges‏","authors":"Bassam Al-Shargabi, Simak Abuarqoub","doi":"10.1145/3440749.3442596","DOIUrl":"https://doi.org/10.1145/3440749.3442596","url":null,"abstract":"The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies the key benefits and key drivers behind the development of IoT-enabled healthcare systems. Then, we focus on security and privacy issues as real threats and obstacles facing the wide adoption of IoT in healthcare applications. Finally, we outline the key challenges and opportunities with specific reference to the unique requirements of healthcare applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain 采用物联网和区块链的先进环境监测解决方案
Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen
Currently, the quality of the environment in urban areas is a matter of concern of countries in particular and the world in general. The application of new technology for this field is becoming increasingly urgent in the context of severe environmental pollution, environmental monitoring systems need to be upgraded to be able to effectively manage and evaluate the environment of a large geographic area. Transparency, accuracy and real time of data must be at the forefront to provide timely solutions when environmental pollution occurs to minimize socio-economic impacts.
目前,城市地区的环境质量是各国特别是全世界都关心的问题。在环境污染严重的背景下,新技术在这一领域的应用日益迫切,需要对环境监测系统进行升级,以便能够有效地管理和评价大地理区域的环境。必须将数据的透明度、准确性和实时性放在首位,以便在发生环境污染时及时提供解决方案,最大限度地减少社会经济影响。
{"title":"Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain","authors":"Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen","doi":"10.1145/3440749.3442655","DOIUrl":"https://doi.org/10.1145/3440749.3442655","url":null,"abstract":"Currently, the quality of the environment in urban areas is a matter of concern of countries in particular and the world in general. The application of new technology for this field is becoming increasingly urgent in the context of severe environmental pollution, environmental monitoring systems need to be upgraded to be able to effectively manage and evaluate the environment of a large geographic area. Transparency, accuracy and real time of data must be at the forefront to provide timely solutions when environmental pollution occurs to minimize socio-economic impacts.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem 基于多项式重构问题的同态数字碎片加密方案
Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh
In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow’s systems secure. Many efforts are focused on addressing the computation speed and the massive data size requirements of today’s systems. Significant research efforts are targeting the computational complexity by focusing on the number of cryptographic operations or the scope of application. In this paper, we present an asymmetric homomorphic encryption scheme that relies on converting base numbers to a given base in such a way that Leveled Fully Homomorphic Encryption (LFHE) is performed. This lightweight technique is easy to implement and applicable in many fields, especially those that require high speed and safety.
在快速发展的计算机密码学领域,研究人员正积极致力于解决各种新出现的挑战,以保持未来系统的安全。许多工作都集中在解决当今系统的计算速度和海量数据大小需求上。通过关注密码操作的数量或应用范围,研究工作正在朝着计算复杂性的方向发展。在本文中,我们提出了一种非对称同态加密方案,该方案依赖于将基数转换为给定的基,从而执行水平完全同态加密(LFHE)。这种轻量级技术易于实现,适用于许多领域,特别是那些需要高速和安全的领域。
{"title":"A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem","authors":"Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh","doi":"10.1145/3440749.3442592","DOIUrl":"https://doi.org/10.1145/3440749.3442592","url":null,"abstract":"In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow’s systems secure. Many efforts are focused on addressing the computation speed and the massive data size requirements of today’s systems. Significant research efforts are targeting the computational complexity by focusing on the number of cryptographic operations or the scope of application. In this paper, we present an asymmetric homomorphic encryption scheme that relies on converting base numbers to a given base in such a way that Leveled Fully Homomorphic Encryption (LFHE) is performed. This lightweight technique is easy to implement and applicable in many fields, especially those that require high speed and safety.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1