首页 > 最新文献

2015 International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption 基于属性加密的云计算外包数据控制
Shuaishuai Zhu, Yiliang Han, Yuechuan Wei
In our IT society, cloud computing is clearly becoming one of the dominating infrastructures for enterprises as long as end users. As more cloud based services available to end users, their oceans of data are outsourced in the cloud as well. Without any special mechanisms, the data may be leaked to a third party for unauthorized use. Most presented works of cloud computing put these emphases on computing utility or new types of applications. But in the view of cloud users, such as traditional big companies, data in cloud computing systems is tend to be out of control and privacy fragile. So most of data they outsourced is less important. A mechanism to guarantee the ownership of data is required. In this paper, we analyzed a couple of recently presented scalable data management models to describe the storage patterns of data in cloud computing systems. Then we defined a new tree-based dataset management model to solve the storage and sharing problems in cloud computing. A couple of operation strategies including data encryption, data boundary maintenance, and data proof are extracted from the view of different entities in the cloud. The behaviors of different users are controlled by view management on the tree. Based on these strategies, a flexible data management mechanism is designed in the model to guarantee entity privacy, data availability and secure data sharing.
在我们的IT社会中,云计算显然正在成为企业和最终用户的主要基础设施之一。随着越来越多的基于云的服务提供给终端用户,他们的海量数据也被外包到云中。在没有任何特殊机制的情况下,数据可能会泄露给第三方进行未经授权的使用。云计算的大部分工作都把这些重点放在计算实用程序或新型应用程序上。但在传统大公司等云用户看来,云计算系统中的数据容易失控,隐私脆弱。因此,他们外包的大部分数据都不那么重要。需要一种机制来保证数据的所有权。在本文中,我们分析了最近出现的几个可扩展数据管理模型,以描述云计算系统中数据的存储模式。然后定义了一种新的基于树的数据集管理模型,以解决云计算中的数据集存储和共享问题。从云中不同实体的视图中提取了一些操作策略,包括数据加密、数据边界维护和数据证明。不同用户的行为通过树的视图管理来控制。基于这些策略,在模型中设计了灵活的数据管理机制,以保证实体的隐私性、数据的可用性和数据的安全共享。
{"title":"Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption","authors":"Shuaishuai Zhu, Yiliang Han, Yuechuan Wei","doi":"10.1109/INCoS.2015.29","DOIUrl":"https://doi.org/10.1109/INCoS.2015.29","url":null,"abstract":"In our IT society, cloud computing is clearly becoming one of the dominating infrastructures for enterprises as long as end users. As more cloud based services available to end users, their oceans of data are outsourced in the cloud as well. Without any special mechanisms, the data may be leaked to a third party for unauthorized use. Most presented works of cloud computing put these emphases on computing utility or new types of applications. But in the view of cloud users, such as traditional big companies, data in cloud computing systems is tend to be out of control and privacy fragile. So most of data they outsourced is less important. A mechanism to guarantee the ownership of data is required. In this paper, we analyzed a couple of recently presented scalable data management models to describe the storage patterns of data in cloud computing systems. Then we defined a new tree-based dataset management model to solve the storage and sharing problems in cloud computing. A couple of operation strategies including data encryption, data boundary maintenance, and data proof are extracted from the view of different entities in the cloud. The behaviors of different users are controlled by view management on the tree. Based on these strategies, a flexible data management mechanism is designed in the model to guarantee entity privacy, data availability and secure data sharing.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC 基于灰色关联分析的H.264/AVC信息隐藏新算法
Yingnan Zhang, Minqing Zhang, Jingjing Wang, Ke Niu
On the basis of analyzing some existing video steganographic algorithms and find out some problems, like have large impact on the video quality and bit rate, so we propose a new algorithm based on grey relational analysis combining with the partition modes features of the H.264/AVC. The algorithm firstly compute the grey relevancy of blocks and judge if it has texture features. Then perform DCT on the current frame. Finally choose the proper capacity based on partition modes and embed information in DCT numbers. The experimental results show that the proposed algorithm has little impact on the video quality and bit rate, also has the advantages that anti-noise, anti-filter and high capacity information hiding.
