首页 > 最新文献

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
Study of e-Business and Long-Established Companies in Japan 日本电子商务与老牌企业研究
Hidekazu Sone, Innan Sasaki
Based on our previous work, this paper discusses IT utilization by long-established Japanese companies and its effects. According to our interviews to some managers of such companies, IT systems have been actively introduced and have shown positive effects. For example, multiple numbers of long-established Japanese-style confectionary companies in Kyoto such as Wakanaya and Fujikoma, a soba noodle restaurant which has more than 200 years of history, told us during the interviews that their sales increased approximately 10% after they started online sales. Also, after using IT systems for recruitment, they started to receive more inquiries than before both domestically and from abroad, and now they feel it is easier to obtain competent human resources. As mentioned above, IT seems to have a positive impact not only on the profit side but also on various aspects. Management studies have discussed business growth so far, but study on business continuance and decline has been only narrowly kept going. Therefore, we will examine here comprehensively covering business continuance and decline using business system theory. We provide the overview of several long-establish companies upon which our study is based, including Kongo Gumi, Chidoriya, Wakanaya, Yasuda-Nenju, Chuuboku-Chaya and Fujikoma.
本文在前人研究的基础上,探讨了日本老牌企业对信息技术的利用及其影响。根据我们对这些公司的一些经理的采访,IT系统已经被积极引入,并显示出积极的效果。例如,京都的多家历史悠久的日式糖果公司,如Wakanaya和拥有200多年历史的荞麦面馆Fujikoma,在采访中告诉我们,他们在开始网上销售后,销售额增长了约10%。此外,在使用IT系统进行招聘后,他们收到了比以前更多的国内外咨询,现在他们觉得更容易获得合格的人力资源。如上所述,IT似乎不仅在利润方面而且在各个方面都有积极的影响。迄今为止,管理研究一直在讨论企业的增长,但对企业的延续和衰落的研究却很少。因此,我们将运用商业系统理论对商业的延续和衰落进行全面的考察。我们提供了几家历史悠久的公司的概况,这些公司是我们研究的基础,包括Kongo Gumi, chiidoriya, Wakanaya, Yasuda-Nenju, Chuuboku-Chaya和Fujikoma。
{"title":"Study of e-Business and Long-Established Companies in Japan","authors":"Hidekazu Sone, Innan Sasaki","doi":"10.1109/IMIS.2014.82","DOIUrl":"https://doi.org/10.1109/IMIS.2014.82","url":null,"abstract":"Based on our previous work, this paper discusses IT utilization by long-established Japanese companies and its effects. According to our interviews to some managers of such companies, IT systems have been actively introduced and have shown positive effects. For example, multiple numbers of long-established Japanese-style confectionary companies in Kyoto such as Wakanaya and Fujikoma, a soba noodle restaurant which has more than 200 years of history, told us during the interviews that their sales increased approximately 10% after they started online sales. Also, after using IT systems for recruitment, they started to receive more inquiries than before both domestically and from abroad, and now they feel it is easier to obtain competent human resources. As mentioned above, IT seems to have a positive impact not only on the profit side but also on various aspects. Management studies have discussed business growth so far, but study on business continuance and decline has been only narrowly kept going. Therefore, we will examine here comprehensively covering business continuance and decline using business system theory. We provide the overview of several long-establish companies upon which our study is based, including Kongo Gumi, Chidoriya, Wakanaya, Yasuda-Nenju, Chuuboku-Chaya and Fujikoma.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Techniques in Advanced Information Management 高级信息管理中的密码技术
M. Ogiela, L. Ogiela, U. Ogiela
The paper presents new solutions in the area of application cryptographic protocols for strategic or personal information protection and management. Computer techniques for classified information protection and distribution will be described in the context of application for security purposes personal or biometric information. Such techniques may also support the management processes of confidential data, and distribution of parts of shared information in large management structures. Development of presented algorithms will enable the reconstruction of secured information exclusively by the confidants with access to the secret, and parts of the information shared - i.e. by the authorized users of shared information. At the same time the proposed information division techniques will effectively secure data against unauthorized access to encrypted information.
