首页 > 最新文献

2008 Third International Conference on Digital Information Management最新文献

英文 中文
Addressing the vulnerability of the 4-way handshake of 802.11i 解决了802.11i的4次握手的漏洞
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746729
Songhe Zhao, C. Shoniregun, C. Imafidon
This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.
本文介绍了新一代无线局域网(WLAN)安全标准IEEE 802.11i,分析了802.1x认证和密钥管理机制,详细阐述了4次握手协议,指出了该协议的漏洞和可能受到的攻击,并结合实际情况描述了IEEE 802.11i提出的解决方案。它的局限性和仍然存在的攻击,最后提出了一种初始消息认证的解决方案。
{"title":"Addressing the vulnerability of the 4-way handshake of 802.11i","authors":"Songhe Zhao, C. Shoniregun, C. Imafidon","doi":"10.1109/ICDIM.2008.4746729","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746729","url":null,"abstract":"This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combating digital document forgery using new secure information hiding algorithm 使用新的安全信息隐藏算法打击数字文件伪造
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746807
A. Cheddad, J. Condell, K. Curran, P. Kevitt
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose a solution to this real world problem through a 1D hash algorithm coupled with 2D irFFT (irreversible fast Fourier transform) to encrypt digital documents in the 2D spatial domain. This method is described elsewhere in [1]. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. Our proposal not only points out forgery but also lets a jury or a forensics expert have access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.
最近的数字革命促进了通信、数据可移植性和实时操作。不幸的是,这带来了一些严重的安全漏洞,使数字文档处于危险之中。问题在于采用加密密码保护这些文件的安全机制;然而,这个安全屏蔽实际上并不能保护保存完好的文件。我们提出了一个解决这个现实世界问题的方法,通过1D哈希算法结合2D irFFT(不可逆快速傅立叶变换)来加密2D空间域中的数字文档。该方法在文献[1]中有描述。在此基础上,通过应用一种难以察觉的信息隐藏技术,我们可以增加一层安全层,该安全层可以抵抗噪声,并在一定程度上抑制JPEG压缩。我们通过展示从我们的一组实验中得出的一个实际例子来支持这一断言。我们的提案不仅指出了伪造,而且让陪审团或法医专家即使被篡改也能看到原始文件。这在发生争端或索赔时无疑是非常有用的。
{"title":"Combating digital document forgery using new secure information hiding algorithm","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746807","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746807","url":null,"abstract":"The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose a solution to this real world problem through a 1D hash algorithm coupled with 2D irFFT (irreversible fast Fourier transform) to encrypt digital documents in the 2D spatial domain. This method is described elsewhere in [1]. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. Our proposal not only points out forgery but also lets a jury or a forensics expert have access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A cross-layer framework for video streaming over wireless ad-hoc networks 无线自组织网络上视频流的跨层框架
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746822
Mohammad Nikoupour, A. Nikoupour, M. Dehghan
Video streaming over wireless ad-hoc networks requires appropriate routing and rate allocation mechanisms that efficiently adapt to the characteristics of such environments. The special features of ad-hoc networks also motivate us to introduce proper mechanisms in video coding, error concealment and various related areas. In this paper, we propose a framework for video streaming over wireless ad-hoc networks which utilizes the cooperation among network layers to perform the mentioned activities. We discuss the key parameters to be noticed in such a framework and explore several approaches in video streaming and rate allocation and select the suitable methods for our purpose. Focusing on the retransmission of lost video frames in response to ARQ requests, we try to minimize the delay between sending the ARQ request and receiving the lost frame, by selecting a route in which a node assists us in video streaming. Simulation results show the feasibility and the efficiency of the proposed framework.
