首页 > 最新文献

2014 10th International Conference on Communications (COMM)最新文献

英文 中文
Applied cybersecurity using game theory elements 运用博弈论元素应用网络安全
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866663
Alecsandru Patrascu, E. Simion
Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kinds of attacks by using elements of modern game theory. We will present the effects and benefits of game theory and we will talk about a defence exercise model that can be used to train cyber response specialists.
网络威胁和计算机网络防御领域在我们的生活中变得越来越重要。从我们的普通个人电脑开始,到上网本或智能手机等瘦客户端,我们发现自己不断受到恶意软件攻击的轰炸。在本文中,我们将提出一种新的方法,通过使用现代博弈论的元素来检测这类攻击。我们将介绍博弈论的影响和好处,我们将讨论可用于培训网络响应专家的防御演习模型。
{"title":"Applied cybersecurity using game theory elements","authors":"Alecsandru Patrascu, E. Simion","doi":"10.1109/ICCOMM.2014.6866663","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866663","url":null,"abstract":"Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kinds of attacks by using elements of modern game theory. We will present the effects and benefits of game theory and we will talk about a defence exercise model that can be used to train cyber response specialists.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biologically inspired risk assessment in cyber security using neural networks 基于神经网络的网络安全生物学启发风险评估
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866746
Mihai-Gabriel Ionita, V. Patriciu
The only suitable option for risk assessment systems designed with real-time constraints in mind, in the present seems to be the one based on attack graphs. Even though it is not computationally feasible for every circumstance, it is elastic enough for the usual use case. Paper [8] proposes an interesting approach based on attack graphs. An attack graph is a graph that represents all possible sequences of the attacker's actions that lead him/her to the established goals. These action sequences are also called attack traces. The main disadvantage of this approach is its high computational complexity. Thus, attack modeling needs to represent not only the sequences of actions, but also the attack impact, as well as how countermeasures can mitigate this impact and at which cost. However, the human body, based on the immune system, calculates risk every second for offering the correct manner of immune response to foreign threats, without hampering normal cell operation. Why don't we use this behavior in cyber defense systems? Applying Matzinger's danger theory, with the key concept of a distress signal, involved in risk assessment seems to be the logical decision, due to its lite resource consumption and categorical nature, which rapidly defines an attack surface, when correlating information gathered from local agents dispersed on protected hosts. As a proof of concept in favor of supporting this idea, a feed-forward backward-propagating neural network was setup to correlate threat data from agents installed on remote protected hosts. This intelligent system assesses the risk of a cyber-attack taking place and bringing the defense systems to an alarmed state in a timely manner, which can help offer a quick response against an attacker.
目前,考虑到实时约束的风险评估系统的唯一合适选择似乎是基于攻击图的风险评估系统。尽管它在计算上并不适用于每一种情况,但它对于通常的用例来说是足够灵活的。论文[8]提出了一种基于攻击图的有趣方法。攻击图是一个表示攻击者所有可能的行动序列的图,这些行动将导致他/她达到既定目标。这些动作序列也被称为攻击轨迹。这种方法的主要缺点是计算复杂度高。因此,攻击建模不仅需要表示动作序列,还需要表示攻击影响,以及对策如何减轻这种影响以及代价是什么。然而,人体以免疫系统为基础,每秒钟都在计算风险,以便在不妨碍正常细胞运作的情况下,对外来威胁做出正确的免疫反应。为什么我们不在网络防御系统中使用这种行为呢?将分散在受保护主机上的本地代理收集的信息关联起来,将Matzinger的危险理论与遇险信号的关键概念应用于风险评估似乎是合乎逻辑的决定,因为它消耗了大量资源,并且具有分类性质,可以快速定义攻击面。作为支持这一想法的概念证明,建立了一个前馈向后传播的神经网络来关联安装在远程受保护主机上的代理的威胁数据。这种智能系统可以评估发生网络攻击的风险,并及时将防御系统带入警报状态,从而有助于对攻击者做出快速反应。
{"title":"Biologically inspired risk assessment in cyber security using neural networks","authors":"Mihai-Gabriel Ionita, V. Patriciu","doi":"10.1109/ICCOMM.2014.6866746","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866746","url":null,"abstract":"The only suitable option for risk assessment systems designed with real-time constraints in mind, in the present seems to be the one based on attack graphs. Even though it is not computationally feasible for every circumstance, it is elastic enough for the usual use case. Paper [8] proposes an interesting approach based on attack graphs. An attack graph is a graph that represents all possible sequences of the attacker's actions that lead him/her to the established goals. These action sequences are also called attack traces. The main disadvantage of this approach is its high computational complexity. Thus, attack modeling needs to represent not only the sequences of actions, but also the attack impact, as well as how countermeasures can mitigate this impact and at which cost. However, the human body, based on the immune system, calculates risk every second for offering the correct manner of immune response to foreign threats, without hampering normal cell operation. Why don't we use this behavior in cyber defense systems? Applying Matzinger's danger theory, with the key concept of a distress signal, involved in risk assessment seems to be the logical decision, due to its lite resource consumption and categorical nature, which rapidly defines an attack surface, when correlating information gathered from local agents dispersed on protected hosts. As a proof of concept in favor of supporting this idea, a feed-forward backward-propagating neural network was setup to correlate threat data from agents installed on remote protected hosts. This intelligent system assesses the risk of a cyber-attack taking place and bringing the defense systems to an alarmed state in a timely manner, which can help offer a quick response against an attacker.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Capacity and Available Transfer Rate evaluation for wireless links 无线链路的容量和可用传输速率评估
