首页 > 最新文献

2015 International Conference on Computer Application Technologies最新文献

英文 中文
Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services 基于NFC的公共Wi-Fi用户帐号发放系统的实现
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.36
Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki
For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication information is performed as man-in-the-middle attack during message exchange process for authentication. In Near-Field Communication(NFC), it is hard for adversary to get between communicators. In this paper, to achieve a user account provisioning of public Wi-Fi services based on NFC, we propose a secure system for both service providers and users.
为了确保公共Wi-Fi服务的安全使用,服务供应商和用户之间需要相互认证。但是,由于提供用户帐户以实现相互认证的成本很高,因此在许多服务中,认证级别被抑制得很低。在本研究中,我们的目标是降低这一成本。用户帐户配置中的一个问题是,在身份验证的消息交换过程中,身份验证信息的窃取或交换被作为中间人攻击来执行。在近场通信(NFC)中,攻击者很难进入通信器之间。在本文中,为了实现基于NFC的公共Wi-Fi服务的用户帐户发放,我们提出了一个服务提供商和用户的安全系统。
{"title":"Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services","authors":"Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki","doi":"10.1109/CCATS.2015.36","DOIUrl":"https://doi.org/10.1109/CCATS.2015.36","url":null,"abstract":"For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication information is performed as man-in-the-middle attack during message exchange process for authentication. In Near-Field Communication(NFC), it is hard for adversary to get between communicators. In this paper, to achieve a user account provisioning of public Wi-Fi services based on NFC, we propose a secure system for both service providers and users.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating the Location of Individual Stem Using LiDAR Imagery 利用激光雷达图像估计单个茎的位置
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.48
K. Kimura, Shitaro Goto
For REDD+ (Reduction of Emission from Deforestation and forest Degradation) and the Kyoto Protocol, the methodology for a wide range in a short time forest measurement, high-resolution measurement, LiDAR (Lightning Detection and Ranging) will be a powerful tool. In this study, the interpolation method, low-pass filtering, Local Maximum Filter method, and Watershed method were used to estimate the individual stem. Following the comparison of the estimation result of individual stem using LiDAR vs the measured values, the result of accuracy evaluation is 93%.
对于REDD+(减少毁林和森林退化造成的排放)和京都议定书,在短时间内进行大范围森林测量的方法、高分辨率测量、激光雷达(闪电探测和测距)将是一个强大的工具。在本研究中,采用插值法、低通滤波法、局部最大值滤波法和分水岭法对单个茎进行估计。将激光雷达对单个茎的估计结果与实测值进行比较,精度评价结果为93%。
{"title":"Estimating the Location of Individual Stem Using LiDAR Imagery","authors":"K. Kimura, Shitaro Goto","doi":"10.1109/CCATS.2015.48","DOIUrl":"https://doi.org/10.1109/CCATS.2015.48","url":null,"abstract":"For REDD+ (Reduction of Emission from Deforestation and forest Degradation) and the Kyoto Protocol, the methodology for a wide range in a short time forest measurement, high-resolution measurement, LiDAR (Lightning Detection and Ranging) will be a powerful tool. In this study, the interpolation method, low-pass filtering, Local Maximum Filter method, and Watershed method were used to estimate the individual stem. Following the comparison of the estimation result of individual stem using LiDAR vs the measured values, the result of accuracy evaluation is 93%.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding 利用ICT的新商业模式研究:众筹的现状与挑战
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.51
T. Saisho
In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing in such companies is crowdfunding. In this paper, as a new business model that leverages the ICT, it was discussed realities and challenges of crowdfunding.
在信息社会中,利用信息通信技术(ICT),部署一种新的商业模式已经成为可能。在利用信息通信技术进行金融业务时,公司的资金来源不再是银行和证券公司等传统金融机构,而是可以从个人或一般公众那里筹集资金。这类公司的一种新的融资形式是众筹。本文讨论了众筹作为一种利用信息通信技术的新型商业模式所面临的现实和挑战。
{"title":"A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding","authors":"T. Saisho","doi":"10.1109/CCATS.2015.51","DOIUrl":"https://doi.org/10.1109/CCATS.2015.51","url":null,"abstract":"In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing in such companies is crowdfunding. In this paper, as a new business model that leverages the ICT, it was discussed realities and challenges of crowdfunding.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Production of Spinal Cord Injury Model Using a Cartesian Robot 用直角机器人制作脊髓损伤模型
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.43
Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun
One of the most important aspects for producing experimental animals is the reproducibility. We simulated the functional aspect of our device by using electric cylinder and a Cartesian coordinate robot. In the experiment to analyze the results, we could control the power amount using impactor to produce models we want, which means the suitability and reproducibility to produce experimental animals can be high.