无线自组织网络上的视频流需要适当的路由和速率分配机制,以有效地适应这种环境的特点。ad-hoc网络的特点也促使我们在视频编码、错误隐藏和各种相关领域引入适当的机制。在本文中,我们提出了一个无线自组织网络视频流的框架,该框架利用网络层之间的合作来执行上述活动。我们讨论了在这种框架中需要注意的关键参数,并探讨了视频流和速率分配的几种方法,并选择了适合我们目的的方法。为了响应ARQ请求而重传丢失的视频帧,我们尝试通过选择一个节点协助我们进行视频流传输的路由来最小化发送ARQ请求和接收丢失帧之间的延迟。仿真结果表明了该框架的可行性和有效性。
{"title":"A cross-layer framework for video streaming over wireless ad-hoc networks","authors":"Mohammad Nikoupour, A. Nikoupour, M. Dehghan","doi":"10.1109/ICDIM.2008.4746822","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746822","url":null,"abstract":"Video streaming over wireless ad-hoc networks requires appropriate routing and rate allocation mechanisms that efficiently adapt to the characteristics of such environments. The special features of ad-hoc networks also motivate us to introduce proper mechanisms in video coding, error concealment and various related areas. In this paper, we propose a framework for video streaming over wireless ad-hoc networks which utilizes the cooperation among network layers to perform the mentioned activities. We discuss the key parameters to be noticed in such a framework and explore several approaches in video streaming and rate allocation and select the suitable methods for our purpose. Focusing on the retransmission of lost video frames in response to ARQ requests, we try to minimize the delay between sending the ARQ request and receiving the lost frame, by selecting a route in which a node assists us in video streaming. Simulation results show the feasibility and the efficiency of the proposed framework.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Content-based RSS and broadcast news streams aggregation and retrieval 基于内容的RSS和广播新闻流聚合和检索
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746702
A. Messina, M. Montagnuolo
Nowadays, the global diffusion of the Internet is enabling the distribution of informative content through dynamic media such as RSS feeds and blogs. At the same time, the decreasing cost of electronic devices is increasing the pervasive availability of the same informative content in the form of digital audiovisual items. Hence, efficient and low-cost solutions for semantic aggregation of heterogeneous multimedia content are needed, in order to enable users to retrieve the desired information from this variety of channels. In this paper, we present an unsupervised framework for content-based Web newspaper articles and broadcast news stories aggregation and retrieval. The core of our system is based on a hybrid clustering algorithm that uses RSS feeds and television newscasts programmes as information sources and builds up a multimodal service made up of items including both contributions. Extensive experiments prove the effectiveness of our method.
如今,互联网在全球范围内的普及使信息内容能够通过RSS提要和博客等动态媒体进行分发。与此同时,电子设备成本的下降增加了以数字音像项目形式的同样信息内容的普遍可用性。因此,需要为异构多媒体内容的语义聚合提供高效、低成本的解决方案,使用户能够从各种渠道中检索所需的信息。在本文中,我们提出了一个基于内容的网络报纸文章和广播新闻故事聚合和检索的无监督框架。我们系统的核心是基于一种混合聚类算法,以RSS订阅和电视新闻广播节目作为信息源,并建立一个由包括这两种贡献的项目组成的多模式服务。大量的实验证明了该方法的有效性。
{"title":"Content-based RSS and broadcast news streams aggregation and retrieval","authors":"A. Messina, M. Montagnuolo","doi":"10.1109/ICDIM.2008.4746702","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746702","url":null,"abstract":"Nowadays, the global diffusion of the Internet is enabling the distribution of informative content through dynamic media such as RSS feeds and blogs. At the same time, the decreasing cost of electronic devices is increasing the pervasive availability of the same informative content in the form of digital audiovisual items. Hence, efficient and low-cost solutions for semantic aggregation of heterogeneous multimedia content are needed, in order to enable users to retrieve the desired information from this variety of channels. In this paper, we present an unsupervised framework for content-based Web newspaper articles and broadcast news stories aggregation and retrieval. The core of our system is based on a hybrid clustering algorithm that uses RSS feeds and television newscasts programmes as information sources and builds up a multimodal service made up of items including both contributions. Extensive experiments prove the effectiveness of our method.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MiRE: A Minimal Rule Engine for context-aware mobile devices 情境感知移动设备的最小规则引擎
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746772
Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim
Context-aware services have been introduced into mobile devices, such as cellular phones. Context management and rule processing are the key research issues for the resource-limited devices to have context-aware capability. In this paper, we introduce a context-aware rule processing engine, called MiRE (minimal rule engine). The engine implements the minimum cores of the conventional rule processing facilities and some special policies to achieve resource-saving and light-weight inference engine suitable for resource-limited mobile devices. MiRE, as a part of context-aware middleware system, provides a flexible architecture to adopt various context-aware applications while rules and contexts are dynamically registered at run-time. It maintains the amount of context (i.e., facts) and rules to be optimal in order to save computing resources and processing time. Its design strategy allows MiRE to be conveniently equipped into resource-limited context-aware mobile devices. The performance evaluation carried out on a context-aware cellular phone shows the intended efficiency has been well achieved.
