首页 > 最新文献

2010 10th IEEE/IPSJ International Symposium on Applications and the Internet最新文献

英文 中文
Detecting Anomaly Traffic using Flow Data in the real VoIP network 利用实际VoIP网络中的流量数据检测异常流量
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.108
Hyeongu Son, Youngseok Lee
As wireless LANs as well as the high-speed broadband Internet service are widely deployed, the VoIP service has become popular. Generally, a lot of commercial VoIP services use SIP and RTP for signaling and voice transport protocols. Most commercial VoIP service providers employ only simple security functions such as basic authentication without packet encryption because of fast implementation and deployment. Therefore, the VoIP service is highly vulnerable to several threats and attacks, because secure protocols for carrying VoIP packets are not fully utilized. For instance, unencrypted SIP packets including authentication messages could be easily forged to be exploited for generating anomaly traffic by malicious users. In this paper, we propose a flow-based VoIP anomaly traffic detection method that could find three representative VoIP anomaly attacks of SIP CANCEL, BYE DoS and RTP flooding that could be easily exploited in the real VoIP network. Our scheme uses the IETF IPFIX standard for monitoring VoIP calls in flow units. From the experiments with the commercial SIP phones in the real VoIP network, we show that SIP CANCEL, BYE DoS and RTP flooding attacks are easily generated and that they could be detected effectively by our proposed method.
随着无线局域网和高速宽带互联网业务的广泛部署,VoIP业务得到了普及。通常,许多商业VoIP服务使用SIP和RTP作为信令和语音传输协议。由于实现和部署速度快,大多数商用VoIP服务提供商只采用基本认证等简单的安全功能,而不采用报文加密。因此,VoIP业务没有充分利用承载VoIP报文的安全协议,极易受到多种威胁和攻击。例如,包含身份验证消息的未加密SIP数据包很容易被伪造,从而被恶意用户利用来生成异常流量。本文提出了一种基于流量的VoIP异常流量检测方法,该方法可以发现在真实VoIP网络中容易被利用的三种具有代表性的VoIP异常攻击:SIP CANCEL、BYE DoS和RTP flood。我们的方案使用IETF IPFIX标准来监控流单元中的VoIP呼叫。在实际VoIP网络中对商业SIP电话进行的实验表明,该方法容易产生SIP CANCEL、BYE DoS和RTP泛洪攻击,并且可以有效地检测到这些攻击。
{"title":"Detecting Anomaly Traffic using Flow Data in the real VoIP network","authors":"Hyeongu Son, Youngseok Lee","doi":"10.1109/SAINT.2010.108","DOIUrl":"https://doi.org/10.1109/SAINT.2010.108","url":null,"abstract":"As wireless LANs as well as the high-speed broadband Internet service are widely deployed, the VoIP service has become popular. Generally, a lot of commercial VoIP services use SIP and RTP for signaling and voice transport protocols. Most commercial VoIP service providers employ only simple security functions such as basic authentication without packet encryption because of fast implementation and deployment. Therefore, the VoIP service is highly vulnerable to several threats and attacks, because secure protocols for carrying VoIP packets are not fully utilized. For instance, unencrypted SIP packets including authentication messages could be easily forged to be exploited for generating anomaly traffic by malicious users. In this paper, we propose a flow-based VoIP anomaly traffic detection method that could find three representative VoIP anomaly attacks of SIP CANCEL, BYE DoS and RTP flooding that could be easily exploited in the real VoIP network. Our scheme uses the IETF IPFIX standard for monitoring VoIP calls in flow units. From the experiments with the commercial SIP phones in the real VoIP network, we show that SIP CANCEL, BYE DoS and RTP flooding attacks are easily generated and that they could be detected effectively by our proposed method.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Web-Based Experiment to Analyze Norms of Reputation Making: How to Evaluate Actions with a Opponent Having a Bad Reputation 基于网络的声誉制造规范分析实验:如何评价对手的不良声誉行为
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.45
Takahisa Suzuki, Tetsurou Kobayashi
We describe a web-based survey to assess how to evaluate a reputation by referring to his or her history of actions and taking account of his or her opponent’s reputation. The analysis indicates that there is a distinction between possible actions with an opponent having bad reputations. That is, cooperative action with opponents that have bad reputations is less favorable than cooperative action with someone with an average reputation, and defection against opponents that have bad reputations is more favorable than defection against someone with an average one. Evaluation of actor with opponents that have bad reputation are found to depend on two evaluation factors, intimacy and social desirableness, because evaluation words extracted from the respondents’ questionnaires could be classified with these two dimensions. This finding indicates that the norm of reputation making is more complex than the intuitive one-dimensional mechanism.