在对现有的一些视频隐写算法进行分析的基础上,发现对视频质量和码率影响较大等问题,结合H.264/AVC的分割模式特点,提出了一种基于灰色关联分析的隐写算法。该算法首先计算块的灰色关联度,判断其是否具有纹理特征。然后对当前帧执行DCT。最后根据分区方式选择合适的容量,并在DCT编号中嵌入信息。实验结果表明,该算法对视频质量和码率影响较小,具有抗噪声、抗滤波和高容量信息隐藏等优点。
{"title":"A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC","authors":"Yingnan Zhang, Minqing Zhang, Jingjing Wang, Ke Niu","doi":"10.1109/INCoS.2015.48","DOIUrl":"https://doi.org/10.1109/INCoS.2015.48","url":null,"abstract":"On the basis of analyzing some existing video steganographic algorithms and find out some problems, like have large impact on the video quality and bit rate, so we propose a new algorithm based on grey relational analysis combining with the partition modes features of the H.264/AVC. The algorithm firstly compute the grey relevancy of blocks and judge if it has texture features. Then perform DCT on the current frame. Finally choose the proper capacity based on partition modes and embed information in DCT numbers. The experimental results show that the proposed algorithm has little impact on the video quality and bit rate, also has the advantages that anti-noise, anti-filter and high capacity information hiding.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of Packet Loss on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based Systems 丢包对jxta覆盖P2P平台可靠性的影响:两种模糊系统的比较研究
Yi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, L. Barolli, F. Xhafa
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. It abstracts a new layer on the top of JXTA through a set of primitive operations and services that are commonly used in JXTA-based applications and provides a set of primitives that can be used by other applications, which will be built on top of the overlay, with complete independence. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based reliability systems (called FRS1 and FRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between FRS1 and FRS2. Comparing the complexity of FRS1 and FRS2, the FRS2 is more complex than FRS1. However, it considers also the packet loss which makes the platform more reliable.
在P2P系统中,每一个对等体都需要获取其他对等体的信息,并通过相邻的对等体将这些信息传播给其他对等体。因此,每个对等体有一定数量的邻居对等体是很重要的。此外,更重要的是讨论每个对等体是否有可靠的邻居。实际上,每个对等体都可能出现故障,或者向其他对等体发送过时甚至错误的信息。我们已经实现了一个名为jxta - overlay的P2P平台,它定义了一组协议,用于标准化不同设备之间的通信和协作方式。它通过一组在基于JXTA的应用程序中常用的原语操作和服务在JXTA之上抽象出一个新的层,并提供一组可被其他应用程序使用的原语,这些原语将以完全独立的方式构建在覆盖层之上。JXTA-Overlay提供了一组基本功能和原语,旨在尽可能完整地满足大多数基于jxta的应用程序的需求。为了提高JXTA-Overlay P2P平台的可靠性,本文提出了两种基于模糊的可靠性系统FRS1和FRS2。我们对FRS1和FRS2进行了比较研究。比较FRS1和FRS2的复杂性,FRS2比FRS1更复杂。然而,它也考虑了丢包问题,使平台更加可靠。
{"title":"Effects of Packet Loss on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based Systems","authors":"Yi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, L. Barolli, F. Xhafa","doi":"10.1109/INCoS.2015.21","DOIUrl":"https://doi.org/10.1109/INCoS.2015.21","url":null,"abstract":"In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. It abstracts a new layer on the top of JXTA through a set of primitive operations and services that are commonly used in JXTA-based applications and provides a set of primitives that can be used by other applications, which will be built on top of the overlay, with complete independence. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based reliability systems (called FRS1 and FRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between FRS1 and FRS2. Comparing the complexity of FRS1 and FRS2, the FRS2 is more complex than FRS1. However, it considers also the packet loss which makes the platform more reliable.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Steganography Algorithm Based on Trailing Coefficients 基于尾随系数的视频隐写算法
Yingnan Zhang, Minqing Zhang, Ke Niu, Jia Liu
Accompany with the growth of the speed in network, people's living standard has greatly improved, but the threaten to its information's security has also appeared, as a important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient produced in the process of quantization of H.264 encoding standard, we put forward a kind of algorithm based on trailing coefficients. The algorithm firstly conducts DCT transform on the frame, and then obtains the trailing coefficient for each quantized DCT blocks, last embedded by changing its values. The experimental result indicates that, this algorithm has little influence on video quality and has a few changes to the DCT coefficients after embedding, and has large capacity of steganography, and has high robustness. Above all, the information security has been protected.
