2015 World Symposium on Computer Networks and Information Security (WSCNIS)最新文献

筛选
英文 中文
Reducing complexity of WCIP and improving accuracy of A_WCIP by fast adaptive algorithms 采用快速自适应算法降低WCIP的复杂度,提高A_WCIP的精度
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368296
Marwa Guebli, N. Hamdi, H. Hrizi, N. Sboui
{"title":"Reducing complexity of WCIP and improving accuracy of A_WCIP by fast adaptive algorithms","authors":"Marwa Guebli, N. Hamdi, H. Hrizi, N. Sboui","doi":"10.1109/WSCNIS.2015.7368296","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368296","url":null,"abstract":"The wave concept iterative procedure is very efficient numerical method for the electromagnetic modeling in high frequency domain. But, the numerical complexity of the iterative method in modeling complexes structures and a large number of iterations to converge to the optimal result is a very interesting problem to study. For this reason, In this paper we will implement a different adaptive algorithms to assess the most efficient algorithm to reduce the numerical complexity of the iterative method, and improve the accuracy of adaptive iterative method and the computing time to converge to an optimal result.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable extension of the high efficiency video coding SHEVC performance study 可扩展高效视频编码的SHEVC性能研究
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368285
Ibtissem Wali, A. Kessentini, Mohamed Ali Ben Ayed, N. Masmoudi
{"title":"Scalable extension of the high efficiency video coding SHEVC performance study","authors":"Ibtissem Wali, A. Kessentini, Mohamed Ali Ben Ayed, N. Masmoudi","doi":"10.1109/WSCNIS.2015.7368285","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368285","url":null,"abstract":"Scalable High Efficiency Video Coding (SHVC) is the extension of the High Efficiency Video Coding (HEVC). This standard is developed to ameliorate the coding efficiency for the spatial and quality scalability. In this paper, we investigate a survey for SHVC extension. We describe also its types and explain the different additional coding tools that further improve the Enhancement Layer (EL) coding efficiency. Furthermore, we assess through experimental results the performance of the SHVC for different coding configurations. The effectiveness of the SHVC was demonstrated, using two layers, by comparing its coding adequacy compared to simulcast configuration and HEVC for enhancement layer using HM16 for several test sequences and coding conditions.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloudification and security implications of TaaS TaaS的云化和安全含义
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368308
Mehrnoosh Monshizadeh, Zheng Yan, Leo Hippelainen, Vikramajeet Khatri
{"title":"Cloudification and security implications of TaaS","authors":"Mehrnoosh Monshizadeh, Zheng Yan, Leo Hippelainen, Vikramajeet Khatri","doi":"10.1109/WSCNIS.2015.7368308","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368308","url":null,"abstract":"Cloud computing has got attention of telecommunications operators as a potential cost saver, because it enables sharing computing resources within network infrastructure and between operators. The concept of Telecommunications network as a Service (TaaS) has been proposed as a renovation direction of mobile operators. However, information security which is one of the major challenges of the cloud computing should be seriously investigated and discussed in order to realize TaaS in practice. For this purpose, we review new threats introduced by TaaS and discuss prevention mechanisms to resist them. Based on the cloud deployment model, we further propose a security framework, \"Cloud Security Framework for Operators (CSFO)\" in order to support TaaS. We also go through open research issues about security related to TaaS and propose future research focus.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114269855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
FPGA based implementation of elliptic curve cryptography 基于FPGA的椭圆曲线密码的实现
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368282
M. Nawari, Hazim Ahmed, A. Hamid, Mohamed Elkhidir
{"title":"FPGA based implementation of elliptic curve cryptography","authors":"M. Nawari, Hazim Ahmed, A. Hamid, Mohamed Elkhidir","doi":"10.1109/WSCNIS.2015.7368282","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368282","url":null,"abstract":"Elliptic curve cryptography is a public key cryptography technique based on the algebraic structure of elliptic curves over finite fields. It provides the same level of security that other alternatives provide, but it performs its process in less time, less memory, less computations and less power consumption. Thus it is suitable for environments with constraints like computing power, memory and battery life. Typical examples of such environments are: embedded devices, wireless devices and real time applications. On the other hand, FPGA is considered as the modern-day technology for building prototypes where the chip can be configured by the end user to realize different designs by programming logic blocks and interconnects. The hardware implementation of elliptic curve cryptography using FPGA enhances the system performance since FPGA technology is faster by nature and much more secure than software implementations. This paper presents an elliptic curve cryptosystem developed by programming Spartan 3E FPGA kit then tested by implementing Elgamal encryption scheme on it.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimal service selection in Ad-Hoc mobile market based on multi-dynamic decision algorithms 基于多动态决策算法的Ad-Hoc移动市场最优服务选择
