Zhen Yu, Ilesanmi Olade, Hai-Ning Liang, Charles Fleming
{"title":"Usable Authentication Mechanisms for Mobile Devices: An Exploration of 3D Graphical Passwords","authors":"Zhen Yu, Ilesanmi Olade, Hai-Ning Liang, Charles Fleming","doi":"10.1109/PLATCON.2016.7456837","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456837","url":null,"abstract":"Current authentication systems in mobile devices such as smart phones have many shortcomings. Users tend to use simple textual passwords such as PINs, which are easily cracked by intruders. Meanwhile, graphical passwords suffer from shoulder surfing attack. In this paper, a new authentication system using 3D graphical passwords, will be proposed and tested to offer more security for mobile devices. This authentication system allows users to interact with the 3D objects in a 3D virtual environment and these actions are tracked in the virtual environment and used to create unique passwords. Based on the previous studies of the 3D password scheme, this paper developed a simple testing program that enables users to create their own 3D password easily. At the end of the paper, some improvements of the program and this authentication system are discussed.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Use Case Point (UCP) Based on Function Point (FP) Mechanism","authors":"B. Park, S. Moon, R. Kim","doi":"10.1109/PLATCON.2016.7456803","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456803","url":null,"abstract":"The cost of error correction has been increasing exponentially with the advancement of software industry. To minimize software errors, it is necessary to extract accurate requirements in the early stage of software development. In the previous study, we extracted the priorities of requirements based on the Use Case Point (UCP), which however revealed the issues inherent to the existing UCP as follows. (i) The UCP failed to specify the structure of use cases or the method of write the use cases, and (ii) the number of transactions determined the use case weight in the UCP. Yet, efforts taken for implementation depend on the types and number of operations performed in each transaction. To address these issues, the present paper proposes an improved UCP and applies it to the prioritization. The proposed method enables more accurate measurement than the existing UCP-based prioritization.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"103 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Generation Method of State Transition Mapping Tree","authors":"Je-Ho Park, Y. B. Park, Soo-Kyung Choi","doi":"10.1109/PLATCON.2016.7456784","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456784","url":null,"abstract":"Utilizing state diagram based techniques, state-transition based testing is being widely applied to software testing for the detection of software defects. The state diagrams that includes high complex design and processing can enhance the productive and positive application of state diagrams in the area of software system development. However, many traditional methods for automatic software analysis applying state diagrams practically did not try resolve the complexity problem. In addition, the state diagrams generated by the methods for the resolution of complex problems might produce inappropriate test cases because of misled guidelines or different objectives. In this paper, we study the methods for the resolution of the complex problems without the modification of the states or the transition relationships in the used state diagrams. Mainly we are going to focus over the techniques for automatic generation methods for state transition mapping tree.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Transcursive Algorithm for Depth Estimation in Deep Learning Networks","authors":"Uthra Kunathur Thikshaja, Anand Paul, Seungmin Rho, Deblina Bhattacharjee","doi":"10.1109/PLATCON.2016.7456783","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456783","url":null,"abstract":"Estimation of depth in a Neural Network (NN) or Artificial Neural Network (ANN) is an integral as well as complicated process. In this article, we propose a way of using the transformation of functions combined with recursive nature to have an adaptive, transcursive algorithm to represent the backpropagation concept used in deep learning for a Multilayer Perceptron Network. Each function can be used to represent a hidden layer used in the neural network and they can be made to handle a complex part of the processing. Whenever an undesirable output occurs, we transform (modify) the functions until a desirable output is obtained. We have an algorithm that uses the transcursive model to create an interpretation of the concept of deep learning using multilayer perceptron network (MPN).","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twister Platform for MapReduce Applications on a Docker Container","authors":"Yunhee Kang, R. Kim","doi":"10.1109/PLATCON.2016.7456834","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456834","url":null,"abstract":"Docker is one of ways to provide more light-weight for agile computing resource based on container technique to handle this problem. For this work we have chosen this specific tool due to the increasing popularity of MapReduce and cloud container technologies such as Docker. This paper aims at automatically configuring Twister workloads for container-driven clouds. Basically this is the first attempt towards automatic configuration of Twister jobs on container-based cloud platform for many workloads.