2011 International Conference on Ubiquitous Computing and Multimedia Applications最新文献

筛选
英文 中文
Protecting IP-based SCADA System with Crossed-Cipher Scheme 用交叉密码保护基于ip的SCADA系统
Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim
{"title":"Protecting IP-based SCADA System with Crossed-Cipher Scheme","authors":"Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim","doi":"10.1109/UCMA.2011.35","DOIUrl":"https://doi.org/10.1109/UCMA.2011.35","url":null,"abstract":"To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SteganPEG Steganography + JPEG 隐写+ JPEG
Velagalapalli Lokeswara Reddy, Arige Subramanyam, Pakanati Chenna Reddy
{"title":"SteganPEG Steganography + JPEG","authors":"Velagalapalli Lokeswara Reddy, Arige Subramanyam, Pakanati Chenna Reddy","doi":"10.1109/UCMA.2011.17","DOIUrl":"https://doi.org/10.1109/UCMA.2011.17","url":null,"abstract":"To days internet world is full of data thieves and hackers. So, there is a need to design a system that enables the internet users to exchange their secret and private data safely across the web. Steganograhy is such a tool. It hides the user data in other kinds of data, so that no one can suspect that some sensitive data is being transferred.. Stegan PEG is an application of image steganography. It hides files in a JPEG image. This paper describes the methods used by the application in achieving its goal.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"5 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Variability Management Case Study in Software Insurance Domain 软件保险领域的可变性管理案例研究
Jeong Ah Kim
{"title":"Variability Management Case Study in Software Insurance Domain","authors":"Jeong Ah Kim","doi":"10.1109/UCMA.2011.27","DOIUrl":"https://doi.org/10.1109/UCMA.2011.27","url":null,"abstract":"Variability modeling and realization mechanism are suggested for software insurance product line what focused in domain technology features. Ontology-based modeling is applied in variability modeling for concepts, attributes, and constraints among the concepts. Ontology-based variability is modeled in XML since XML is very flexible for adding and ignoring the concepts and attributes. Ontology-based variability is realized with business rule management tools at run time. With software insurance product line, insurance company improve the quality and productivities in maintain the sales system.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121247255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag 基于人脸提取和RFID标签的实时入口认证系统
Dae-Gi Min, Jae-Woo Kim, Moon-seog Jun
{"title":"The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag","authors":"Dae-Gi Min, Jae-Woo Kim, Moon-seog Jun","doi":"10.1109/UCMA.2011.13","DOIUrl":"https://doi.org/10.1109/UCMA.2011.13","url":null,"abstract":"In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Clubbing of e-Commerce and Social Networking Sites 电子商务和社交网站的俱乐部
K. Hari, S. Rajan
{"title":"A Clubbing of e-Commerce and Social Networking Sites","authors":"K. Hari, S. Rajan","doi":"10.1109/UCMA.2011.10","DOIUrl":"https://doi.org/10.1109/UCMA.2011.10","url":null,"abstract":"There has been an enormous increase of the usability of the Social Network websites. Similarly the online purchase has amplified many folds. This paper deals with the proposal of integrating the effectiveness of Social websites along with the e-commerce portals. By this way, the social network site and e-commerce site provide a collective platform for promotion of the items and the e-commerce portal can take advantage of the existing usability features of the social networking websites. Also content related advertisements can be placed in the sites and can invoke interests among the website users. The marketing strategies may include the whiz list, informing the buyer's friends list about the purchased item of the buyer and much more.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment 传感器网络环境下基于二维阵列的传感器节点组密钥交换方案
S. Jang, Young-Gu Lee, Jeong-Jae Kim, Hoon Ko, Moon-seog Jun
{"title":"A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment","authors":"S. Jang, Young-Gu Lee, Jeong-Jae Kim, Hoon Ko, Moon-seog Jun","doi":"10.1109/UCMA.2011.12","DOIUrl":"https://doi.org/10.1109/UCMA.2011.12","url":null,"abstract":"These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"31 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120815958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Buffer Management Algorithm in Wireless Sensor Networks with Mobile Collectors 移动采集器无线传感器网络中的局部缓冲管理算法
Sungsuk Kim, S. Yang
{"title":"Local Buffer Management Algorithm in Wireless Sensor Networks with Mobile Collectors","authors":"Sungsuk Kim, S. Yang","doi":"10.1109/UCMA.2011.23","DOIUrl":"https://doi.org/10.1109/UCMA.2011.23","url":null,"abstract":"In wireless Sensor Networks(WSNs), the energy for the sensor nodes that are close to the base station will be quickly depleted due to their high data transmission activities. To address the problem, the concept of Mobile Collectors(MC) is introduced, but in spite of it, local buffer management algorithm is needed, which is our main concern in this paper. At first, each sensor only transmits its gathered data with a MC. If a raw data shows regularity two consecutive periods according to criterion, the value will be stored in a different form. To do so, local buffer is divided into two parts : Correct Data(CD) and Differential Data(DD). In this way, the data needs less storage without the loss of data accuracy. We have implemented a simulator to evaluate the efficiency of the proposed algorithm. From the results, we come to know our algorithm is fairly efficient compared with the normal form.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信