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866693
I. Ivanciu, Andrei Ciprian Hosu, Z. Polgar, V. Dobrota
This paper presents a capacity and Available Transfer Rate evaluation mechanism which can be used in a heterogeneous wireless network. This is needed to perform load balancing over several wireless links in order to fulfill the transfer rate and connectivity requirements of Next Generation Network services. The implemented measurement tool is based on WBest and the experiments considered different values of the received signal level and background traffic of the wireless network.
提出了一种适用于异构无线网络的容量和可用传输速率评估机制。这需要在多个无线链路上执行负载平衡,以满足下一代网络服务的传输速率和连接要求。所实现的测量工具基于WBest,实验考虑了无线网络接收信号电平和背景流量的不同值。
{"title":"Capacity and Available Transfer Rate evaluation for wireless links","authors":"I. Ivanciu, Andrei Ciprian Hosu, Z. Polgar, V. Dobrota","doi":"10.1109/ICCOMM.2014.6866693","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866693","url":null,"abstract":"This paper presents a capacity and Available Transfer Rate evaluation mechanism which can be used in a heterogeneous wireless network. This is needed to perform load balancing over several wireless links in order to fulfill the transfer rate and connectivity requirements of Next Generation Network services. The implemented measurement tool is based on WBest and the experiments considered different values of the received signal level and background traffic of the wireless network.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposed architecture of a fully integrated modular neural network-based automatic facial emotion recognition system based on Facial Action Coding System 提出了一种基于全集成模块化神经网络的基于面部动作编码系统的面部情绪自动识别系统架构
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866754
Mihai Gavrilescu
In this paper we describe the architecture of a fully integrated modular neural network-based automatic facial emotion recognition (FER) system able to recognize emotions based on the Facial Action Code System (FACS). The proposed framework makes use of a neural network to combine the recognition results from different sources, improving the integration of different types of classifiers, in order to provide better facial emotion recognition results. We present the architecture and the implementation details, as well as results and possible improvements that can be brought to the current framework.
在本文中,我们描述了一个完全集成的模块化神经网络的自动面部情绪识别(FER)系统的架构,该系统能够识别基于面部动作代码系统(FACS)的情绪。该框架利用神经网络对不同来源的识别结果进行组合,提高了不同类型分类器的集成,从而提供更好的面部情绪识别结果。我们介绍了体系结构和实现细节,以及可以给当前框架带来的结果和可能的改进。
{"title":"Proposed architecture of a fully integrated modular neural network-based automatic facial emotion recognition system based on Facial Action Coding System","authors":"Mihai Gavrilescu","doi":"10.1109/ICCOMM.2014.6866754","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866754","url":null,"abstract":"In this paper we describe the architecture of a fully integrated modular neural network-based automatic facial emotion recognition (FER) system able to recognize emotions based on the Facial Action Code System (FACS). The proposed framework makes use of a neural network to combine the recognition results from different sources, improving the integration of different types of classifiers, in order to provide better facial emotion recognition results. We present the architecture and the implementation details, as well as results and possible improvements that can be brought to the current framework.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Demonstrator for voice communication over LTE LTE语音通信演示器
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866763
R. Curpen, T. Balan, F. Sandu, C. Costache, Calin Cerchez
The mobile technology 4G, known as Long Term Evolution (LTE), offers very high peak data, but, since it was designed specifically for data traffic, voice support is absent. So one problematic aspect is providing voice support or having voice continuity when the user moves out of LTE coverage. The most feasible solutions are CS fallback, Voice over LTE via Generic Access (VoLGA), Single Radio Voice Call Continuity (SRVCC) and third party voice service like Skype. These solutions are discussed and compared. There are also suggested the best options for providing voice over LTE, depending on the different types of network that an operator has already deployed. Since 2 out of 4 solutions described in this paper interact with IMS, in order to demonstrate the concepts, we have designed a testing configuration, based on our own-developed LTE network simulator, 4GSim and OpenIMS Core.