本文提出了用于战略或个人信息保护和管理的应用加密协议领域的新解决方案。机密信息保护和分发的计算机技术将在个人或生物特征信息安全应用的背景下进行描述。这些技术还可以支持机密数据的管理过程,以及在大型管理结构中分发部分共享信息。所提出的算法的发展将使安全信息的重建仅由具有访问秘密的知己和部分共享信息-即由共享信息的授权用户。同时,所提出的信息分割技术将有效地保护数据,防止未经授权的访问加密信息。
{"title":"Cryptographic Techniques in Advanced Information Management","authors":"M. Ogiela, L. Ogiela, U. Ogiela","doi":"10.1109/IMIS.2014.31","DOIUrl":"https://doi.org/10.1109/IMIS.2014.31","url":null,"abstract":"The paper presents new solutions in the area of application cryptographic protocols for strategic or personal information protection and management. Computer techniques for classified information protection and distribution will be described in the context of application for security purposes personal or biometric information. Such techniques may also support the management processes of confidential data, and distribution of parts of shared information in large management structures. Development of presented algorithms will enable the reconstruction of secured information exclusively by the confidants with access to the secret, and parts of the information shared - i.e. by the authorized users of shared information. At the same time the proposed information division techniques will effectively secure data against unauthorized access to encrypted information.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Interoperability between Federated Authentication Systems 联邦身份验证系统之间的互操作性
Luigi Catuogno, Clemente Galdi
Federated authentication allows users to use their home authentication credentials for gaining access to other institutions services while moving among different institutions. Different federated authentication systems have been designed and implemented. Despite simplified users mobility, one key problem in this area is that different authentication systems do not cooperate. In this paper we propose a protocol for allowing full communication between two federated authentication systems, Shibboleth a de facto standard in this context, and PAPI.
联邦身份验证允许用户在不同机构之间移动时,使用其本地身份验证凭据获得对其他机构服务的访问。已经设计和实现了不同的联邦身份验证系统。尽管简化了用户的移动性,但该领域的一个关键问题是不同的身份验证系统不能相互协作。在本文中,我们提出了一个协议,用于允许两个联邦身份验证系统之间的完全通信,Shibboleth是这方面的事实标准,而PAPI。
{"title":"Interoperability between Federated Authentication Systems","authors":"Luigi Catuogno, Clemente Galdi","doi":"10.1109/IMIS.2014.71","DOIUrl":"https://doi.org/10.1109/IMIS.2014.71","url":null,"abstract":"Federated authentication allows users to use their home authentication credentials for gaining access to other institutions services while moving among different institutions. Different federated authentication systems have been designed and implemented. Despite simplified users mobility, one key problem in this area is that different authentication systems do not cooperate. In this paper we propose a protocol for allowing full communication between two federated authentication systems, Shibboleth a de facto standard in this context, and PAPI.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Role-Based RSA Key Management Approach in a Hierarchy Scheme 层次结构中基于角色的RSA密钥管理方法
Hsing-Chung Chen, A. Christiana
The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes could be enforced according to the role's privileges. In role-based RSA key hierarchy management scheme, each user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors' classes in order to access specific contents of resources. In this paper, a role-based RSA key management scheme in a hierarchy scheme is proposed, which both RSA algorithm and Akl approach are combined to the scheme. The scheme provides an easy implement approach and a simple key storage manner to increase the availability of role-based access control scheme. Finally, the security analyses are also presented in this paper.
基于角色的分层密钥分配问题是在部分有序的层次结构中为基于安全角色的类分配敏感密钥,以便可以根据角色的特权强制实现类之间的合法数据访问。在基于角色的RSA密钥层次管理方案中,每个用户被分配一个角色,该角色可以派生与所分配的基于角色的类及其后继类相对应的RSA密钥,从而访问资源的特定内容。本文提出了一种层次结构中基于角色的RSA密钥管理方案,该方案将RSA算法和Akl方法相结合。该方案提供了一种易于实现的方法和一种简单的密钥存储方式,提高了基于角色的访问控制方案的可用性。最后,本文还进行了安全性分析。
{"title":"A Role-Based RSA Key Management Approach in a Hierarchy Scheme","authors":"Hsing-Chung Chen, A. Christiana","doi":"10.1109/IMIS.2014.32","DOIUrl":"https://doi.org/10.1109/IMIS.2014.32","url":null,"abstract":"The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes could be enforced according to the role's privileges. In role-based RSA key hierarchy management scheme, each user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors' classes in order to access specific contents of resources. In this paper, a role-based RSA key management scheme in a hierarchy scheme is proposed, which both RSA algorithm and Akl approach are combined to the scheme. The scheme provides an easy implement approach and a simple key storage manner to increase the availability of role-based access control scheme. Finally, the security analyses are also presented in this paper.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129430274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical Systems 基于场景的网络物理系统不存在行为一致性检查
Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Zhuzhong Qian
Cyber-Physical Systems (CPS) play an important role in the safety-critical systems. It is very significant to verify whether some concerned behaviors exist in a CPS. Hybrid interface automata, extension of a non-hybrid version, are used to model a CPS. A scenario, described by MARTE sequence diagram, specifies the concerned behaviors. An algorithm is given for bounded checking the behavioral nonexistent consistency, namely, the behaviors specified by a scenario all do not exist in a hybrid interface automaton. The idea of the algorithm is, firstly, encoding the behavioral nonexistent consistency to an unconstrained dynamic programming, secondly, solving the unconstrained dynamic programming by a genetic algorithm. The algorithm can search the results on the real domain, and be applied to nonlinear as well as linear hybrid systems.