我们描述了一项基于网络的调查,通过参考他或她的行为历史并考虑他或她的对手的声誉来评估如何评估声誉。分析表明,面对名声不好的对手,可能采取的行动是有区别的。也就是说,与名声不好的对手合作比与名声一般的人合作更不利,而背叛名声不好的对手比背叛名声一般的对手更有利。研究发现,对有不良声誉对手的演员的评价依赖于亲密度和社会可取性这两个评价因素,因为从被调查者的问卷中提取的评价词可以用这两个维度进行分类。这一发现表明,声誉形成的规范比直观的一维机制更为复杂。
{"title":"Web-Based Experiment to Analyze Norms of Reputation Making: How to Evaluate Actions with a Opponent Having a Bad Reputation","authors":"Takahisa Suzuki, Tetsurou Kobayashi","doi":"10.1109/SAINT.2010.45","DOIUrl":"https://doi.org/10.1109/SAINT.2010.45","url":null,"abstract":"We describe a web-based survey to assess how to evaluate a reputation by referring to his or her history of actions and taking account of his or her opponent’s reputation. The analysis indicates that there is a distinction between possible actions with an opponent having bad reputations. That is, cooperative action with opponents that have bad reputations is less favorable than cooperative action with someone with an average reputation, and defection against opponents that have bad reputations is more favorable than defection against someone with an average one. Evaluation of actor with opponents that have bad reputation are found to depend on two evaluation factors, intimacy and social desirableness, because evaluation words extracted from the respondents’ questionnaires could be classified with these two dimensions. This finding indicates that the norm of reputation making is more complex than the intuitive one-dimensional mechanism.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Rewarding Method for Information Propagation in Social Networks 社会网络中信息传播的激励奖励方法
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.61
Y. Takata, Ryo Hashimoto, R. Shinkuma, Tatsuro Takahashi, Naoki Yoshinaga, S. Itaya, Shinichi Doi, Keiji Yamada
A problem in the social-network-based intaraction distribution is that people are less motivated to forward information when psychological forwarding cost is large. The simplest solution for this is to compensate for the cost by giving people incentive reward when they forward information. However, it is unclear that, even if we successfully propagate information over the whole social network by the incentive reward, this propagation is meaningful for the sender (original information source). Therefore, in this paper, we propose a novel incentive rewarding method where incentive reward is assigned to a forwarder only when the receiver reacts to the forwarded information. In our method, forwarders are motivated to attach their own recommendation comment when they forward information. As a result, our method can promote receivers to react the information without increasing the total amount of incentive reward, compared with the method that gives incentive reward independently of the receiver's reaction.