移动技术4G,被称为长期演进(LTE),提供非常高的峰值数据,但是,由于它是专门为数据流量设计的,因此没有语音支持。所以一个有问题的方面是当用户离开LTE覆盖范围时提供语音支持或保持语音连续性。最可行的解决方案是CS回退、通过通用接入(VoLGA)的LTE语音、单无线电语音呼叫连续性(SRVCC)和Skype等第三方语音服务。对这些解决方案进行了讨论和比较。根据运营商已经部署的不同类型的网络,还建议了通过LTE提供语音的最佳选择。由于本文中描述的4个解决方案中有2个与IMS交互,为了演示这些概念,我们基于我们自己开发的LTE网络模拟器、4GSim和OpenIMS Core设计了一个测试配置。
{"title":"Demonstrator for voice communication over LTE","authors":"R. Curpen, T. Balan, F. Sandu, C. Costache, Calin Cerchez","doi":"10.1109/ICCOMM.2014.6866763","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866763","url":null,"abstract":"The mobile technology 4G, known as Long Term Evolution (LTE), offers very high peak data, but, since it was designed specifically for data traffic, voice support is absent. So one problematic aspect is providing voice support or having voice continuity when the user moves out of LTE coverage. The most feasible solutions are CS fallback, Voice over LTE via Generic Access (VoLGA), Single Radio Voice Call Continuity (SRVCC) and third party voice service like Skype. These solutions are discussed and compared. There are also suggested the best options for providing voice over LTE, depending on the different types of network that an operator has already deployed. Since 2 out of 4 solutions described in this paper interact with IMS, in order to demonstrate the concepts, we have designed a testing configuration, based on our own-developed LTE network simulator, 4GSim and OpenIMS Core.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124783440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight materials optimization for EMI protection applications 用于电磁干扰保护应用的轻质材料优化
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866710
Mihai Enache, Dan Stoica, A. Szilagyi
Nowadays EMI shielding solutions, like most of electronic industry trends, are getting oriented to economical and friendly-environmental technologies. The classical EMI protection solutions consist in standard electromagnetic shielded enclosures designed as the product chassis. The particular situations were classic electronic equipment is placed in a hard EMI environment, are treated by using a special design equipment or a large Faraday enclosure to place the equipment. Both solutions mentioned above involve high costs and sometimes the start date of specific activity is postponed in that hard environment. Our work was to design a special enclosure, using lightweight materials, adapted to equipment in order to maintain product performances and functionality. The technologies analyzed during our studies were represented by conductive coatings and fabrics applied to different types of dielectric substratum by deposition and multi-layer techniques.