信息物理系统(CPS)在安全关键系统中起着重要作用。验证CPS中是否存在相关行为具有重要意义。混合接口自动机是对非混合版本的扩展,用于对CPS建模。由MARTE序列图描述的场景指定了相关的行为。给出了一种行为不存在一致性的有界检查算法,即在混合接口自动机中,场景指定的行为都不存在。该算法的思想是,首先将行为不存在的一致性编码为无约束动态规划,然后用遗传算法求解无约束动态规划。该算法可以在实域上搜索结果,适用于非线性和线性混合系统。
{"title":"Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical Systems","authors":"Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Zhuzhong Qian","doi":"10.1109/IMIS.2014.8","DOIUrl":"https://doi.org/10.1109/IMIS.2014.8","url":null,"abstract":"Cyber-Physical Systems (CPS) play an important role in the safety-critical systems. It is very significant to verify whether some concerned behaviors exist in a CPS. Hybrid interface automata, extension of a non-hybrid version, are used to model a CPS. A scenario, described by MARTE sequence diagram, specifies the concerned behaviors. An algorithm is given for bounded checking the behavioral nonexistent consistency, namely, the behaviors specified by a scenario all do not exist in a hybrid interface automaton. The idea of the algorithm is, firstly, encoding the behavioral nonexistent consistency to an unconstrained dynamic programming, secondly, solving the unconstrained dynamic programming by a genetic algorithm. The algorithm can search the results on the real domain, and be applied to nonlinear as well as linear hybrid systems.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility Support 具有全球移动支持的移动网络中具有成本效益的Proxy-LMA移动管理方案
Chulhee Cho, Jun-Dong Cho, Jongpil Jeong
Mobile users (MUs) want to be provided with undisrupted network services when they navigate on the Next-Generation wireless networks (NGWNs). For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the NGWN. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.
移动用户希望在使用下一代无线网络(NGWNs)时能够获得不间断的网络服务。为此,与异质网络的联锁是重要的,但关于保证全球流动性的方法的研究很少。为此,本文提出了基于移动ip的全球互联系统Proxy-LMA技术,以增强NGWN内的全球移动性和互操作性。提出Proxy-LMA系统的目的是在现有移动管理协议(PMIPv6和MIPv6)的基础上扩展移动的边界,以保证异构网络环境下的全局移动性和互操作性。性能评估结果表明,在异构网络环境下,从信令成本和延迟的角度来看,所提出的Proxy-LMA系统比其他方法更有效。
{"title":"Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility Support","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.97","DOIUrl":"https://doi.org/10.1109/IMIS.2014.97","url":null,"abstract":"Mobile users (MUs) want to be provided with undisrupted network services when they navigate on the Next-Generation wireless networks (NGWNs). For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the NGWN. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges of the Internet of Things: IPv6 and Network Management 物联网的挑战:IPv6和网络管理
N. Benamar, A. Jara, L. Ladid, M. D. E. Ouadghiri
Nowadays, many researchers are interested in the concept of Internet of Things (IoT). IoT is evolving our knowledge and conception of the world. IoT aims to offer a common communication paradigm for all objects via the Internet and its protocols. For that reasons, it is being applied in all areas of life, such as environmental monitoring, healthcare, military, cities management, and industry. One of the major challenges of the IoT is to integrate IPv6, and its related protocols, into the constrained capabilities offered by Wireless Sensor Networks, building automation, and home appliances. One of the design considerations, for the success of the IoT, is to integrate what exists from IPv6, before creating novel protocols, in order to promote and ensure the interoperability, homogeneity, openness, security, flexibility, and heritage of all existing hardware, tools, and applications of IPv6. This work presents how to integrate the management protocols in IPv6 into the emerging IoT networks based on protocols such as 6LoWPAN. An overview of the different management protocols for IPv6 is presented. Network Management Protocol (SNMP), and the considerations for IoT management from works such as Lightweight Network Management Protocol (LNMP), and the Constrained networks and devices Management (COMAN) Group from the IETF are discussed. COMAN is presenting solutions such as simplified MIB, new SNMP consideration, and CoAP-based management.