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368303
A. T. Akinola, M. Adigun, A. Akingbesote, I. Mba
{"title":"Optimal service selection in Ad-Hoc mobile market based on multi-dynamic decision algorithms","authors":"A. T. Akinola, M. Adigun, A. Akingbesote, I. Mba","doi":"10.1109/WSCNIS.2015.7368303","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368303","url":null,"abstract":"The ad-hoc mobile markets are increasing daily with providers and consumers ready to participate in these markets. Issues like service discovery and selection are major challenges in these markets. As these markets grow, researchers are working on discovery while little is done on selection. Most scholars have developed different selection mechanisms considering only consumer's quality of service. As members increase and most services are offering the same functionality, one major challenge is when the numbers of producers that meet that requirement are more than one. This is because, in certain operations, time is precious and the selection must be as fast as possible for example, in emergency situation. To tackle this, we propose Multi-Dynamic Decision algorithms as a solution approach. We consider a typical M-Health scenario in our GUISET project. We use the Multi-Criteria Decision (MCD) for selection purpose and the Dynamic Programming to search for the optimal route when there are tie in services. We use hypothetical data to run this experiment by considering 15 sub-locations under the M-health scenario. Our results prove to have a better performance on time based on the shortest route. This research will be useful in a time critical situations like the M-health.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130904916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Management of utilization and accuracy of positioning approaches in wireless sensor networks 无线传感器网络中定位方法的利用和精度管理
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368288
M. Safavi, M. Shafieian
{"title":"Management of utilization and accuracy of positioning approaches in wireless sensor networks","authors":"M. Safavi, M. Shafieian","doi":"10.1109/WSCNIS.2015.7368288","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368288","url":null,"abstract":"Wireless sensor networks (WSNs) are one of the most interesting research areas in networking and also in real world applications nowadays. These networks are used for gathering information, so they have a close relationship to the physical phenomena in their environment. In order to provide an accurate view of the observed sensor field, it is necessary to associate gathered information to the location of sensor nodes. Moreover, tracking certain objects for monitoring applications also necessitates location information of sensor nodes which is being incorporated into the tracking algorithms. Furthermore, geographical routing protocols, which provide scalability and localized decisions for multi-hop communication, require the locations of the nodes to be known. These requirements motivate the development of efficient localization protocols for WSNs. In this paper, we study two fundamental approaches for positioning, which are trilateration and multilateration techniques. The goal is to evaluate the effect of number of anchor nodes on the accuracy and probability of successful positioning. These parameters have not been studied by others, yet. Simulation results show that multilateration technique has better performance than trilateration technique, in our proposed scenarios.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach of data sanitization by noise addition and knowledge discovery by clustering 一种基于噪声添加的数据净化和基于聚类的知识发现方法
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368283
H. Abdullah, Ahsan Siddiqi, Fuad Bajaber
