2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)最新文献

筛选
英文 中文
A Conceptual Framework for a SIM-based Electronic Transaction Authentication System 基于sim卡的电子交易认证系统的概念框架
M. Ashraff, M. Kabir, S. M. Aziz, B.k. Dey
{"title":"A Conceptual Framework for a SIM-based Electronic Transaction Authentication System","authors":"M. Ashraff, M. Kabir, S. M. Aziz, B.k. Dey","doi":"10.1109/NPC.2007.154","DOIUrl":"https://doi.org/10.1109/NPC.2007.154","url":null,"abstract":"This paper presents a SIM-based tool for user authentication in various service areas such as financial transactions in e-commerce. Other remote services can use SIM as an authentication tool over existing GSM technology through GPRS, which is an additional packet data feature for the GSM network. It allows both packet-switched and circuit-switched traffic to exist in the GSM infrastructure. As GPRS is designed to support packet based protocols, such as the Internet Protocol (IP) based bursty and uneven traffic flow, it enables new services such as reasonably fast access to the Internet, electronic mail and other data oriented services, that have been too inefficient in traditional circuit-switched digital mobile networks. Using GPRS features, the e-commerce applications can use SIM as user authentication for transactions. SIM can also be a tool for user identity and authentication around the corporate intranets. This can reduce security infrastructure setup and investment overhead for the security concerned organizations. This paper depicts an electronic payment protocol by means of SIM based authentication with the illustrations of its formal modelling & verification results.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Algorithm of Channel Resource Allocation in IEEE 802.11 WLAN 一种新的IEEE 802.11无线局域网信道资源分配算法
Liu Yanbing, Zhai Congcong, Sun Shixin
{"title":"A Novel Algorithm of Channel Resource Allocation in IEEE 802.11 WLAN","authors":"Liu Yanbing, Zhai Congcong, Sun Shixin","doi":"10.1109/NPC.2007.180","DOIUrl":"https://doi.org/10.1109/NPC.2007.180","url":null,"abstract":"With the development of bandwidth wireless communications, MAC protocol in IEEE 802.11 can't satisfy user-individual quality of service (QoS) guarantees effectively and can't support high-speed mobility. A novel algorithm for channel allocation in bandwidth WLAN and an improved resource reservation mechanism applied into IEEE 802.11 MAC protocol are proposed in this article. The simulated results indicate that the advanced protocol makes the system throughput improved and delay decrease. Moreover, the improved system shows an excellent performance in the environment with high-speed mobility.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131271874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptation Method for Level of Detail (LOD) of 3D contents 三维内容细节层次(LOD)的自适应方法
Hakran Kim, Yongik Yoon, Hwajin Park
{"title":"Adaptation Method for Level of Detail (LOD) of 3D contents","authors":"Hakran Kim, Yongik Yoon, Hwajin Park","doi":"10.1109/NPC.2007.82","DOIUrl":"https://doi.org/10.1109/NPC.2007.82","url":null,"abstract":"In this research we present a method for adaptation of 3D contents over ubiquitous environment. The need of contents adaptation and delivery is growing to support multiple target platforms for single source. Since contents base on computer graphics deal with a large data set and a high performance, a service adaptation for context changing is required to manipulate graphics contents with a more complicated method in multiple devices such as desktops, laptops, PDAs, mobile phones, etc. This paper presents some theoretical method for adaptation, which is service rendering middleware, and device-based decision making algorithm for LOD of 3D contents. Service rendering middleware consists of service adaptation (SA) for analyzing environments, service rendering (SR) for reconfiguring customized services and LOD algorithm for generating an adapted service by processing customized data according to the level of detail. Also, the decision-making algorithm, which is based on device capabilities, is used both in LOD algorithm module and method to decide level of 3D contents.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing 自适应丢包:一种公平带宽共享算法
Changqing An, Shijin Kong, Jiahai Yang
{"title":"Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing","authors":"Changqing An, Shijin Kong, Jiahai Yang","doi":"10.1109/NPC.2007.119","DOIUrl":"https://doi.org/10.1109/NPC.2007.119","url":null,"abstract":"This paper proposes a scalable algorithm called APD (adaptive packet dropping) for bandwidth control, which is based on active queue. A flow is mapped to an entry of hash table by hash function, and the counter of a flow can be searched at O(I) time. Theoretical analysis and experiments indicate that APD algorithm has great advantages on speed and space and it can reach predictable accuracy on flow bandwidth control. Theoretical analysis is also used to predict the accuracy for miscellaneous data-flow sizes distribution. A bandwidth control system is realized based on Linux 2.6 kernel. The experimental results show that the system can work properly on gigabit links while keeping enough accuracy on flow based bandwidth control.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Elliptic Curves Scalar Multiplication for Wireless Network 无线网络中一种有效的椭圆曲线标量乘法
Bangju Wang, Huanguo Zhang, Yuhua Wang
{"title":"An Efficient Elliptic Curves Scalar Multiplication for Wireless Network","authors":"Bangju Wang, Huanguo Zhang, Yuhua Wang","doi":"10.1109/NPC.2007.43","DOIUrl":"https://doi.org/10.1109/NPC.2007.43","url":null,"abstract":"Mobile and wireless devices like cell phones and network enhanced PDAs have become increasingly popular in recent years. The security of data transmitted via these devices has become the bottleneck for wireless network. Elliptic curves cryptography (ECC) is especially attractive for devices and is suited for wireless network, which has restrictions of the limited bandwidth, processing power, storage space and power consumption. The efficiency of ECC implementation is highly dependent on the performance of arithmetic operations of scalar multiplication(SM) dP, which mainly applied in encryption, signature and protocol. A new signed binary representation (SBR) for integers is proposed, which needs less memory and cost of computation compared to other methods mentioned in this paper. According to analyzing and comparing to other methods, algorithm for computing dP using new SBR is more efficient in window methods and is the simplest for applying in software and hardware. The new SBR needs less computational power and memory and can improve the security of wireless network efficiently.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Improved Kademlia Protocol In a VoIP System VoIP系统中改进的Kademlia协议