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography","authors":"Amjad Ali Alamr, F. Kausar, Jong Sung Kim","doi":"10.1109/PLATCON.2016.7456822","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456822","url":null,"abstract":"In recent times, radio frequency identification-based systems are one of the most widely spread applications for tagging and keep tracking purposes. This is due to their powerful features compared to their counterparts of similar techniques such as barcodes. In contrast, radio frequency identification systems suffer from various attacks and security threats. The wireless channel used for communication is responsible for the majority of these vulnerabilities. In this paper, we propose a new radio frequency identification authentication protocol based on elliptic curve cryptography (ECC) in order to eliminate these vulnerabilities. In addition, we use elliptic curve Diffie-Hellman (ECDH) key agreement protocol to generate a temporary shared key used to encrypt the later transmitted messages. Our protocol achieves a set of security properties likes mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Response of Identity Theft within a Company Utilizing Location Information","authors":"Yucheol Cho, Sangjin Lee","doi":"10.1109/PLATCON.2016.7456790","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456790","url":null,"abstract":"Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Implementations of SIMON and SPECK","authors":"Taehwan Park, Hwajeong Seo, Howon Kim","doi":"10.1109/PLATCON.2016.7456813","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456813","url":null,"abstract":"In these day, demands of light-weight block cipher algorithm which can support various platform, architecture and block/key size efficiently have been increasing. The N.S.A (National Security Agency) proposed SIMON and SPECK block ciphers in 2013. SIMON and SPECK support various block size such as 16, 32, 64-bit and key size such as 64, 96, 128, and so on. There are also a lot of researches on implementation of SIMON and SPECK block cipher on various platform and architecture such as on ASIC, AVR(8-bit), MSP430(16-bit), ARM(32-bit), and Intel core. We propose efficient ARM-NEON implementation, optimization methods and implementation results of SIMON and SPECK block cipher by using ARM- NEON SIMD techniques. With these methods, we enhance performance of SIMON and SPECK by 30.3 and 68.9%, compared to previous results respectively.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security through Authentication Infrastructure in Open Maritime Cloud","authors":"Donghyeok Lee, Namje Park","doi":"10.1109/PLATCON.2016.7456823","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456823","url":null,"abstract":"The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, as requested by the IMO e-navigation strategy, and as derived from testbeds focused on e-navigation. This paper proposes a lightweight user authentication protocol where the MQTT(Message Queue Telemetry Transport) type protocol registers unique topic values from the user to send the value to a server through the QoS(Quality of Service) 2 method and lightweight usage information measurement protocol where the transmission of usage information for communication service measurement consumes less mobile device resources.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126054917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effectiveness of Cultural Inclusive Health Education Pedagogy for Taiwan Indigenous Elementary Students through E-Platform: An Case in Tayal, Paiwan and Bunun Tribes","authors":"Kuoyuan Hwa, Kai-Lung Wang","doi":"10.1109/PLATCON.2016.7456830","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456830","url":null,"abstract":"The main purpose of our research is to investigate the outcome and impact of the new e-platform program, the Taiwan Indigenous Culture Inclusive Health Science Education Program for the 5th grade elementary students. The materials of course were developed based on two core knowledge systems: the first one was from the \"empirical science\" which examines indigenous traditional knowledge and combines it with modern evidence-based scientific knowledge. We have analyzed the effectiveness of the new course with three tribal indigenous groups of Taiwanese, Tayal, Paiwan, Bunun. To probe into the indigenous students' learning attitude, learning knowledges and learning behavior. In our research, the quasi-experimental survey method, included a pre-, post- tests were used with one experimental group and a control one. The data from the survey was analyzed by SPSS for Windows 10.0 version and t-test analyses were performed. The study results are as follows: 1) There are significant differences between the two groups in knowledge learning and enhancing outcome in acquiring health science knowledge among three-tribe experimental groups 2) The results in acquiring healthy attitude and behavior were vary difference since the program only last for 8 weeks. A longer program might be more effective.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}