如今,许多研究者对物联网(IoT)的概念很感兴趣。物联网正在改变我们对世界的认识和概念。物联网旨在通过互联网及其协议为所有对象提供通用的通信范式。因此,它被应用于生活的各个领域,如环境监测、医疗保健、军事、城市管理和工业。物联网的主要挑战之一是将IPv6及其相关协议集成到无线传感器网络、楼宇自动化和家用电器提供的受限功能中。为了物联网的成功,设计考虑因素之一是在创建新协议之前集成来自IPv6的现有内容,以促进和确保所有现有硬件、工具和IPv6应用的互操作性、同质性、开放性、安全性、灵活性和继承性。这项工作介绍了如何将IPv6中的管理协议集成到基于6LoWPAN等协议的新兴物联网网络中。对IPv6的不同管理协议进行了概述。讨论了网络管理协议(SNMP),以及来自IETF的轻量级网络管理协议(LNMP)和约束网络和设备管理(COMAN)组等工作的物联网管理注意事项。COMAN提出了简化的MIB、新的SNMP考虑和基于coap的管理等解决方案。
{"title":"Challenges of the Internet of Things: IPv6 and Network Management","authors":"N. Benamar, A. Jara, L. Ladid, M. D. E. Ouadghiri","doi":"10.1109/IMIS.2014.43","DOIUrl":"https://doi.org/10.1109/IMIS.2014.43","url":null,"abstract":"Nowadays, many researchers are interested in the concept of Internet of Things (IoT). IoT is evolving our knowledge and conception of the world. IoT aims to offer a common communication paradigm for all objects via the Internet and its protocols. For that reasons, it is being applied in all areas of life, such as environmental monitoring, healthcare, military, cities management, and industry. One of the major challenges of the IoT is to integrate IPv6, and its related protocols, into the constrained capabilities offered by Wireless Sensor Networks, building automation, and home appliances. One of the design considerations, for the success of the IoT, is to integrate what exists from IPv6, before creating novel protocols, in order to promote and ensure the interoperability, homogeneity, openness, security, flexibility, and heritage of all existing hardware, tools, and applications of IPv6. This work presents how to integrate the management protocols in IPv6 into the emerging IoT networks based on protocols such as 6LoWPAN. An overview of the different management protocols for IPv6 is presented. Network Management Protocol (SNMP), and the considerations for IoT management from works such as Lightweight Network Management Protocol (LNMP), and the Constrained networks and devices Management (COMAN) Group from the IETF are discussed. COMAN is presenting solutions such as simplified MIB, new SNMP consideration, and CoAP-based management.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Service Security for Smart Grid System 智能电网系统的业务安全
Inshil Doh, Jiyoung Lim, K. Chae
One of major application service areas in M2M (Machine-to-Machine) is the smart grid system. In smart grid systems, information and communications technology are used to gather and act on information that is related to the behaviors of consumers and suppliers. The technology is to improve the efficiency, reliability, and economics of the production and distribution of electricity. To make the system more reliable, security is a very important issue. In this paper, we propose secure system architecture and a mechanism to provide security for smart grid system robustness and reliability.
智能电网系统是M2M (Machine-to-Machine)的主要应用服务领域之一。在智能电网系统中,信息和通信技术用于收集和处理与消费者和供应商行为相关的信息。这项技术旨在提高电力生产和分配的效率、可靠性和经济性。为了使系统更加可靠,安全性是一个非常重要的问题。本文提出了一种安全的系统架构和机制,为智能电网系统的鲁棒性和可靠性提供安全保障。
{"title":"Service Security for Smart Grid System","authors":"Inshil Doh, Jiyoung Lim, K. Chae","doi":"10.1109/IMIS.2014.61","DOIUrl":"https://doi.org/10.1109/IMIS.2014.61","url":null,"abstract":"One of major application service areas in M2M (Machine-to-Machine) is the smart grid system. In smart grid systems, information and communications technology are used to gather and act on information that is related to the behaviors of consumers and suppliers. The technology is to improve the efficiency, reliability, and economics of the production and distribution of electricity. To make the system more reliable, security is a very important issue. In this paper, we propose secure system architecture and a mechanism to provide security for smart grid system robustness and reliability.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elliptic Curve Scalar Multiplication with a Bijective Transform 具有双射变换的椭圆曲线标量乘法
Y. Nagai, Masaaki Shirase, T. Izu
It is important to speed up scalar multiplication in elliptic curve cryptosystems and then various speeding-up techniques for that have been proposed. This paper proposes a method for computing a scalar multiplication, in which, first, we map a point we would like to compute a scalar multiplication into another point on another curve so that it has a special coordinate, second, we compute a scalar multiplication on the another curve, finally, we map the computed point on original curve. In fact, when we use the proposed method, the cost of scalar multiplication is reduced by about from 2 to 5% in projective, Jacobian, and modified Jacobian coordinate systems.