{"title":"A novel approach of data sanitization by noise addition and knowledge discovery by clustering","authors":"H. Abdullah, Ahsan Siddiqi, Fuad Bajaber","doi":"10.1109/WSCNIS.2015.7368283","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368283","url":null,"abstract":"Security of published data cannot be less important as compared to unpublished data or the data which is not made public. Therefore, PII (Personally Identifiable Information) is removed and data sanitized when organizations recording large volumes of data publish that data. However, this approach of ensuring data privacy and security can result in loss of utility of that published data for knowledge discovery. Therefore, a balance is required between privacy and the utility needs of published data. In this paper we study this delicate balance by evaluating four data mining clustering techniques for knowledge discovery and propose two privacy/utility quantification parameters. We subsequently perform number of experiments to statistically identify which clustering technique is best suited with desirable level of privacy/utility while noise is incrementally increased by simultaneously degrading data accuracy, completeness and consistency.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incorporating SHA-2 256 with OFB to realize a novel encryption method 将sha - 2256与OFB结合,实现了一种新的加密方法
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368295
Raaed K. Ibrahim, Roula A. J. Kadhim, Ali S. H. Alkhalid
{"title":"Incorporating SHA-2 256 with OFB to realize a novel encryption method","authors":"Raaed K. Ibrahim, Roula A. J. Kadhim, Ali S. H. Alkhalid","doi":"10.1109/WSCNIS.2015.7368295","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368295","url":null,"abstract":"The SHA-2 hash function is used in many fields of security system such as digital signature, tamper detection, password protection and so on. SHA-2 is very important algorithm for integrity and authentication realization, SHA-2 is a one way algorithm to produce hash code of any message with 256 random hash bits (that's according to the version of SHA-2), which cannot be reversible, this property makes the hash function in general susceptible to breaking, and also the limitation of number of bits makes a probability of collision incidence. So, the hash code's merged with a kind of cryptography which is the stream cipher. The stream cipher mode of operation named Output Feedback (OFB) method combined with SHA-2 256 algorithm to produce encrypted hash code that can be reversible to achieve confidentiality. Implementation and simulation results of OFB based on SHA-2 256 algorithm obtained in LabVIEW project shows simplicity in modelling hash function algorithm generating hash codes encrypted by OFB method.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116003035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Studying on minimal cover set node deployment in wireless sensor networks 无线传感器网络最小覆盖集节点部署研究
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368301
Qiuling Tang, Xi Wang, G. Tong, Xian Li
{"title":"Studying on minimal cover set node deployment in wireless sensor networks","authors":"Qiuling Tang, Xi Wang, G. Tong, Xian Li","doi":"10.1109/WSCNIS.2015.7368301","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368301","url":null,"abstract":"Studying on coverage problem is the premise and guarantee of implementing data collection, monitoring and a series of other functions for WSNs. Using the least amount of nodes to realize the regional coverage can effectively reduce the data redundancy and the collision among nodes. The greedy approximate algorithm (GAA) on minimum coverage set is put forward by this paper. In the process of constructing coverage set, from the geometric position among the nodes, we discussed the location relationships of the sensor nodes of the random deployment in different situations. Then the prioritization of different situation is given for comprehensively considering to select nodes to join cover set, respectively according to the distance, the surplus energy, the increase area, and the location relationship between arc intersection points. Finally, through the simulation experiments, the size of the coverage set and the algorithm running time of GAA, GA, and CVT algorithms are compared. And the experimental results show that the GAA is better than the other two algorithms.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm 相似度量和插值技术对分数特征面算法的影响
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368300
Ahmed Ghorbel, Imen Tajouri, Walid Elaydi, N. Masmoudi
{"title":"The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm","authors":"Ahmed Ghorbel, Imen Tajouri, Walid Elaydi, N. Masmoudi","doi":"10.1109/WSCNIS.2015.7368300","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368300","url":null,"abstract":"Face recognition system is considered as a smart technique for authentication. It guarantees security, stability and variability. It was used in a wide variety of applications like control of access, surveillance, passport and credit cards. Many algorithms were proposed in order to improve the recognition rate. One of these techniques is the fractional Eigenfaces, which combines the Eigenfaces algorithm and the theory of the fractional covariance matrix. In this paper, we highlight the influence of the interpolation and the similarity measurement methods on the efficiency of the fractional Eigenfaces algorithm. Experimental results are evaluated with three image databases: ORL, YALE and UMIST.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信