Xiao Wu, Cuiyun Fu, Huiyou Chang
{"title":"An Improved Kademlia Protocol In a VoIP System","authors":"Xiao Wu, Cuiyun Fu, Huiyou Chang","doi":"10.1109/NPC.2007.168","DOIUrl":"https://doi.org/10.1109/NPC.2007.168","url":null,"abstract":"Kademlia, which has been widely used in file sharing systems such as eMule and Overnet, concerns mainly on the resources and prefer to locate precisely the right peers despite of time consuming. We proposed an improved Kademlia protocol to adapt to VoIP systems meeting the need of real-time audio service and establishing a conversation in short delay. Beside, to provide an effective circuit switching we present timely backup channel for each peer to rescue interrupted conversation.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building IPsec VPN in IPv6 Based on Openswan 基于Openswan构建IPv6 IPsec VPN
Liu Lian, Gao Wen-mei
{"title":"Building IPsec VPN in IPv6 Based on Openswan","authors":"Liu Lian, Gao Wen-mei","doi":"10.1109/NPC.2007.50","DOIUrl":"https://doi.org/10.1109/NPC.2007.50","url":null,"abstract":"This paper researches and analyses feature and advantages of IPsec VPN, points out its problem and disadvantages in the IPv4. After analyzing IPv6 network and its data package in deep, this paper studies the feasibility of implementation of IPsec VPN in IPv6 network. Then it elaborates frame and modules which supports IPv6 of Openswan. Via recompiling the 2.6 kernel, adding the NETKEY module to kernel, installing Openswan and configuring it, a IPsec VPN which can runs in pure IPv6 network has been built. Finally, function and performance testing is done.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research and Design of an Attribute-managed Storage-cluster Based on TCP/IP Network 基于TCP/IP网络的属性管理存储集群的研究与设计
Qinqi Wei, Changsheng Xie, Xu Li, Q. Cao
{"title":"Research and Design of an Attribute-managed Storage-cluster Based on TCP/IP Network","authors":"Qinqi Wei, Changsheng Xie, Xu Li, Q. Cao","doi":"10.1109/NPC.2007.14","DOIUrl":"https://doi.org/10.1109/NPC.2007.14","url":null,"abstract":"With the growing scale of storage system, its requirements of performance, reliability, availability, and security are getting more and more complicated. The costs to manage storage systems will keep increasing and finally be higher than the systems themselves if this trend continues. Thus, intelligent and self-managing systems are required to automatically address the needs of these requirements. The proposed attribute-managed method in this paper describes and classifies the requirements of storage system with attributes, relating the attributes with certain access and storage strategies. Data are accessed and stored with the most appropriate strategies according to attributes pertaining to them. We finally present a prototype of an attribute-managed storage-cluster based on TCP/IP network with extensions to existing protocols and discuss the implementation structure in detail as part of this research.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Research of a New Web Server Cluster Architecture Supporting QoS 一种新的支持QoS的Web服务器集群体系结构研究
Wu Yang, Shuangqing Li, Daijie Cheng
{"title":"The Research of a New Web Server Cluster Architecture Supporting QoS","authors":"Wu Yang, Shuangqing Li, Daijie Cheng","doi":"10.1109/NPC.2007.90","DOIUrl":"https://doi.org/10.1109/NPC.2007.90","url":null,"abstract":"A new Web server cluster architecture with high scalability and reliability which supports Web QoS is proposed. The functions previously concentrated on a single dispatcher are distributed in this architecture, the traffic bottleneck of the dispatcher is alleviated, and the single point fault of dispatcher is avoided, so the scalability and reliability of the cluster system can be enhanced. Accessing locality on server is guaranteed by synchronous load transferring. The load balancing among the servers is achieved through a mechanism based on load vector. By measuring in experimental system, the increasing of throughput has linear relationship with the number of servers. So the QoS of the whole system is guaranteed.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Highly Reliable Access Control Model for Ad Hoc Networks 一种高可靠的Ad Hoc网络访问控制模型
In-Sik Cho, Man Ju Lee, T. S. Yun, Jung Ah Kim, Pho Due Giang, Sungyoung Lee
{"title":"A Highly Reliable Access Control Model for Ad Hoc Networks","authors":"In-Sik Cho, Man Ju Lee, T. S. Yun, Jung Ah Kim, Pho Due Giang, Sungyoung Lee","doi":"10.1109/NPC.2007.96","DOIUrl":"https://doi.org/10.1109/NPC.2007.96","url":null,"abstract":"Unlike the conventional networks, the unique characteristics of mobile ad hoc networks (MANETs) pose a number of nontrivial challenges for pervasive service provision. Particularly, mobility of users/devices causes un-predefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing a security access control model. Alternatively, there is generally no a priori trust relationship among entities interacting in ad hoc networks which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this study, we show how trust evaluation process of a system can be based on previous interactions and peer recommendations. Regarding the combination of these two factors, our trust-aware access control model can establish appropriate trust values for different situations, providing a confident supervision mechanism for ad hoc users.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128208177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信