{"title":"Hybrid Personalized Tag Recommendation Algorithm Design and Evaluation","authors":"Wei Zhang, Li Yu","doi":"10.1109/ICMECG.2014.22","DOIUrl":"https://doi.org/10.1109/ICMECG.2014.22","url":null,"abstract":"With the widespread popularity of Web 2.0 website, Collaborative Tagging System, as one of the famous social software, is getting more attention now. Tag recommendation technology has been developed to help users with tagging process recently. However, most of the tag recommendation methods are merely based on the content of tagged resource. Aiming at this limitation, a hybrid personalized tag recommendation algorithm based on user preference and content is proposed. The experiments show that this algorithm has good robustness and high degree of automation. And solve the tag system of a righteous.","PeriodicalId":413431,"journal":{"name":"2014 International Conference on Management of e-Commerce and e-Government","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol","authors":"Y. Li, Jian-ming Zhu, Wei Zhang, Xin Yang","doi":"10.1109/ICMECG.2014.29","DOIUrl":"https://doi.org/10.1109/ICMECG.2014.29","url":null,"abstract":"We revisit the identity-based (ID-based) key agreement protocol due to Wang et al. The protocol is highly efficient and suitable for practical applications except being vulnerable to Intermediate results leakage (IRL) and Key-compromise impersonation (KCI) attack. We propose an improved protocol following the Full Dual Exponential Challenge Response (FDCR-1) scheme to ensure the signature change every time. We also prove it to be secure in the strengthened extended Canetti -- Krawczyk (seCK) model provides better support for adversary's query than previous. In addition, the improved protocol also has an advantage over most existing protocols on security and efficiency.","PeriodicalId":413431,"journal":{"name":"2014 International Conference on Management of e-Commerce and e-Government","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}