基于社会网络的互动分布存在一个问题,即当心理转发成本较大时,人们转发信息的积极性较低。最简单的解决方案是,当人们转发信息时,通过给予奖励来补偿成本。然而,不清楚的是,即使我们通过激励奖励成功地在整个社会网络上传播信息,这种传播对发送者(原始信息源)来说是有意义的。因此,在本文中,我们提出了一种新的激励奖励方法,只有当接收方对转发的信息做出反应时,才会给转发方分配激励奖励。在我们的方法中,转发者被激励在转发信息时附加自己的推荐评论。因此,与独立于接受者的反应给予激励奖励的方法相比,我们的方法可以在不增加激励奖励总量的情况下促进接受者对信息作出反应。
{"title":"Incentive Rewarding Method for Information Propagation in Social Networks","authors":"Y. Takata, Ryo Hashimoto, R. Shinkuma, Tatsuro Takahashi, Naoki Yoshinaga, S. Itaya, Shinichi Doi, Keiji Yamada","doi":"10.1109/SAINT.2010.61","DOIUrl":"https://doi.org/10.1109/SAINT.2010.61","url":null,"abstract":"A problem in the social-network-based intaraction distribution is that people are less motivated to forward information when psychological forwarding cost is large. The simplest solution for this is to compensate for the cost by giving people incentive reward when they forward information. However, it is unclear that, even if we successfully propagate information over the whole social network by the incentive reward, this propagation is meaningful for the sender (original information source). Therefore, in this paper, we propose a novel incentive rewarding method where incentive reward is assigned to a forwarder only when the receiver reacts to the forwarded information. In our method, forwarders are motivated to attach their own recommendation comment when they forward information. As a result, our method can promote receivers to react the information without increasing the total amount of incentive reward, compared with the method that gives incentive reward independently of the receiver's reaction.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133952985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web 基于社交网络人际关系的“角色”动态信任估计方法
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.51
Shigeichiro Yamasaki
In this paper, we propose a trust estimation method for a parson by the rating of his or her active audience of social web such as Twitter. We call this method 'trust by the rating of a persona's active audience.' A 'persona', such as 'Display Name' of Twitter (with additional authentication) or 'Claimed ID' of OpenID, denotes an artificial identity to represent one's social position in the user-centric authorization. We utilize the 'persona' to be an object to accumulate the rating of trust for IT services for our trust estimation method. The most significant difference of our trust model and traditional one like PKI is that the trustworthiness of persona is not stable. Therefore, we focused on the implement methods for the sensitivity of the temporal change of a persona's trustworthiness. The basic idea of our 'trust by the rating of a persona's active audience' is similar to the Google Page Rank method. We also try to show that this kind of social web based trust has a possibility to be a global infrastructure for trust.
在本文中,我们提出了一种基于社交网站(如Twitter)上活跃受众的评级来估计牧师信任的方法。我们把这种方法称为“根据人物角色的活跃受众的评级来获得信任”。“角色”,如Twitter的“显示名称”(带有额外的身份验证)或OpenID的“声明ID”,表示在以用户为中心的授权中代表一个人的社会地位的人工身份。我们利用“角色”作为对象,为我们的信任估计方法累积IT服务的信任评级。我们的信任模型与PKI等传统信任模型最大的区别在于角色的可信度不稳定。因此,我们重点研究人物可信度时间变化敏感性的实现方法。我们的“通过角色活跃受众的评级来获得信任”的基本理念类似于谷歌的页面排名方法。我们也试图证明这种基于社交网络的信任有可能成为全球信任的基础设施。
{"title":"A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web","authors":"Shigeichiro Yamasaki","doi":"10.1109/SAINT.2010.51","DOIUrl":"https://doi.org/10.1109/SAINT.2010.51","url":null,"abstract":"In this paper, we propose a trust estimation method for a parson by the rating of his or her active audience of social web such as Twitter. We call this method 'trust by the rating of a persona's active audience.' A 'persona', such as 'Display Name' of Twitter (with additional authentication) or 'Claimed ID' of OpenID, denotes an artificial identity to represent one's social position in the user-centric authorization. We utilize the 'persona' to be an object to accumulate the rating of trust for IT services for our trust estimation method. The most significant difference of our trust model and traditional one like PKI is that the trustworthiness of persona is not stable. Therefore, we focused on the implement methods for the sensitivity of the temporal change of a persona's trustworthiness. The basic idea of our 'trust by the rating of a persona's active audience' is similar to the Google Page Rank method. We also try to show that this kind of social web based trust has a possibility to be a global infrastructure for trust.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Calculation of Necessary QoS for User Satisfaction with a QoS Mapping Matrix 用QoS映射矩阵计算用户满意度所需的QoS
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.95
Yoshihiro Ito
This paper studies a method for getting necessary QoS for user satisfaction. For a service, its user satisfaction can have some aspects and must be treated from every aspect. However, it is not easy to find feasible QoS that satisfies a user from every aspect. This paper assumes QoS mapping with the multiple linear regression and defines a QoS mapping matrix. By popular matrix operations, which include generalized inverse, we can decide necessary QoS for required user satisfaction in every aspect. To confirm the effectiveness of the method, this paper shows the numerical results.
