2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)最新文献

筛选
英文 中文
Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model 标准模型中基于格的完全安全身份加密方案
Jizhong Wang, Chunxiao Wang
{"title":"Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model","authors":"Jizhong Wang, Chunxiao Wang","doi":"10.1109/3PGCIC.2015.33","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.33","url":null,"abstract":"Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in this paper. A public matrices chosen rule that has been used in a known efficient lattice-based chosen ciphtertext secure encryption scheme is used in this paper to reduce the public key size and the message-to ciphtertext expanse factor. Under the hardness of the decision variant of the learning with errors (LWE) problem, we prove that the proposed IBE scheme is indistinguishable against the adaptive chosen identities and chosen-plaintext attack in the standard model. Since a new public key chosen rule is used in our design scheme, the public key size of the proposed scheme would be short. Moreover, the message-to-ciphtertext expanse factor of this scheme is also controlled efficiently which is nearly closed to that of Gentry's scheme. Due to the quantum intractability of the LWE problem on which the scheme is based, the proposed IBE scheme is secure even in quantum-era.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121173289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter 基于改进计数布隆滤波器的异构传感器网络认证密钥协议方案
Jiuru Wang, Haifeng Wang, Xu An Wang, Yunpeng Cao
{"title":"An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter","authors":"Jiuru Wang, Haifeng Wang, Xu An Wang, Yunpeng Cao","doi":"10.1109/3PGCIC.2015.119","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.119","url":null,"abstract":"In terms of the problems of security, scalability and communication cost existing in the scheme, which is proposed by Qin et al., of identity-based key management using bloom filter (IBKM), this paper designs an authentication key agreement scheme for heterogeneous sensor network based on improved counting bloom filter. This scheme analyzes the problem of authentication key agreement in heterogeneous sensor networks from the viewpoint of Set theory and improves the algorithm of counting bloom filter to be adapted to the authentication key agreement of heterogeneous sensor networks. The experimental results show that the proposed scheme can resist brute force attack during a node capture and has better network scalability and lower communication cost compared with the IBKM scheme.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128583155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Notification System for Mobile Devices to Support Collaborative Learning 一种支持协作学习的移动设备通知系统
S. Caballé, F. Xhafa
{"title":"Towards a Notification System for Mobile Devices to Support Collaborative Learning","authors":"S. Caballé, F. Xhafa","doi":"10.1109/3PGCIC.2015.8","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.8","url":null,"abstract":"Presently, the combination of wireless technology and the advances of mobile devices are transforming the form in which people, companies and organisations communicate. In particular, virtual organizations in the education sector have shown the possibilities of remote training, which provides similar pedagogical benefits to face-to-face training. However, this group of technologies and initiatives have not been yet fully exploited to extract all their potential for remote education. In other words, no sufficient research has been conducted to conjugate these technologies so as to improve the teaching-learning process, informal and social communication in a virtual campus. This paper presents an attempt towards this direction by reporting the experience of developing and prototyping a notification system for mobile devices to support collaborative work in on-line learning. In particular, the main research objectives are: (i) definition of an event model to manage notifications of group work, (ii) adaptation and integration of the notification system based on the event model into mobile devices, (iii) development and prototyping of the system to support collaborative learning.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock 模糊拱顶方案应用于预先确定的基于手掌的手势作为安全行为锁的可用性
M. Piekarczyk, M. Ogiela
{"title":"Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock","authors":"M. Piekarczyk, M. Ogiela","doi":"10.1109/3PGCIC.2015.148","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.148","url":null,"abstract":"Nowadays, the crypto-biometric schemes are commonly studied to deal with the key management problem existing in cryptographic systems. In the paper we consider a well-known fuzzy vault scheme working on non-standard biometric data associated with palm-oriented gestures. We discuss the usefulness of the touch-less palm tracking system focused on handling the biomechanical characteristics of one's hand to protect the cryptographic key or other secret data. As a behavioral template the fixed finger-based gesture is applied. In order to generate unordered sets for fuzzy vault we use the global approach where features are decoded from fingertip position and velocity. Both the raw and DCT-calculated time series are preprocessed to solve the instability and variability problem strictly related to behavioral character of the data. We provide the experimental results and discuss the security issues.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services 锁:一个通过禁用默认锁定服务来加强iOS的软件工具
Luis Gómez-Miralles, J. Arnedo-Moreno
{"title":"Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services","authors":"Luis Gómez-Miralles, J. Arnedo-Moreno","doi":"10.1109/3PGCIC.2015.57","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.57","url":null,"abstract":"Smartphones and mobile devices nowadays accompany each of us in our pockets, holding vast amounts of personal data. The iOS platform has gained popularity in the last years, in particular in enterprise deployments, due to its supposed higher level of security. Recent research has pinpointed a number of mechanisms that are being abused today in order to compromise the security of iOS devices. In this paper, we present Lockup, a proof of concept tool that applies various mitigation measures in order to protect iOS devices against those attacks.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible Copyright Protection for DNA Microarray Images DNA微阵列图像的可逆版权保护
Raffaele Pizzolante, Arcangelo Castiglione, B. Carpentieri, A. D. Santis, Aniello Castiglione
