2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
A Method for Embedding Secret Key Information in RSA Public Key and Its Application 在RSA公钥中嵌入密钥信息的方法及其应用
Motoki Kitahara, T. Nishide, K. Sakurai
{"title":"A Method for Embedding Secret Key Information in RSA Public Key and Its Application","authors":"Motoki Kitahara, T. Nishide, K. Sakurai","doi":"10.1109/IMIS.2012.123","DOIUrl":"https://doi.org/10.1109/IMIS.2012.123","url":null,"abstract":"In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network 基于委托的多运营商无线网状网络相互认证方案
Tianhan Gao, Nan Guo, Kangbin Yim
{"title":"Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network","authors":"Tianhan Gao, Nan Guo, Kangbin Yim","doi":"10.1109/IMIS.2012.194","DOIUrl":"https://doi.org/10.1109/IMIS.2012.194","url":null,"abstract":"In order to establish secure access for multi-operator wireless mesh network (WMN), this paper proposes a delegation-based authentication scheme under broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router though ticket which is equipped with identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both mesh client side and mesh router side. As a byproduct, key agreement among participants is also implemented to protect the subsequent communications. Security analysis demonstrates that our proposed scheme is resilient to various kinds of attacks.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
DAAF: A Device Abstraction and Aggregation Framework for Smart Environments DAAF:智能环境中的设备抽象和聚合框架
A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra
{"title":"DAAF: A Device Abstraction and Aggregation Framework for Smart Environments","authors":"A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra","doi":"10.1109/IMIS.2012.116","DOIUrl":"https://doi.org/10.1109/IMIS.2012.116","url":null,"abstract":"Largely motivated by the ubiquitous computing vision, computers have been steadily becoming integrated in people's life, expanding the ability of software applications to interact with the environment and the users. This has led to the creation of smart environments that support people in their daily life by exploiting information acquired using sensor networks. These systems are usually populated by multiple non-interoperable technologies that make the development, deployment and reutilization of applications a complex and repetitive task. This paper presents DAAF, a Device Abstraction and Aggregation Framework that provides a common conceptual model of a device network, and a set of tools, which allow a flexible integration of heterogeneous sensor networks, enabling fast development and reconfiguration of smart environment applications.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability 针对SSL/TLS重协商漏洞的过渡对策与策略
Yuji Suga
{"title":"Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability","authors":"Yuji Suga","doi":"10.1109/IMIS.2012.138","DOIUrl":"https://doi.org/10.1109/IMIS.2012.138","url":null,"abstract":"In November 2009, Marsh Ray, Steve Dispensa and Martin Rex released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not settled. In this paper, we discuss about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Influence of Media Coverage on the Stock Returns and Momentum Profits 媒体报道对股票收益和动量利润的影响
Kuei-Yuan Wang, Chien-Kuo Chen
{"title":"The Influence of Media Coverage on the Stock Returns and Momentum Profits","authors":"Kuei-Yuan Wang, Chien-Kuo Chen","doi":"10.1109/IMIS.2012.151","DOIUrl":"https://doi.org/10.1109/IMIS.2012.151","url":null,"abstract":"Media coverage not only provides much firm-specific information to the investor public intuitionally, but also is informative to the stock price. This study tries to examine whether media coverage is an important factor to stock returns on the Taiwan stock market. Our empirical results support this finding on the Taiwan stock market, and find investors can utilize momentum strategies to earn abnormal returns. These findings can provide some meaningful insights to e-business corporate manager, while releasing some news to the public.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132860285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of a Public Cloud 公共云的安全性
Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr
{"title":"Security of a Public Cloud","authors":"Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr","doi":"10.1109/IMIS.2012.78","DOIUrl":"https://doi.org/10.1109/IMIS.2012.78","url":null,"abstract":"This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security in cloud computing will be given.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geocast Routing Protocols for VANETs: Survey and Guidelines vanet的地球广播路由协议:调查和指南
S. Allal, S. Boudjit
{"title":"Geocast Routing Protocols for VANETs: Survey and Guidelines","authors":"S. Allal, S. Boudjit","doi":"10.1109/IMIS.2012.133","DOIUrl":"https://doi.org/10.1109/IMIS.2012.133","url":null,"abstract":"In Vehicular Ad Hoc Networks VANETs, a multitude of applications need to address not a single vehicle on the road, nor the whole totality of vehicles, but only a community of vehicles which share the same geographic location for the purpose of safety, traffic efficiency, advertising or infotainment. The goal is to transmit data from a unique source node to a set of destination nodes satisfying a set of geographic criteria. Geocast routing protocol in VANETs appear to be the most appropriate routing technique for these applications. In this investigation, we introduce some existing Geocast routing protocols for VANETs and then we provide a classification of these protocols based on the used relay selection technique. We present a comparison of these Geocast routing protocols according to different criteria and finally, we highlight some directions we are considering for our Geocast routing solution for VANETs.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Similarity Measurement between Objects and Activities for User Intention Modeling 面向用户意图建模的对象与活动相似性度量
Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim
{"title":"Similarity Measurement between Objects and Activities for User Intention Modeling","authors":"Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim","doi":"10.1109/IMIS.2012.31","DOIUrl":"https://doi.org/10.1109/IMIS.2012.31","url":null,"abstract":"User intention modeling is a core part to provide appropriate services in ubiquitous and pervasive computing. And the modeling should be concentrated on preparing user activities according to objects which user approaches or touches. In other works, they just contribute to constructing the modeling under restricted conditions such as places. In order to prepare wide ranging and important factors, this work proposes similarity measurement between objects and activities. Through an evaluation, we show how effective this work is and provide its contributions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching 思科Nexus虚拟分布式交换的能源效率和安全问题
Benjamin Peterson, S. Ricciardi, Jordi Nin
{"title":"Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching","authors":"Benjamin Peterson, S. Ricciardi, Jordi Nin","doi":"10.1109/IMIS.2012.60","DOIUrl":"https://doi.org/10.1109/IMIS.2012.60","url":null,"abstract":"Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have not been evaluated and the achievable energy savings have not been quantified yet. In particular, it was necessary to investigate whether the security vulnerabilities existing in physical switches had persisted into the virtual environment. This paper provides an evaluation of the energy saving and an analysis of the security implications of the Cisco Nexus virtual distributed switching environment.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resolving Coordination Challenges in Cooperative Mobile Services 解决合作移动业务中的协调挑战
R. Alcarria, T. Robles, A. Dominguez, E. Cedeño
{"title":"Resolving Coordination Challenges in Cooperative Mobile Services","authors":"R. Alcarria, T. Robles, A. Dominguez, E. Cedeño","doi":"10.1109/IMIS.2012.131","DOIUrl":"https://doi.org/10.1109/IMIS.2012.131","url":null,"abstract":"The Internet of Things enables environments where objects are fully interconnected, allowing the execution of smart services and the consumption of functionalities provided by surrounding Web objects. This loose-coupled object interconnection demands improvements in the control plane for an optimum coordination between distributed services in mobile devices. There are several coordination challenges in these environments, related to the interaction between services, the communication channels establishment across service fragments and the transmission of events at runtime. This paper defines a coordination model and proposes solutions to these challenges by developing a cooperative service execution model for mobile environments, using the publish-subscribe paradigm for communicating control events. Subsequently, we evaluate this model and analyze the improvements of the designed optimization mechanisms over the MQTT protocol and the NS-3 simulator.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信