本文研究了一种获取用户满意所需QoS的方法。对于一项服务来说,它的用户满意度可以有某些方面,必须从各个方面来对待。然而,要找到从各个方面满足用户需求的可行QoS并不容易。本文用多元线性回归假设QoS映射,并定义了QoS映射矩阵。通过流行的矩阵运算,包括广义逆运算,我们可以在各个方面确定所需的QoS以满足用户的需求。为了验证该方法的有效性,文中给出了数值结果。
{"title":"Calculation of Necessary QoS for User Satisfaction with a QoS Mapping Matrix","authors":"Yoshihiro Ito","doi":"10.1109/SAINT.2010.95","DOIUrl":"https://doi.org/10.1109/SAINT.2010.95","url":null,"abstract":"This paper studies a method for getting necessary QoS for user satisfaction. For a service, its user satisfaction can have some aspects and must be treated from every aspect. However, it is not easy to find feasible QoS that satisfies a user from every aspect. This paper assumes QoS mapping with the multiple linear regression and defines a QoS mapping matrix. By popular matrix operations, which include generalized inverse, we can decide necessary QoS for required user satisfaction in every aspect. To confirm the effectiveness of the method, this paper shows the numerical results.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Draw Plug-In for a Wiki Software 一个绘制插件的Wiki软件
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.102
Takashi Yamanoue
Experimental implementation of NetDraw, a draw program which is a plug-in of a wiki software, is shown. The draw program of a computer assisted teaching system is exploited to make NetDraw. It takes about three weeks to make the first version of NetDraw. NetDraw is a collaborative tool through drawing. It has been using for computer science classes in a university. A Teacher’s work for preparing classes was reduced by using NetDraw.
本文给出了wiki软件插件绘制程序NetDraw的实验实现。利用计算机辅助教学系统的绘图程序制作NetDraw软件。制作NetDraw的第一个版本大约需要三周的时间。NetDraw是一个通过绘图的协作工具。它已经在一所大学的计算机科学课程中使用。使用NetDraw减少了老师备课的工作量。
{"title":"A Draw Plug-In for a Wiki Software","authors":"Takashi Yamanoue","doi":"10.1109/SAINT.2010.102","DOIUrl":"https://doi.org/10.1109/SAINT.2010.102","url":null,"abstract":"Experimental implementation of NetDraw, a draw program which is a plug-in of a wiki software, is shown. The draw program of a computer assisted teaching system is exploited to make NetDraw. It takes about three weeks to make the first version of NetDraw. NetDraw is a collaborative tool through drawing. It has been using for computer science classes in a university. A Teacher’s work for preparing classes was reduced by using NetDraw.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks 一种改进的无线传感器网络能耗与安全密钥分配方案
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.69
Hyeopgeon Lee, Kyounghwan Lee, Yongtae Shin
The ZigBee which is a type of the sensor networks defines a role of the Trust Center, so it securely communicates through the key distribution. But the key distribution through the Trust Center concentrates all traffic from the Trust Center, so it occurs a delay and an overhead. In this paper, we design a key distribution scheme for secure communication in the wireless sensor networks. It is designed to the Trust Center to Trust Center, the Trust Center to node and the node to node in the proposal scheme. Specially, the proposal scheme through a key distribution between the Trust Centers by reuse the key information improves an energy consumption and a security.