随着网络速度的增长,人们的生活水平有了很大的提高,但对其信息安全的威胁也随之出现,隐写术作为信息安全的一个重要分支,是保护秘密信息安全的有效手段。针对当前视频隐写算法的高复杂度,结合H.264编码标准在量化过程中产生的尾随系数,提出了一种基于尾随系数的隐写算法。该算法首先对帧进行DCT变换,然后得到量化后的每个DCT块的拖尾系数,最后通过改变其值进行嵌入。实验结果表明,该算法对视频质量影响较小,嵌入后DCT系数变化不大,具有较大的隐写容量,鲁棒性好。首先,信息安全得到了保障。
{"title":"Video Steganography Algorithm Based on Trailing Coefficients","authors":"Yingnan Zhang, Minqing Zhang, Ke Niu, Jia Liu","doi":"10.1109/INCoS.2015.47","DOIUrl":"https://doi.org/10.1109/INCoS.2015.47","url":null,"abstract":"Accompany with the growth of the speed in network, people's living standard has greatly improved, but the threaten to its information's security has also appeared, as a important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient produced in the process of quantization of H.264 encoding standard, we put forward a kind of algorithm based on trailing coefficients. The algorithm firstly conducts DCT transform on the frame, and then obtains the trailing coefficient for each quantized DCT blocks, last embedded by changing its values. The experimental result indicates that, this algorithm has little influence on video quality and has a few changes to the DCT coefficients after embedding, and has large capacity of steganography, and has high robustness. Above all, the information security has been protected.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient Area Association Using Space Filling Curves 使用空间填充曲线的有效区域关联
J. Platoš, P. Krömer, V. Snás̃el
The geographic properties of the area are well defined and stored in many mapping software. The problem is, that we usually store information about some area in raster format, i.e. the area is divided into a grid of pixels. The raster representation is memory consuming, especially when not all pixels holds any information. The inverted representation is less memory consuming, but the computational cost for pixel property querying is much higher. This paper suggest the model of signal coverage (one of the possible geographic property) based on optimized representation by space-filling curves. The suggested model has very low memory demands as well as low computation because very efficient filtering is done at the start of the querying process.
该地区的地理属性被很好地定义并存储在许多绘图软件中。问题是,我们通常以栅格格式存储有关某些区域的信息,即该区域被划分为像素网格。栅格表示消耗内存,特别是当并非所有像素都包含任何信息时。这种倒排表示方式消耗的内存较少,但查询像素属性的计算成本要高得多。本文提出了一种基于空间填充曲线优化表示的信号覆盖(可能的地理属性之一)模型。建议的模型具有非常低的内存需求和较低的计算量,因为在查询过程开始时进行了非常有效的过滤。
{"title":"Efficient Area Association Using Space Filling Curves","authors":"J. Platoš, P. Krömer, V. Snás̃el","doi":"10.1109/INCoS.2015.39","DOIUrl":"https://doi.org/10.1109/INCoS.2015.39","url":null,"abstract":"The geographic properties of the area are well defined and stored in many mapping software. The problem is, that we usually store information about some area in raster format, i.e. the area is divided into a grid of pixels. The raster representation is memory consuming, especially when not all pixels holds any information. The inverted representation is less memory consuming, but the computational cost for pixel property querying is much higher. This paper suggest the model of signal coverage (one of the possible geographic property) based on optimized representation by space-filling curves. The suggested model has very low memory demands as well as low computation because very efficient filtering is done at the start of the querying process.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Short Note on the Solution of the Prisoner's Dilemma 囚徒困境的解法简论
M. Köppen, M. Tsuru
Here we reconsider the solution of the well-known Prisoner's Dilemma from a binary relation point of view. We identify the Nash equilibrium as single maximum element of a relation (we call it coordination relation) between the cells of a multidimensional payoff array. The comparison between reward vectors of cells is according to a preference relation of each player. This approach allows for an easier extension to cases of n players and m strategies, but also cases of varying preference relations among the players. This way we can judge on negotiable situations by analyzing maximum set sizes of the coordination relation. As an example, we study the prospect of players focusing on maximal total or least rewards (the latter one being a model for fair decision making). It appears as an apparent counter-intuitive result that such player preferences do not lead to Nash equilibria at all since they result in a strongly increasing number of maximal elements, thus hardening a joint decision making.