上下文感知服务已经被引入移动设备,例如蜂窝电话。上下文管理和规则处理是资源有限的设备具有上下文感知能力的关键研究问题。在本文中,我们介绍了一个上下文感知的规则处理引擎,称为最小规则引擎(minimum rule engine)。该引擎实现了传统规则处理设施的最小核心和一些特殊策略,以实现适合资源有限的移动设备的资源节约和轻量级推理引擎。MiRE作为上下文感知中间件系统的一部分,提供了一种灵活的体系结构来采用各种上下文感知的应用程序,同时在运行时动态注册规则和上下文。它将上下文(即事实)和规则的数量保持在最佳状态,以节省计算资源和处理时间。它的设计策略允许将MiRE方便地装备到资源有限的上下文感知移动设备中。在上下文感知蜂窝电话上进行的性能评估表明,预期的效率已经很好地实现了。
{"title":"MiRE: A Minimal Rule Engine for context-aware mobile devices","authors":"Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim","doi":"10.1109/ICDIM.2008.4746772","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746772","url":null,"abstract":"Context-aware services have been introduced into mobile devices, such as cellular phones. Context management and rule processing are the key research issues for the resource-limited devices to have context-aware capability. In this paper, we introduce a context-aware rule processing engine, called MiRE (minimal rule engine). The engine implements the minimum cores of the conventional rule processing facilities and some special policies to achieve resource-saving and light-weight inference engine suitable for resource-limited mobile devices. MiRE, as a part of context-aware middleware system, provides a flexible architecture to adopt various context-aware applications while rules and contexts are dynamically registered at run-time. It maintains the amount of context (i.e., facts) and rules to be optimal in order to save computing resources and processing time. Its design strategy allows MiRE to be conveniently equipped into resource-limited context-aware mobile devices. The performance evaluation carried out on a context-aware cellular phone shows the intended efficiency has been well achieved.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Legal cognitive decision processing towards a dynamic taxonomy 走向动态分类学的法律认知决策处理
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746823
Wolfgang Kahlig
ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation are not focussed. A method for handling of complex projects is UML, the ldquoUnified Modeling Languagerdquo. This tool could be applied also for the establishing, administration and further development of a new and modern building of law.
简单的规则和规律对于理解意义和内容是必要的。正是这一要求是所有公民的基本要求。立法文书与罗马法的原则和前几个世纪的思想密切相关。现代有效的方面,如可视化、结构化、一致的逻辑连接和面向对象没有得到关注。处理复杂项目的一种方法是UML,即统一建模语言。这一工具也可用于建立、管理和进一步发展一个新的和现代的法律建筑。
{"title":"Legal cognitive decision processing towards a dynamic taxonomy","authors":"Wolfgang Kahlig","doi":"10.1109/ICDIM.2008.4746823","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746823","url":null,"abstract":"ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation are not focussed. A method for handling of complex projects is UML, the ldquoUnified Modeling Languagerdquo. This tool could be applied also for the establishing, administration and further development of a new and modern building of law.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for culture influence Virtual Learning Environments trust 文化影响虚拟学习环境信任的框架研究
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746777
Samson Omosule, C. Shoniregun, D. Preston
Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that constitute students trust factors are found to vary across cultures with regards to their respective parametric values.