生产实验动物最重要的一个方面是可重复性。我们用电动气缸和直角坐标机器人模拟了我们的装置的功能。在实验分析结果时,我们可以控制使用冲击器产生我们想要的模型的功率,这意味着产生实验动物的适用性和可重复性可以很高。
{"title":"Production of Spinal Cord Injury Model Using a Cartesian Robot","authors":"Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun","doi":"10.1109/CCATS.2015.43","DOIUrl":"https://doi.org/10.1109/CCATS.2015.43","url":null,"abstract":"One of the most important aspects for producing experimental animals is the reproducibility. We simulated the functional aspect of our device by using electric cylinder and a Cartesian coordinate robot. In the experiment to analyze the results, we could control the power amount using impactor to produce models we want, which means the suitability and reproducibility to produce experimental animals can be high.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examination of Transformation Technique from Real World to ANIME World 从现实世界到动漫世界的转换技术考察
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.40
Satoshi Cho, Hisashi Sato
This paper presents the results of transformation technique from real world to animation world. The animation rarely just adopts real information. In many cases, a creator converts it into a form suitable for an animation. We examined the cause about transformation of information from the real world to the animation world in a past study. Approach of the existing transformation: Approach to apply the expression of the animation to a video, Approach to transform real movement data into data for animations, Approach to transform real model data to the model data for animations. From these approaches, we examined a transformation method. By these approaches, I concluded that the exaggeration of the characteristic was an important element. We converted real information into a form suitable for an animation under the condition and concluded that I could use it. The condition is a judgment and the choice of the characteristic.
本文介绍了从现实世界到动画世界的转换技术的成果。动画很少采用真实的信息。在许多情况下,创作者将其转换为适合动画的形式。在过去的研究中,我们考察了信息从现实世界向动画世界转化的原因。现有转换的方法:将动画的表达式应用于视频的方法,将真实的运动数据转换为动画数据的方法,将真实的模型数据转换为动画模型数据的方法。从这些方法中,我们研究了一种转换方法。通过这些方法,我得出结论,特征的夸张是一个重要因素。在这种情况下,我们将真实的信息转换成适合动画的形式,并认为我可以使用它。条件是对特征的一种判断和选择。
{"title":"Examination of Transformation Technique from Real World to ANIME World","authors":"Satoshi Cho, Hisashi Sato","doi":"10.1109/CCATS.2015.40","DOIUrl":"https://doi.org/10.1109/CCATS.2015.40","url":null,"abstract":"This paper presents the results of transformation technique from real world to animation world. The animation rarely just adopts real information. In many cases, a creator converts it into a form suitable for an animation. We examined the cause about transformation of information from the real world to the animation world in a past study. Approach of the existing transformation: Approach to apply the expression of the animation to a video, Approach to transform real movement data into data for animations, Approach to transform real model data to the model data for animations. From these approaches, we examined a transformation method. By these approaches, I concluded that the exaggeration of the characteristic was an important element. We converted real information into a form suitable for an animation under the condition and concluded that I could use it. The condition is a judgment and the choice of the characteristic.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Astronomical Image Data Analysis in the Cloud 云中的天文图像数据分析
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.19
F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya
Earth sciences and space exploration instrument sensors are getting improved with each iteration providing us with bigger and more detailed sets of data. Though current available archiving and processing mechanisms are able to cope with current rates, forecasted enormous rates of data to be transmitted on a daily basis by each of the different instruments to be available on the near future make imperative to design mechanisms to handle, process, archive and search through the datasets as well as tools that lead to efficient data triage.
地球科学和空间探测仪器传感器的每一次迭代都在不断改进,为我们提供了更大、更详细的数据集。虽然目前可用的归档和处理机制能够应付当前的速率,但预计在不久的将来,每一种不同的仪器每天都会传输大量的数据,因此必须设计处理、处理、归档和搜索数据集的机制,以及导致有效数据分类的工具。
{"title":"Astronomical Image Data Analysis in the Cloud","authors":"F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya","doi":"10.1109/CCATS.2015.19","DOIUrl":"https://doi.org/10.1109/CCATS.2015.19","url":null,"abstract":"Earth sciences and space exploration instrument sensors are getting improved with each iteration providing us with bigger and more detailed sets of data. Though current available archiving and processing mechanisms are able to cope with current rates, forecasted enormous rates of data to be transmitted on a daily basis by each of the different instruments to be available on the near future make imperative to design mechanisms to handle, process, archive and search through the datasets as well as tools that lead to efficient data triage.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Near and Far Infrared Vision for Biometric Applications 近、远红外视觉在生物识别中的应用比较
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.17
Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen
In this paper, we provide the idea of analyzing the infrared vein patterns in the back of the hand combined with the appendant optical picture of the back of the hand for biometric purposes. We present results of an experiment which will demonstrate differences between near infrared and far infrared images as initial images for creating templates for biometrical purposes. Near infrared images offer a good quality for extracting hand veins on the one hand but contain no thermographic information as far infrared images do. The idea of this paper is to make counterfeit more difficult by using the infrared image with thermographic information and the appendant optical image with spatial information. That is why only far infrared images are useable in this case. This Paper will show a possibility to create a biometrical template based on far infrared images.