这里我们从二元关系的角度重新考虑著名的囚徒困境的解。我们将纳什均衡定义为多维支付数组单元之间关系(我们称之为协调关系)的单个最大元素。细胞间奖励向量的比较是根据每个玩家的偏好关系进行的。这种方法可以更容易地扩展到n个参与者和m个策略的情况,但也可以扩展到参与者之间不同的偏好关系的情况。这种方法可以通过分析协调关系的最大集大小来判断可协商的情况。例如,我们研究了玩家关注最大总奖励或最小奖励的前景(后者是公平决策的模型)。这似乎是一个明显的反直觉结果,即这种玩家偏好根本不会导致纳什均衡,因为它们会导致最大元素数量的大幅增加,从而强化联合决策。
{"title":"A Short Note on the Solution of the Prisoner's Dilemma","authors":"M. Köppen, M. Tsuru","doi":"10.1109/INCoS.2015.69","DOIUrl":"https://doi.org/10.1109/INCoS.2015.69","url":null,"abstract":"Here we reconsider the solution of the well-known Prisoner's Dilemma from a binary relation point of view. We identify the Nash equilibrium as single maximum element of a relation (we call it coordination relation) between the cells of a multidimensional payoff array. The comparison between reward vectors of cells is according to a preference relation of each player. This approach allows for an easier extension to cases of n players and m strategies, but also cases of varying preference relations among the players. This way we can judge on negotiable situations by analyzing maximum set sizes of the coordination relation. As an example, we study the prospect of players focusing on maximal total or least rewards (the latter one being a model for fair decision making). It appears as an apparent counter-intuitive result that such player preferences do not lead to Nash equilibria at all since they result in a strongly increasing number of maximal elements, thus hardening a joint decision making.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Data Mining Frameworks in Hadoop Cluster Using Virtual Campus Log Files 基于虚拟校园日志文件的Hadoop集群数据挖掘框架性能评价
F. Xhafa, D. Ramirez, Daniel Garcia, S. Caballé
With the fast development in Cloud computing technologies, most computing platforms and stand alone applications are being deployed in Cloud platforms and offered as a service (SaaS). Likewise, Data Mining Frameworks (DMFs) such as Weka and R, are being ported to Cloud platforms, while other frameworks properly designed for Cloud platforms are emerging such as Mahout. For existing DMFs, which were designed before Cloud computing appeared, the main issue is if porting them to Cloud platforms would bring any benefits. One the one hand, by porting them to Cloud, it is possible to offer them as Cloud service, which would alleviate the final user from the burden of installing and configuring DMFs at local computer or local networking infrastructure. On the other hand, porting DMFs to Cloud should allow to tackle mining of very large data sets, i.e. Big Data. In this work we evaluate some DMFs, including Weka and Mahout, under a Hadoop cluster and show that while there are improvements in time efficiency to a certain scale, some mining functions, which are part of DMFs, were not able to finalize for data sets of more than 20Gb, namely, mining log files of a virtual campus. The study revealed that indeed porting DMFs to Cloud might not necessarily help tackling Big Data, as such DMFs were conceived without Big Data requirements.