{"title":"Reversible Copyright Protection for DNA Microarray Images","authors":"Raffaele Pizzolante, Arcangelo Castiglione, B. Carpentieri, A. D. Santis, Aniello Castiglione","doi":"10.1109/3PGCIC.2015.139","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.139","url":null,"abstract":"The ability of the DNA microarray images of being used in several application domains, such as computer science, medical sciences, biololgy, toxicology, chemistry, ecology, environmental studies and statistics has enabled the collaboration among scientists belonging to different research fields. For this reason, the use/management of such images may be sometimes controlled by ethical or proprietary rules. In this paper, we address the problem of DNA microarray images protection by means of visible watermarking techniques, where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original DNA microarray image. In particular, to the best of our knowledge, we introduce the first reversible visible watermarking scheme explicitly addressed for such type of images. The proposed scheme ensures copyright protection, besides enabling the binding of that image with other information related to it. The visible watermark is securely embedded based on a user-key-controlled embedding mechanism. We remark that by using our scheme it is possible to store only the watermarked copy of a DNA microarray image, without the original one, and then to restore exactly the original image. Finally, we have implemented a working prototype of the scheme we proposed and its validity has been proven through testing.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of Pixels 基于像素的图像内容认证和纠错水印算法
Yixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin
{"title":"A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of Pixels","authors":"Yixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin","doi":"10.1109/3PGCIC.2015.111","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.111","url":null,"abstract":"This paper proposes a watermark algorithm for image content authentication and correcting errors in terms of pixels. There are two characteristics: first, aiming at defects of poor safety and the complicated calculation which are exiting in image encryption algorithm based on chaotic sequences, a new image chaotic encryption algorithm based on sampling without replacement is put forward. Second, the application of combination mapping technique supplies a gap which is exiting in image content authentication watermark. Using the authentication, digital image can be corrected in terms of pixels, and with the minimum embedded capacity and the maximum SNR. The image is divided into blocks by 8×8, image content authentication and correcting errors is done on blocks. In the scheme, chaotic encryption not only ensures the safety, but also advances correcting rate.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Agent-Based Model for Autonomous Planning in Distrubuted Critical Systems 基于agent的分布式关键系统自主规划模型
F. Amato, Francesco Moscato, Dario Pianese
{"title":"An Agent-Based Model for Autonomous Planning in Distrubuted Critical Systems","authors":"F. Amato, Francesco Moscato, Dario Pianese","doi":"10.1109/3PGCIC.2015.112","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.112","url":null,"abstract":"Critical distributed systems are usually employed in situation where automation is appealing when dealing with dangerous situations. Anyway, the complexity of these systems is growing up faster and faster. Distributed autonomous elements like sensors networks, drones etc. are now widely used in critical system. In this systems, each autonomous element must implement procedures in order to reach their goals in a distributed, usually collaborative environments. New planning algorithms have to be coped with existing ones in order to fulfil performance and soundness requirements. In this paper we propose an autonomous planning methodology that is based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems. We also describe a framework we implemented in order to enact the methodology and we will present results from the study of a critical distributed system.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage Domain 文化遗产领域可穿戴增强现实系统的用户驱动视图管理
Giuseppe Caggianese, Luigi Gallo, Pietro Neroni
{"title":"User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage Domain","authors":"Giuseppe Caggianese, Luigi Gallo, Pietro Neroni","doi":"10.1109/3PGCIC.2015.90","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.90","url":null,"abstract":"The recent availability of low cost wearable augmented reality (WAR) technologies, is leveraging the design of applications in many different domains in order to support users in their daily activities. For most of these domains, the large amount of information displayable on top of the reality, directly in the user's field of view, represents an important challenge for designers. In this paper we present a view management technique for placing touristic/cultural information, in the form of points of interest (POIs), in an AR system that works in the absence of a priori knowledge of the real environment. The user-driven view management technique, designed as a remote service, improves representation and displacement of the digital information each time the user manifests an interest in a particular area of the real space. The proposed approach includes a layout algorithm, which exploits the user's local position and her/his point of view direction, to correctly set the POI height in the user's view avoiding overlapping and cluttering, together with an adaptive rendering method, using information about the brightness of the area, that computes the visual appearance parameters of each virtual POI in order to improve its readability over the background.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display Environment 超分辨率显示环境下海量多媒体内容同步显示的基础研究
Yasuo Ebara
{"title":"Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display Environment","authors":"Yasuo Ebara","doi":"10.1109/3PGCIC.2015.129","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.129","url":null,"abstract":"As effective application method of the large-scale and the high-resolution display system, it is considered to product new technique of information utilization by simultaneous display of enormous multimedia contents by utilizing the ultra-wide display area. In previous studies, we have studied the availability for intuitive operation and understanding by implementing various collaborative applications for the effective display of high-resolution contents as well as developing interaction techniques for enormous visual contents in tiled display wall. However, it is pointed out the issue which interfere with the browsing of contents and each work by viewers, because tiled display wall is displayed hiding a part of each contents inforamtion by bezel exist in each LCD. In this paper, we have worked the fundamental study on technique of effective simultaneous display by use of enormous multimedia contents in ultra-resolution display environment.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信