如今,EMI屏蔽解决方案与大多数电子行业趋势一样,正朝着经济和环保技术的方向发展。经典的电磁干扰保护解决方案包含在设计为产品机箱的标准电磁屏蔽外壳中。经典的电子设备被放置在一个硬EMI环境的特殊情况下,是通过使用特殊设计的设备或大型法拉第外壳来放置设备。上面提到的两种解决方案都涉及高成本,有时在这种困难的环境中特定活动的开始日期被推迟。我们的工作是设计一个特殊的外壳,使用轻质材料,适应设备,以保持产品的性能和功能。在我们的研究中分析的技术代表是导电涂层和织物,通过沉积和多层技术应用于不同类型的介电基材。
{"title":"Lightweight materials optimization for EMI protection applications","authors":"Mihai Enache, Dan Stoica, A. Szilagyi","doi":"10.1109/ICCOMM.2014.6866710","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866710","url":null,"abstract":"Nowadays EMI shielding solutions, like most of electronic industry trends, are getting oriented to economical and friendly-environmental technologies. The classical EMI protection solutions consist in standard electromagnetic shielded enclosures designed as the product chassis. The particular situations were classic electronic equipment is placed in a hard EMI environment, are treated by using a special design equipment or a large Faraday enclosure to place the equipment. Both solutions mentioned above involve high costs and sometimes the start date of specific activity is postponed in that hard environment. Our work was to design a special enclosure, using lightweight materials, adapted to equipment in order to maintain product performances and functionality. The technologies analyzed during our studies were represented by conductive coatings and fabrics applied to different types of dielectric substratum by deposition and multi-layer techniques.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124174905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Broadband amplifier with self adaptability to the electromagnetic status 具有自适应电磁状态的宽带放大器
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866758
A. Diaconu, C. Balan
It is well known the fact that, in reality, reception's point electromagnetic status may change considerably over time and thus, the radio receiver must adapt its structure, resp., its characteristics, as to ensure optimal reception conditions of the useful signal. Generally, radio receiver's adapting methods to the electromagnetic status are closely related to its dynamic range limits, as they determine its sensitivity and nonlinear properties. Radio receiver's adaption involves adjusting transfer coefficients, disturbance thresholds, sensitivity, pass band etc., based on some well-established criteria that lead to automatic adjustment of the dynamic range limits. In this paper a broadband amplifier, which can automatically change its transfer coefficients, depending on input signal's level (whilst no attenuators are used within its constructional stages), is proposed and assessed. Thus, during the followings, it is proven that the amplifier allows a high dynamic range of the input signal, while reducing the dynamic range of the output signal bellow the 1 dB compression point, recommending its usage either within a tuner or an active antenna, in MF, HF or VHF ranges.
众所周知,在现实中,接收点的电磁状态可能会随着时间的推移而发生很大的变化,因此,无线电接收机必须调整其结构,例如:,其特性,以确保有用信号的最佳接收条件。一般来说,无线电接收机对电磁状态的适应方式与其动态范围限制密切相关,动态范围限制决定了接收机的灵敏度和非线性特性。无线电接收机的自适应包括调整传输系数、干扰阈值、灵敏度、通频带等,这些都是根据一些既定的准则来自动调整动态范围限制的。本文提出并评估了一种宽带放大器,它可以根据输入信号的电平自动改变其传输系数(同时在其构造阶段内不使用衰减器)。因此,在以下过程中,证明放大器允许输入信号的高动态范围,同时将输出信号的动态范围降低到低于1 dB压缩点,建议在中频、高频或甚高频范围内的调谐器或有源天线中使用。
{"title":"Broadband amplifier with self adaptability to the electromagnetic status","authors":"A. Diaconu, C. Balan","doi":"10.1109/ICCOMM.2014.6866758","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866758","url":null,"abstract":"It is well known the fact that, in reality, reception's point electromagnetic status may change considerably over time and thus, the radio receiver must adapt its structure, resp., its characteristics, as to ensure optimal reception conditions of the useful signal. Generally, radio receiver's adapting methods to the electromagnetic status are closely related to its dynamic range limits, as they determine its sensitivity and nonlinear properties. Radio receiver's adaption involves adjusting transfer coefficients, disturbance thresholds, sensitivity, pass band etc., based on some well-established criteria that lead to automatic adjustment of the dynamic range limits. In this paper a broadband amplifier, which can automatically change its transfer coefficients, depending on input signal's level (whilst no attenuators are used within its constructional stages), is proposed and assessed. Thus, during the followings, it is proven that the amplifier allows a high dynamic range of the input signal, while reducing the dynamic range of the output signal bellow the 1 dB compression point, recommending its usage either within a tuner or an active antenna, in MF, HF or VHF ranges.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of fuzzy evidence accrual security approach To GPS systems GPS系统模糊证据累积安全方法分析
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866695
S. Stubberud, K. Kramer
GPS security is becoming a major concern. In this paper, an evidence accrual system that looks to identify when a GPS navigation system may be compromised is discussed. The techniques use a novel fuzzy Kalman filter to drive the evidence generation. The technique has been modified for a more realistic set of operations that considers possibilities, including variations on jamming or spoofing and the detection capabilities that can be used.