随着云计算技术的快速发展,大多数计算平台和独立应用程序都部署在云平台上并提供服务(SaaS)。同样,数据挖掘框架(dmf),如Weka和R,正在被移植到云平台上,而其他为云平台设计的框架正在出现,如Mahout。对于在云计算出现之前设计的现有dmf,主要问题是将它们移植到云平台是否会带来任何好处。一方面,通过将它们移植到云端,可以将它们作为云服务提供,这将减轻最终用户在本地计算机或本地网络基础设施上安装和配置dmf的负担。另一方面,将dmf移植到云应该允许处理非常大的数据集,即大数据的挖掘。在这项工作中,我们在Hadoop集群下评估了一些dmf,包括Weka和Mahout,结果表明,虽然时间效率得到了一定程度的提高,但dmf的一些挖掘功能无法完成超过20Gb的数据集,即挖掘虚拟校园的日志文件。研究表明,将dmf移植到云端可能并不一定有助于处理大数据,因为这样的dmf是在没有大数据需求的情况下构想出来的。
{"title":"Performance Evaluation of Data Mining Frameworks in Hadoop Cluster Using Virtual Campus Log Files","authors":"F. Xhafa, D. Ramirez, Daniel Garcia, S. Caballé","doi":"10.1109/INCoS.2015.82","DOIUrl":"https://doi.org/10.1109/INCoS.2015.82","url":null,"abstract":"With the fast development in Cloud computing technologies, most computing platforms and stand alone applications are being deployed in Cloud platforms and offered as a service (SaaS). Likewise, Data Mining Frameworks (DMFs) such as Weka and R, are being ported to Cloud platforms, while other frameworks properly designed for Cloud platforms are emerging such as Mahout. For existing DMFs, which were designed before Cloud computing appeared, the main issue is if porting them to Cloud platforms would bring any benefits. One the one hand, by porting them to Cloud, it is possible to offer them as Cloud service, which would alleviate the final user from the burden of installing and configuring DMFs at local computer or local networking infrastructure. On the other hand, porting DMFs to Cloud should allow to tackle mining of very large data sets, i.e. Big Data. In this work we evaluate some DMFs, including Weka and Mahout, under a Hadoop cluster and show that while there are improvements in time efficiency to a certain scale, some mining functions, which are part of DMFs, were not able to finalize for data sets of more than 20Gb, namely, mining log files of a virtual campus. The study revealed that indeed porting DMFs to Cloud might not necessarily help tackling Big Data, as such DMFs were conceived without Big Data requirements.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129474876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings 一种不考虑双线性对的改进高效无证书签名方案
Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, Huige Wang
Certificateless public key cryptography was proposed to solve the key escrow problem in identity-based public key cryptography. Namely, a user's full private key must be comprised of a partial private key which is provided by the key generation center and a secret value which is chosen by the user. Thus the key generation center can no longer acquire each user's full private key by itself. In 2014, Yeh et al. proposed an efficient certificateless public key signature scheme without bilinear pairings. They also showed their scheme is secure against super adversary under the hardness of breaking discrete logarithm problem in the random model. In this paper, we modify Yeh et al.'s scheme to obtain a new scheme which is more practical than theirs. And our modified scheme can achieve the same security level as Yeh et al.'s scheme under the hardness of breaking discrete logarithm problem in the random model.
为了解决基于身份的公钥加密中的密钥托管问题,提出了无证书公钥加密。也就是说,用户的完整私钥必须由密钥生成中心提供的部分私钥和用户选择的秘密值组成。因此,密钥生成中心无法单独获取每个用户的完整私钥。2014年,Yeh等人提出了一种不使用双线性对的高效无证书公钥签名方案。在随机模型离散对数问题的破断硬度下,证明了该方案对超级对手是安全的。在本文中,我们对Yeh等人的方案进行了改进,得到了一个比他们的方案更实用的新方案。在随机模型中离散对数问题的破断硬度下,改进方案可以达到与Yeh等方案相同的安全级别。
{"title":"A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings","authors":"Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, Huige Wang","doi":"10.1109/INCoS.2015.10","DOIUrl":"https://doi.org/10.1109/INCoS.2015.10","url":null,"abstract":"Certificateless public key cryptography was proposed to solve the key escrow problem in identity-based public key cryptography. Namely, a user's full private key must be comprised of a partial private key which is provided by the key generation center and a secret value which is chosen by the user. Thus the key generation center can no longer acquire each user's full private key by itself. In 2014, Yeh et al. proposed an efficient certificateless public key signature scheme without bilinear pairings. They also showed their scheme is secure against super adversary under the hardness of breaking discrete logarithm problem in the random model. In this paper, we modify Yeh et al.'s scheme to obtain a new scheme which is more practical than theirs. And our modified scheme can achieve the same security level as Yeh et al.'s scheme under the hardness of breaking discrete logarithm problem in the random model.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"93 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of Trends in Authors Publication Activities 作者出版活动趋势分析
M. Radvanský, M. Kudelka, V. Snás̃el
Publication activity of researchers is studied inmany papers. Most of them are focused on topics, authors and their cooperation, finding experts or so on. In our paper we are interested in trends in the authors publication activity. We would like to know when and how often authors use their topics, how they combine topics or use new topics. To achieve our goal we use formal concept analysis and polynomial approximation to realize how the authors use their topics and how they change their preferences over the time. Our dataset consists of several authors and their records extracted from DBLP. We use qualitative evaluation of our method on the selected twenty one authors.