ZigBee是传感器网络的一种,它定义了信任中心的角色,通过密钥分发实现安全通信。但是通过信任中心的密钥分发集中了来自信任中心的所有流量,因此会产生延迟和开销。本文设计了一种用于无线传感器网络安全通信的密钥分配方案。提案方案设计为信任中心对信任中心、信任中心对节点、节点对节点。该方案通过重用密钥信息在信任中心之间进行密钥分发,提高了系统的能耗和安全性。
{"title":"An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks","authors":"Hyeopgeon Lee, Kyounghwan Lee, Yongtae Shin","doi":"10.1109/SAINT.2010.69","DOIUrl":"https://doi.org/10.1109/SAINT.2010.69","url":null,"abstract":"The ZigBee which is a type of the sensor networks defines a role of the Trust Center, so it securely communicates through the key distribution. But the key distribution through the Trust Center concentrates all traffic from the Trust Center, so it occurs a delay and an overhead. In this paper, we design a key distribution scheme for secure communication in the wireless sensor networks. It is designed to the Trust Center to Trust Center, the Trust Center to node and the node to node in the proposal scheme. Specially, the proposal scheme through a key distribution between the Trust Centers by reuse the key information improves an energy consumption and a security.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Electronic Money System as Substitute for Banknotes 替代纸币的电子货币系统
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.41
H. Kinoshita, Kudo Mamoru, T. Morizumi, Kazuhiro Suzuki
Electronic cash is the most fundamental element in electronic commerce. The finance administration authorities must consider controlling the flow of electronic money differently from the flow of conventional cash. The central bank coordinates the quantity of currency to be printed and coordinates money supply so that inflation does not occur. The money has three functions: information to show its value, evidence to show it is validly issued, and a symbol to show who can use it. The symbolic function is important to prevent duplicate reuse of money. We have been studying an electronic cash system using distributed database of a central bank to develop a new settlement method. In this system, the central bank issues money, and its value is not stored in users hardware such as IC cards. Money and a user are linked by public key cryptography that implements the symbolic function. In this paper, we discuss the conditions for making electronic money a substitute for banknotes. Then we propose an electronic money system with discrete logarithms. In this system, the transactions are less traceable than those in our previous study.
电子现金是电子商务中最基本的组成部分。金融管理当局必须考虑对电子货币的流动进行不同于传统现金流动的控制。中央银行协调印制的货币数量和货币供给,以避免通货膨胀。货币有三个功能:显示其价值的信息,显示其有效发行的证据,以及显示谁可以使用它的符号。符号功能对于防止货币重复使用很重要。我们一直在研究一种使用中央银行分布式数据库的电子现金系统,以开发一种新的结算方式。在这个系统中,中央银行发行货币,其价值不存储在用户的硬件中,如IC卡。货币和用户通过实现符号功能的公钥加密连接在一起。本文讨论了电子货币替代纸币的条件。然后,我们提出了一个离散对数的电子货币系统。在这个系统中,交易的可追溯性比我们之前研究的要差。
{"title":"An Electronic Money System as Substitute for Banknotes","authors":"H. Kinoshita, Kudo Mamoru, T. Morizumi, Kazuhiro Suzuki","doi":"10.1109/SAINT.2010.41","DOIUrl":"https://doi.org/10.1109/SAINT.2010.41","url":null,"abstract":"Electronic cash is the most fundamental element in electronic commerce. The finance administration authorities must consider controlling the flow of electronic money differently from the flow of conventional cash. The central bank coordinates the quantity of currency to be printed and coordinates money supply so that inflation does not occur. The money has three functions: information to show its value, evidence to show it is validly issued, and a symbol to show who can use it. The symbolic function is important to prevent duplicate reuse of money. We have been studying an electronic cash system using distributed database of a central bank to develop a new settlement method. In this system, the central bank issues money, and its value is not stored in users hardware such as IC cards. Money and a user are linked by public key cryptography that implements the symbolic function. In this paper, we discuss the conditions for making electronic money a substitute for banknotes. Then we propose an electronic money system with discrete logarithms. In this system, the transactions are less traceable than those in our previous study.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131005916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluation of B+Tree-Based Multi-dimensional Range Search Algorithm for P2P Networks 基于B+树的P2P网络多维范围搜索算法评价
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.34
Nobuhiko Matsuura, H. Mineno, N. Ishikawa, T. Mizuno
A context-aware service that uses sensing data has attracted attention, along with the development of wireless technology and sensor technology. To provide these services, the sensing data sharing system in P2P networks needs to cope with a vast amount of data. However, existing algorithms do not respond to varying the number of sensing data types. In addition, most existing algorithms cannot execute reverse key resolutions because their search algorithms need to include specific data as the key in the query. To address these issues, we propose a multi-dimensional range search algorithm in P2P networks that uses a B+tree for an efficient search with an arbitrary number of sensing data types.