椭圆曲线密码系统中标量乘法的加速是一个非常重要的问题,为此提出了各种加速技术。本文提出了一种计算标量乘法的方法,首先将拟计算标量乘法的点映射到另一条曲线上的另一点上,使其具有特定的坐标,然后在另一条曲线上计算标量乘法,最后将计算点映射到原曲线上。事实上,当我们使用所提出的方法时,在射影坐标系、雅可比坐标系和修正雅可比坐标系中,标量乘法的代价降低了约2%至5%。
{"title":"Elliptic Curve Scalar Multiplication with a Bijective Transform","authors":"Y. Nagai, Masaaki Shirase, T. Izu","doi":"10.1109/IMIS.2014.35","DOIUrl":"https://doi.org/10.1109/IMIS.2014.35","url":null,"abstract":"It is important to speed up scalar multiplication in elliptic curve cryptosystems and then various speeding-up techniques for that have been proposed. This paper proposes a method for computing a scalar multiplication, in which, first, we map a point we would like to compute a scalar multiplication into another point on another curve so that it has a special coordinate, second, we compute a scalar multiplication on the another curve, finally, we map the computed point on original curve. In fact, when we use the proposed method, the cost of scalar multiplication is reduced by about from 2 to 5% in projective, Jacobian, and modified Jacobian coordinate systems.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115757101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SODiCS on Challenged Communication Environment 挑战通信环境下的sodic
Kenta Ito, Go Hirakawa, Y. Shibata
Through we experienced at the Eastern Japan Great Earthquake on March 11, 2011, a disaster information gathering systems are strongly needed to widely collect the disaster state around the evaluated areas, correctly analyze the degree of damages and quickly make decision of disaster recovery response. For this requirement, a mobile video surveillance system on a vehicle based on wireless network is useful on because of its wide rage monitoring and mobility. However, since most of the communication lines and systems are seriously damaged and the communication state is widely worse particularly in hilly and mountainous areas. In this paper, we introduce SODiCS (Spatial and Temporal Omnidirectional Video Distribution and Collection System) for challenged communication environment. Video data gathered using omnidirectional camera and various sensors are transmitted to all of the users through a web application. The user can see those collected data on GIS map as a web application. We developed the system with two modes as video distribution functions, Live View mode and Storage View mode. The system configuration and architecture are explained and a prototype system is constructed to evaluate the performance of our system.
通过2011年3月11日东日本大地震的经历,迫切需要一个灾害信息采集系统,广泛收集评估区域周围的灾情,正确分析破坏程度,快速做出灾后恢复响应决策。针对这一需求,基于无线网络的车载移动视频监控系统具有广泛的监控范围和可移动性。然而,由于大多数通信线路和系统遭到严重破坏,通信状况普遍较差,特别是在丘陵和山区。本文介绍了面向复杂通信环境的时空全方位视频分发与采集系统(SODiCS)。使用全向摄像头和各种传感器收集的视频数据通过web应用程序传输给所有用户。用户可以将收集到的数据作为web应用程序在GIS地图上看到。我们开发了两种模式作为视频分发功能,实时视图模式和存储视图模式。说明了系统的结构和体系结构,并构建了一个原型系统来评估系统的性能。
{"title":"SODiCS on Challenged Communication Environment","authors":"Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/IMIS.2014.138","DOIUrl":"https://doi.org/10.1109/IMIS.2014.138","url":null,"abstract":"Through we experienced at the Eastern Japan Great Earthquake on March 11, 2011, a disaster information gathering systems are strongly needed to widely collect the disaster state around the evaluated areas, correctly analyze the degree of damages and quickly make decision of disaster recovery response. For this requirement, a mobile video surveillance system on a vehicle based on wireless network is useful on because of its wide rage monitoring and mobility. However, since most of the communication lines and systems are seriously damaged and the communication state is widely worse particularly in hilly and mountainous areas. In this paper, we introduce SODiCS (Spatial and Temporal Omnidirectional Video Distribution and Collection System) for challenged communication environment. Video data gathered using omnidirectional camera and various sensors are transmitted to all of the users through a web application. The user can see those collected data on GIS map as a web application. We developed the system with two modes as video distribution functions, Live View mode and Storage View mode. The system configuration and architecture are explained and a prototype system is constructed to evaluate the performance of our system.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1