研究人员的发表活动在许多论文中被研究。他们大多集中在主题,作者和他们的合作,寻找专家等。在我们的论文中,我们对作者发表活动的趋势感兴趣。我们想知道作者何时和多久使用他们的主题,他们如何组合主题或使用新主题。为了实现我们的目标,我们使用形式概念分析和多项式近似来了解作者如何使用他们的主题以及他们如何随着时间的推移改变他们的偏好。我们的数据集由几位作者及其从DBLP中提取的记录组成。我们对所选的21位作者进行了定性评价。
{"title":"Analysis of Trends in Authors Publication Activities","authors":"M. Radvanský, M. Kudelka, V. Snás̃el","doi":"10.1109/INCoS.2015.20","DOIUrl":"https://doi.org/10.1109/INCoS.2015.20","url":null,"abstract":"Publication activity of researchers is studied inmany papers. Most of them are focused on topics, authors and their cooperation, finding experts or so on. In our paper we are interested in trends in the authors publication activity. We would like to know when and how often authors use their topics, how they combine topics or use new topics. To achieve our goal we use formal concept analysis and polynomial approximation to realize how the authors use their topics and how they change their preferences over the time. Our dataset consists of several authors and their records extracted from DBLP. We use qualitative evaluation of our method on the selected twenty one authors.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bit-pattern Based Integral Attack on ICEBERG 基于位模式的ICEBERG积分攻击
Yuechuan Wei
Integral attack is one of the most effective attack against block ciphers. However, traditional integral attack based on byte or word is not available for a bit-oriented cipher. Z'aba et al. introduced a technique named Bit-pattern based integral attack to address this issue. This new type of integral attack traces the propagation of the plaintext structure at bit-level to obtain the property and verify key guesses. In this paper, the bit-pattern based integral attack is applied to ICEBERG - a block cipher efficient in reconfigurable hard-ware. The result shows that 3, 4 and 5 rounds ICEBERG are not immune to this attack. All attacks presented in this paper manage to recover the full subkeys of the final round.
积分攻击是针对分组密码最有效的攻击方法之一。然而,传统的基于字节或字的整数攻击方法并不适用于位密码。Z'aba等人提出了一种基于位模式的积分攻击技术来解决这个问题。这种新型的积分攻击在比特级跟踪明文结构的传播,以获取属性并验证密钥猜测。本文将基于位模式的积分攻击方法应用于硬件可重构高效的分组密码ICEBERG中。结果表明,3、4和5发ICEBERG都不能免疫这种攻击。本文提出的所有攻击都设法恢复了最后一轮的完整子密钥。
{"title":"Bit-pattern Based Integral Attack on ICEBERG","authors":"Yuechuan Wei","doi":"10.1109/INCoS.2015.46","DOIUrl":"https://doi.org/10.1109/INCoS.2015.46","url":null,"abstract":"Integral attack is one of the most effective attack against block ciphers. However, traditional integral attack based on byte or word is not available for a bit-oriented cipher. Z'aba et al. introduced a technique named Bit-pattern based integral attack to address this issue. This new type of integral attack traces the propagation of the plaintext structure at bit-level to obtain the property and verify key guesses. In this paper, the bit-pattern based integral attack is applied to ICEBERG - a block cipher efficient in reconfigurable hard-ware. The result shows that 3, 4 and 5 rounds ICEBERG are not immune to this attack. All attacks presented in this paper manage to recover the full subkeys of the final round.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"16 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1