虚拟学习环境中的信任问题是虚拟学习环境提供者没有足够数量的学生参与这些环境的主要问题。本研究提出了一个框架来解释不同文化的虚拟学习环境中构成学生信任的因素。研究发现,构成学生信任因素的变量因其各自的参数值而在不同文化中有所不同。
{"title":"A framework for culture influence Virtual Learning Environments trust","authors":"Samson Omosule, C. Shoniregun, D. Preston","doi":"10.1109/ICDIM.2008.4746777","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746777","url":null,"abstract":"Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that constitute students trust factors are found to vary across cultures with regards to their respective parametric values.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Geo-information quality assurance in disaster management 灾害管理中的地理信息质量保证
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746727
Ying Su, Jie Peng, Zhanming Jin
Disaster management depends on large volumes of comprehensive, accurate, relevant, on-time geo-information that various organizations systematically create and maintain. One cannot assure geo-information quality (G-IQ) without first being able to measure it meaningfully and establishing a causal connection between the source of G-IQ change, the G-IQ problem types, the types of activities affected, and their implications. In this article we propose a G-IQ assurance framework. In contrast to context-specific IQ assurance models, which usually focus on a few variables determined by local needs, our framework consists of comprehensive typologies of IQ problems, related activities, and a taxonomy of IQ dimensions organized in a systematic way based on semiotic theories and practices. The framework can be used as a knowledge resource and as a guide for developing G-IQ measurement models for many geo-information technologies which can offer a variety of opportunities to aid management and recovery in the aftermath of disasters. The framework was validated and refined by enhancing G-IQ generated by remote sensing through the technologies of photogrammetry.
灾害管理依赖于各种组织系统地创建和维护的大量全面、准确、相关和及时的地理信息。如果不能首先对地理信息质量进行有意义的测量,并在地理信息质量变化的来源、地理信息质量问题类型、受影响的活动类型及其影响之间建立因果关系,就不能保证地理信息质量(G-IQ)。在本文中,我们提出了一个G-IQ保证框架。与上下文特定的智商保证模型(通常关注由局部需求决定的几个变量)相比,我们的框架包括智商问题的综合类型学、相关活动和基于符号学理论和实践的系统方式组织的智商维度分类。该框架可作为一种知识资源,并作为为许多地理信息技术开发G-IQ测量模型的指南,这些技术可为灾后管理和恢复提供各种机会。通过摄影测量技术增强遥感生成的G-IQ,对该框架进行了验证和完善。
{"title":"Geo-information quality assurance in disaster management","authors":"Ying Su, Jie Peng, Zhanming Jin","doi":"10.1109/ICDIM.2008.4746727","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746727","url":null,"abstract":"Disaster management depends on large volumes of comprehensive, accurate, relevant, on-time geo-information that various organizations systematically create and maintain. One cannot assure geo-information quality (G-IQ) without first being able to measure it meaningfully and establishing a causal connection between the source of G-IQ change, the G-IQ problem types, the types of activities affected, and their implications. In this article we propose a G-IQ assurance framework. In contrast to context-specific IQ assurance models, which usually focus on a few variables determined by local needs, our framework consists of comprehensive typologies of IQ problems, related activities, and a taxonomy of IQ dimensions organized in a systematic way based on semiotic theories and practices. The framework can be used as a knowledge resource and as a guide for developing G-IQ measurement models for many geo-information technologies which can offer a variety of opportunities to aid management and recovery in the aftermath of disasters. The framework was validated and refined by enhancing G-IQ generated by remote sensing through the technologies of photogrammetry.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ubiquitous computing and android 普适计算和android
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746751
Zohaib Hassan
This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements. It also highlights how Android fulfills the subject requirements and considerations.
本文讨论了泛在系统的特性,并揭示了此类系统的软件需求。我们的研究表明,所有无处不在的应用程序背后的主要原则是为用户提供智能学习系统,以补充他们的日常活动。这是评估无处不在的应用程序的主要考虑因素。本文还针对普遍存在的系统需求,讨论了Android操作系统的各种特性。它还强调了Android如何满足主题要求和注意事项。
{"title":"Ubiquitous computing and android","authors":"Zohaib Hassan","doi":"10.1109/ICDIM.2008.4746751","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746751","url":null,"abstract":"This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements. It also highlights how Android fulfills the subject requirements and considerations.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The softphone security 软件电话安全
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746763
Dannan Lin, C. Shoniregun, G. Akmayeva
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.
本研究的目的是确定在融合网络上从事数据交换过程的基于软件的VoIP(互联网语音协议)背景下的关键安全问题。VoIP安全没有单一的解决方案;这完全取决于客户的类型、现有的it环境和运营商。为了缩小对象范围,将把重点放在中小企业上。”本文着重分析了软电话与硬电话的主要异同,分析了VoIP安全协议,提出了软电话安全模型。
{"title":"The softphone security","authors":"Dannan Lin, C. Shoniregun, G. Akmayeva","doi":"10.1109/ICDIM.2008.4746763","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746763","url":null,"abstract":"The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2008 Third International Conference on Digital Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1