GPS安全正成为一个主要问题。在这篇论文中,我们讨论了一种证据累积系统,它可以识别GPS导航系统何时可能受到损害。该技术使用一种新颖的模糊卡尔曼滤波来驱动证据的生成。该技术已经过修改,以适应更现实的操作,考虑了各种可能性,包括干扰或欺骗的变化以及可使用的检测能力。
{"title":"Analysis of fuzzy evidence accrual security approach To GPS systems","authors":"S. Stubberud, K. Kramer","doi":"10.1109/ICCOMM.2014.6866695","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866695","url":null,"abstract":"GPS security is becoming a major concern. In this paper, an evidence accrual system that looks to identify when a GPS navigation system may be compromised is discussed. The techniques use a novel fuzzy Kalman filter to drive the evidence generation. The technique has been modified for a more realistic set of operations that considers possibilities, including variations on jamming or spoofing and the detection capabilities that can be used.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129262048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
E - business platform for mobile users 面向移动用户的电子商务平台
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866725
E. Pop
In this paper a client server platform for integrated electronic services providing to mobile users is considered. A stock market exchange service is presented, as a demo example. The platform's functional model allows mobile users to access e-business type informational content. The data transmission is performed using mobile or wireless communications channels, using TCP/IP protocol. The stock market exchange service is published for the mobile users using a web service, which is more efficient from the data traffic volume and cost, with respect to an access solution based on WEB browsing. The client software applications are suitable for PDA and Smartphone devices.
本文研究了一种面向移动用户提供综合电子服务的客户端-服务器平台。本文给出了一个股票市场交易服务作为演示示例。该平台的功能模型允许移动用户访问电子商务类型的信息内容。数据传输采用移动或无线通信信道,采用TCP/IP协议。股票市场交易服务是针对移动用户使用web服务发布的,相对于基于web浏览的访问解决方案,从数据流量和成本上来说,web服务更高效。客户端软件应用程序适用于PDA和智能手机。
{"title":"E - business platform for mobile users","authors":"E. Pop","doi":"10.1109/ICCOMM.2014.6866725","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866725","url":null,"abstract":"In this paper a client server platform for integrated electronic services providing to mobile users is considered. A stock market exchange service is presented, as a demo example. The platform's functional model allows mobile users to access e-business type informational content. The data transmission is performed using mobile or wireless communications channels, using TCP/IP protocol. The stock market exchange service is published for the mobile users using a web service, which is more efficient from the data traffic volume and cost, with respect to an access solution based on WEB browsing. The client software applications are suitable for PDA and Smartphone devices.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127727097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining point operations for efficient elliptic curve cryptography scalar multiplication 高效椭圆曲线密码的组合点运算
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866676
C. Leca, C. Rîncu
Elliptic curve cryptosystems have gained increase attention and have become an intense area of research, mainly because of their shorter key length when compared to other public key cryptosystems such as RSA. Shorter key length brings advantages such as reduced computation effort, power consumption and storage requirements, making it possible to increase the available security for portable devices, smartcards and other power strained devices. ECC manages to cover all the significant cryptographic operations such as key exchange and agreement or digital signature with greater efficiency than previous systems. These operations rely heavily on point multiplication which is also the most time-consuming operation. This paper evaluates point operations (doubling, tripling, quadrupling, and addition) and proposes an algorithm for combining the operations in order to achieve faster scalar multiplication when compared to the standard algorithm for scalar multiplication of double and add.
椭圆曲线密码系统受到越来越多的关注,并成为一个激烈的研究领域,主要是因为与其他公钥密码系统(如RSA)相比,椭圆曲线密码系统的密钥长度更短。较短的密钥长度带来了诸如减少计算工作量,功耗和存储要求等优点,从而可以提高便携式设备,智能卡和其他功率紧张设备的可用安全性。ECC设法覆盖所有重要的加密操作,如密钥交换和协议或数字签名,比以前的系统效率更高。这些操作严重依赖于点乘法,这也是最耗时的操作。本文对点运算(加倍、三倍、四倍和加法)进行了计算,并提出了一种将这些运算组合在一起的算法,与标准的加倍和相加的标量乘法算法相比,可以实现更快的标量乘法。
{"title":"Combining point operations for efficient elliptic curve cryptography scalar multiplication","authors":"C. Leca, C. Rîncu","doi":"10.1109/ICCOMM.2014.6866676","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866676","url":null,"abstract":"Elliptic curve cryptosystems have gained increase attention and have become an intense area of research, mainly because of their shorter key length when compared to other public key cryptosystems such as RSA. Shorter key length brings advantages such as reduced computation effort, power consumption and storage requirements, making it possible to increase the available security for portable devices, smartcards and other power strained devices. ECC manages to cover all the significant cryptographic operations such as key exchange and agreement or digital signature with greater efficiency than previous systems. These operations rely heavily on point multiplication which is also the most time-consuming operation. This paper evaluates point operations (doubling, tripling, quadrupling, and addition) and proposes an algorithm for combining the operations in order to achieve faster scalar multiplication when compared to the standard algorithm for scalar multiplication of double and add.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 10th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1