2008 Third International Conference on Digital Information Management最新文献

筛选
英文 中文
Addressing the vulnerability of the 4-way handshake of 802.11i 解决了802.11i的4次握手的漏洞
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746729
Songhe Zhao, C. Shoniregun, C. Imafidon
{"title":"Addressing the vulnerability of the 4-way handshake of 802.11i","authors":"Songhe Zhao, C. Shoniregun, C. Imafidon","doi":"10.1109/ICDIM.2008.4746729","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746729","url":null,"abstract":"This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combating digital document forgery using new secure information hiding algorithm 使用新的安全信息隐藏算法打击数字文件伪造
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746807
A. Cheddad, J. Condell, K. Curran, P. Kevitt
{"title":"Combating digital document forgery using new secure information hiding algorithm","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746807","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746807","url":null,"abstract":"The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose a solution to this real world problem through a 1D hash algorithm coupled with 2D irFFT (irreversible fast Fourier transform) to encrypt digital documents in the 2D spatial domain. This method is described elsewhere in [1]. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. Our proposal not only points out forgery but also lets a jury or a forensics expert have access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A cross-layer framework for video streaming over wireless ad-hoc networks 无线自组织网络上视频流的跨层框架
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746822
Mohammad Nikoupour, A. Nikoupour, M. Dehghan
{"title":"A cross-layer framework for video streaming over wireless ad-hoc networks","authors":"Mohammad Nikoupour, A. Nikoupour, M. Dehghan","doi":"10.1109/ICDIM.2008.4746822","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746822","url":null,"abstract":"Video streaming over wireless ad-hoc networks requires appropriate routing and rate allocation mechanisms that efficiently adapt to the characteristics of such environments. The special features of ad-hoc networks also motivate us to introduce proper mechanisms in video coding, error concealment and various related areas. In this paper, we propose a framework for video streaming over wireless ad-hoc networks which utilizes the cooperation among network layers to perform the mentioned activities. We discuss the key parameters to be noticed in such a framework and explore several approaches in video streaming and rate allocation and select the suitable methods for our purpose. Focusing on the retransmission of lost video frames in response to ARQ requests, we try to minimize the delay between sending the ARQ request and receiving the lost frame, by selecting a route in which a node assists us in video streaming. Simulation results show the feasibility and the efficiency of the proposed framework.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Content-based RSS and broadcast news streams aggregation and retrieval 基于内容的RSS和广播新闻流聚合和检索
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746702
A. Messina, M. Montagnuolo
{"title":"Content-based RSS and broadcast news streams aggregation and retrieval","authors":"A. Messina, M. Montagnuolo","doi":"10.1109/ICDIM.2008.4746702","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746702","url":null,"abstract":"Nowadays, the global diffusion of the Internet is enabling the distribution of informative content through dynamic media such as RSS feeds and blogs. At the same time, the decreasing cost of electronic devices is increasing the pervasive availability of the same informative content in the form of digital audiovisual items. Hence, efficient and low-cost solutions for semantic aggregation of heterogeneous multimedia content are needed, in order to enable users to retrieve the desired information from this variety of channels. In this paper, we present an unsupervised framework for content-based Web newspaper articles and broadcast news stories aggregation and retrieval. The core of our system is based on a hybrid clustering algorithm that uses RSS feeds and television newscasts programmes as information sources and builds up a multimodal service made up of items including both contributions. Extensive experiments prove the effectiveness of our method.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MiRE: A Minimal Rule Engine for context-aware mobile devices 情境感知移动设备的最小规则引擎
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746772
Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim
{"title":"MiRE: A Minimal Rule Engine for context-aware mobile devices","authors":"Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim","doi":"10.1109/ICDIM.2008.4746772","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746772","url":null,"abstract":"Context-aware services have been introduced into mobile devices, such as cellular phones. Context management and rule processing are the key research issues for the resource-limited devices to have context-aware capability. In this paper, we introduce a context-aware rule processing engine, called MiRE (minimal rule engine). The engine implements the minimum cores of the conventional rule processing facilities and some special policies to achieve resource-saving and light-weight inference engine suitable for resource-limited mobile devices. MiRE, as a part of context-aware middleware system, provides a flexible architecture to adopt various context-aware applications while rules and contexts are dynamically registered at run-time. It maintains the amount of context (i.e., facts) and rules to be optimal in order to save computing resources and processing time. Its design strategy allows MiRE to be conveniently equipped into resource-limited context-aware mobile devices. The performance evaluation carried out on a context-aware cellular phone shows the intended efficiency has been well achieved.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Legal cognitive decision processing towards a dynamic taxonomy 走向动态分类学的法律认知决策处理
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746823
Wolfgang Kahlig
{"title":"Legal cognitive decision processing towards a dynamic taxonomy","authors":"Wolfgang Kahlig","doi":"10.1109/ICDIM.2008.4746823","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746823","url":null,"abstract":"ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation are not focussed. A method for handling of complex projects is UML, the ldquoUnified Modeling Languagerdquo. This tool could be applied also for the establishing, administration and further development of a new and modern building of law.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for culture influence Virtual Learning Environments trust 文化影响虚拟学习环境信任的框架研究
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746777
Samson Omosule, C. Shoniregun, D. Preston
{"title":"A framework for culture influence Virtual Learning Environments trust","authors":"Samson Omosule, C. Shoniregun, D. Preston","doi":"10.1109/ICDIM.2008.4746777","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746777","url":null,"abstract":"Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that constitute students trust factors are found to vary across cultures with regards to their respective parametric values.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Geo-information quality assurance in disaster management 灾害管理中的地理信息质量保证
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746727
Ying Su, Jie Peng, Zhanming Jin
{"title":"Geo-information quality assurance in disaster management","authors":"Ying Su, Jie Peng, Zhanming Jin","doi":"10.1109/ICDIM.2008.4746727","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746727","url":null,"abstract":"Disaster management depends on large volumes of comprehensive, accurate, relevant, on-time geo-information that various organizations systematically create and maintain. One cannot assure geo-information quality (G-IQ) without first being able to measure it meaningfully and establishing a causal connection between the source of G-IQ change, the G-IQ problem types, the types of activities affected, and their implications. In this article we propose a G-IQ assurance framework. In contrast to context-specific IQ assurance models, which usually focus on a few variables determined by local needs, our framework consists of comprehensive typologies of IQ problems, related activities, and a taxonomy of IQ dimensions organized in a systematic way based on semiotic theories and practices. The framework can be used as a knowledge resource and as a guide for developing G-IQ measurement models for many geo-information technologies which can offer a variety of opportunities to aid management and recovery in the aftermath of disasters. The framework was validated and refined by enhancing G-IQ generated by remote sensing through the technologies of photogrammetry.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ubiquitous computing and android 普适计算和android
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746751
Zohaib Hassan
{"title":"Ubiquitous computing and android","authors":"Zohaib Hassan","doi":"10.1109/ICDIM.2008.4746751","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746751","url":null,"abstract":"This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements. It also highlights how Android fulfills the subject requirements and considerations.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The softphone security 软件电话安全
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746763
Dannan Lin, C. Shoniregun, G. Akmayeva
{"title":"The softphone security","authors":"Dannan Lin, C. Shoniregun, G. Akmayeva","doi":"10.1109/ICDIM.2008.4746763","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746763","url":null,"abstract":"The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信