随着无线技术和传感器技术的发展,利用传感数据的上下文感知服务引起了人们的关注。为了提供这些服务,P2P网络中的传感数据共享系统需要处理大量的数据。然而,现有算法不能对传感数据类型数量的变化做出响应。此外,大多数现有算法不能执行反向键解析,因为它们的搜索算法需要在查询中包含特定的数据作为键。为了解决这些问题,我们提出了一种P2P网络中的多维范围搜索算法,该算法使用B+树对任意数量的感知数据类型进行有效搜索。
{"title":"Evaluation of B+Tree-Based Multi-dimensional Range Search Algorithm for P2P Networks","authors":"Nobuhiko Matsuura, H. Mineno, N. Ishikawa, T. Mizuno","doi":"10.1109/SAINT.2010.34","DOIUrl":"https://doi.org/10.1109/SAINT.2010.34","url":null,"abstract":"A context-aware service that uses sensing data has attracted attention, along with the development of wireless technology and sensor technology. To provide these services, the sensing data sharing system in P2P networks needs to cope with a vast amount of data. However, existing algorithms do not respond to varying the number of sensing data types. In addition, most existing algorithms cannot execute reverse key resolutions because their search algorithms need to include specific data as the key in the query. To address these issues, we propose a multi-dimensional range search algorithm in P2P networks that uses a B+tree for an efficient search with an arbitrary number of sensing data types.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131866880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay 非结构化覆盖层污染内容的搜索效率和可预防性度量
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.76
Hiroaki Yamanaka, T. Fujiwara, Shingo Okamura
For P2P contents sharing, a construction method of unstructured overlay is known for improving search efficiency and preventability of downloading polluted contents. To design better construction method, we need a good metric of the two performances for overlay. Existent metrics are insufficient for measuring the two performances simultaneously in the situation where there are peers whose probabilities of providing polluted contents are diverse. In this paper, a metric of the two performances for overlay is proposed. By simulations, we confirm that proposed metric is effective in contents sharing on overlay where there are peers whose probabilities of providing polluted contents are diverse.
对于P2P内容共享,一种非结构化覆盖的构建方法可以提高搜索效率和防止下载污染内容。为了设计更好的施工方法,我们需要一个良好的指标来衡量覆盖层的两种性能。在存在提供污染内容概率不同的对等体的情况下,现有指标不足以同时衡量这两种绩效。在本文中,提出了一种用于覆盖的两种性能的度量。通过模拟,我们证实了所提出的度量在覆盖上的内容共享是有效的,其中存在提供污染内容的对等点的概率是不同的。
{"title":"A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay","authors":"Hiroaki Yamanaka, T. Fujiwara, Shingo Okamura","doi":"10.1109/SAINT.2010.76","DOIUrl":"https://doi.org/10.1109/SAINT.2010.76","url":null,"abstract":"For P2P contents sharing, a construction method of unstructured overlay is known for improving search efficiency and preventability of downloading polluted contents. To design better construction method, we need a good metric of the two performances for overlay. Existent metrics are insufficient for measuring the two performances simultaneously in the situation where there are peers whose probabilities of providing polluted contents are diverse. In this paper, a metric of the two performances for overlay is proposed. By simulations, we confirm that proposed metric is effective in contents sharing on overlay where there are peers whose probabilities of providing polluted contents are diverse.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1