在本文中,我们提出了分析手背的红外静脉模式与手背的附属光学图像相结合的生物识别目的的想法。我们提出了一个实验的结果,这将证明近红外和远红外图像之间的差异,作为创建用于生物识别目的的模板的初始图像。近红外图像一方面提供了较好的手部静脉提取质量,但不像远红外图像那样包含热成像信息。本文的思想是利用具有热成像信息的红外图像和具有空间信息的附加光学图像来增加伪造的难度。这就是为什么在这种情况下只有远红外图像可用。本文将展示一种基于远红外图像创建生物特征模板的可能性。
{"title":"Comparison of Near and Far Infrared Vision for Biometric Applications","authors":"Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen","doi":"10.1109/CCATS.2015.17","DOIUrl":"https://doi.org/10.1109/CCATS.2015.17","url":null,"abstract":"In this paper, we provide the idea of analyzing the infrared vein patterns in the back of the hand combined with the appendant optical picture of the back of the hand for biometric purposes. We present results of an experiment which will demonstrate differences between near infrared and far infrared images as initial images for creating templates for biometrical purposes. Near infrared images offer a good quality for extracting hand veins on the one hand but contain no thermographic information as far infrared images do. The idea of this paper is to make counterfeit more difficult by using the infrared image with thermographic information and the appendant optical image with spatial information. That is why only far infrared images are useable in this case. This Paper will show a possibility to create a biometrical template based on far infrared images.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Ordering Problem for Juggling 杂耍的最优排序问题
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.45
Yusuke Sato, Satoshi Takahashi
The juggling is a one of physical skills involving the manipulation of objects for recreation, entertainment, art, or sport. In our research, we focus on the toss juggling. Our research is a mathematical modeling for optimal ordering for toss juggling.
杂耍是一种身体技能,涉及到娱乐、艺术或运动中对物体的操纵。在我们的研究中,我们主要关注抛掷杂耍。我们的研究是一个掷球杂耍最优排序的数学模型。
{"title":"An Optimal Ordering Problem for Juggling","authors":"Yusuke Sato, Satoshi Takahashi","doi":"10.1109/CCATS.2015.45","DOIUrl":"https://doi.org/10.1109/CCATS.2015.45","url":null,"abstract":"The juggling is a one of physical skills involving the manipulation of objects for recreation, entertainment, art, or sport. In our research, we focus on the toss juggling. Our research is a mathematical modeling for optimal ordering for toss juggling.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consideration about the Preservation Method in the Log Files 关于日志文件保存方法的考虑
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.12
Takashi Sakuma
In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.
在许多实际应用程序中,敏感信息必须保存在不受信任的计算机上的日志文件中。如果攻击者捕获了这台机器,那么应该保证从日志文件中获取很少或没有信息,并限制破坏日志文件的能力。Bruce Schneier和John Kelsey提出了一个安全的存储系统。本安全存储系统对终端的接管欺诈行为的容忍度是不能保证的,记录了终端的数据交换和操作,后期的保护为了能够对其进行审计和保证,我们提出了一些应该如何进行日志记录的措施方法。揭示了该系统在安全存储中的有效性和优缺点。
{"title":"Consideration about the Preservation Method in the Log Files","authors":"Takashi Sakuma","doi":"10.1109/CCATS.2015.12","DOIUrl":"https://doi.org/10.1109/CCATS.2015.12","url":null,"abstract":"In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Wifi Services Based on the IEEE802.11u Standard 基于IEEE802.11u标准的Wifi业务集成
Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.39
H. Yamaki, Yuki Yamada, Yuichi Kato, Eiko Kobayashi, Yu Saotome, Daisuke Matsumoto
This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual access points which is normal solution, a larger number of services can be integrated into an access point without degrading the performance of network access services. The method, the implementation a prototype system and the result of performance test are described.
本文提出了一种将多个Wifi服务集成到单个硬件接入点中的新技术。这是通过将IEEE 802.11u标准中定义的服务发布机制与企业级网络中使用的动态VLAN分配相结合来实现的,两者都是用于身份验证技术,以实现对基于ip的网络的安全灵活的访问。相对于一般的虚拟接入点解决方案,可以将更多的业务集成到一个接入点中,而不会降低网络接入业务的性能。介绍了该方法、样机系统的实现和性能测试结果。
{"title":"Integration of Wifi Services Based on the IEEE802.11u Standard","authors":"H. Yamaki, Yuki Yamada, Yuichi Kato, Eiko Kobayashi, Yu Saotome, Daisuke Matsumoto","doi":"10.1109/CCATS.2015.39","DOIUrl":"https://doi.org/10.1109/CCATS.2015.39","url":null,"abstract":"This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual access points which is normal solution, a larger number of services can be integrated into an access point without degrading the performance of network access services. The method, the implementation a prototype system and the result of performance test are described.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 International Conference on Computer Application Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1