2008 New Technologies, Mobility and Security最新文献

筛选
英文 中文
Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch 移动通信系统中单极和贴片两种天线的SAR计算
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.31
M. Bouhorma, F. Elouaai, A. Mamouni
{"title":"Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch","authors":"M. Bouhorma, F. Elouaai, A. Mamouni","doi":"10.1109/NTMS.2008.ECP.31","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.31","url":null,"abstract":"This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fault Analysis Attack on an FPGA AES Implementation 针对FPGA AES实现的故障分析攻击
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.45
F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane
{"title":"Fault Analysis Attack on an FPGA AES Implementation","authors":"F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane","doi":"10.1109/NTMS.2008.ECP.45","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.45","url":null,"abstract":"Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side channel attacks. Particularly, fault attacks have proved their efficiency in cracking hardware implementation of some robust symmetric and asymmetric encryption algorithms. In this paper, we develop an FPGA version of the attack proposed by Piret and Quisquater against the AES (Advanced Encryption Standard) algorithm. Through temporal and spatial analyses of the rounds that have been affected by the fault injection process, we adapt the aforementioned attack to our context. The results obtained in this paper can serve to design a more secure FPGA implementation of AES.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System 电子学习系统中语义解析的查询和语义映射方法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.83
Rashid Jayousi, Yasmin Bali
{"title":"Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System","authors":"Rashid Jayousi, Yasmin Bali","doi":"10.1109/NTMS.2008.ECP.83","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.83","url":null,"abstract":"Selecting appropriate learning services for a learner from a large number of heterogeneous knowledge sources is a complex and challenging task. This research will illustrate and discuss how semantic Web technologies and ontology can be applied to e-learning systems to help the learner in selecting an appropriate learning course or retrieving relevant information. It will present the main features of an e-learning scenario and the ontology on which it is based, and then illustrates the scenario ontology with the training domain and the application domain. Finally, it will present semantic querying and semantic mapping approaches as one process to solve the problem of the semantic resolution in an e-learning system.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical Documents 异构信息源的混合集成方法:应用于医疗资源和患者医疗文献
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.50
L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani
{"title":"Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical Documents","authors":"L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani","doi":"10.1109/NTMS.2008.ECP.50","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.50","url":null,"abstract":"The goal of this research is to promote the establishment of an information system to provide to the Internet users the quality information on health and medicine related to the Patient Medial Documents (PMD). This information are extracted from several certified heterogeneous sources of the health localized dynamically. In addition, all the data of the patients and the information relating to any medical activity (operation, consultation, analysis, radiology, etc..) are stored in Data warehouse. These Data warehouse are distributed over several regions according to the geographical distribution location of the patients. Such a functional architecture will take us to deal with two integration methodologies of the heterogeneous information systems most recommended. The Data warehouse method used to store the information related to the PDM and the virtual integration method used to retrieve the health and medicine scientific information. In this article, we propose a new hybrid approach of integrating the heterogeneous information systems between Data warehouse and the virtual mediation. We develop a mechanism rewriting request and an algorithm adapted for updates of Data warehouse based on the mobile agents.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of Tu and Piramuthu's Protocol 图和皮拉穆图协议的安全性分析
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.88
J. Munilla, A. Peinado
{"title":"Security Analysis of Tu and Piramuthu's Protocol","authors":"J. Munilla, A. Peinado","doi":"10.1109/NTMS.2008.ECP.88","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.88","url":null,"abstract":"RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126859366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWeb ScatterFactory2:新一代ScatterWeb的以架构为中心的框架
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.85
M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller
{"title":"ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWeb","authors":"M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller","doi":"10.1109/NTMS.2008.ECP.85","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.85","url":null,"abstract":"ScatterFactory2 is a model-driven eclipse-based framework for the new generation of our WSN platform ScatterWeb The already deployed Modular Sensor Boards (MSBs) can be configured, programmed and tested at the same time. This is made possible by the combination of plug-ins for ScatterFactory2. Apart from the high grade of automation, the focus of ScatterFactory2 lies with the aspect of human-computer interfaces for WSN. ScatterFactory2 provides the opportunity to examine different characteristics and properties of WSN-applications illustratively and interactively. The plug-in oriented architecture encourages the enhancement of the tool, when new questions concerning WSN arise. ScatterFactory2 is based wholly on open source components, which are available at no extra cost.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125713858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET) 稀疏车辆自组织网络(VANET)中具有车间通信和存储-前向的多跳数据报文传输
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.66
H. Oka, H. Higaki
{"title":"Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET)","authors":"H. Oka, H. Higaki","doi":"10.1109/NTMS.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.66","url":null,"abstract":"In wireless multihop data message transmission by multiple mobile computers in ITS systems, even though in an area with sparsely distributed mobile computers, mobility of a computer with transmitting data messages helps to achieve high data message transmission ratio. This paper proposes data message transmission along a sequence of roads detected by a GPS satellite navigation system. Due to combination of dynamic determination of intermediate mobile computers and a store-carry-forward approach, higher transmission ratio and shorter end-to-end delay are achieved even with high mobility and sparse distribution.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes 基于马尔可夫过程的复杂互联通信系统安全高效建模研究
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.72
Dimitrios Alexios Karras, V. Zorkadis
{"title":"On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes","authors":"Dimitrios Alexios Karras, V. Zorkadis","doi":"10.1109/NTMS.2008.ECP.72","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.72","url":null,"abstract":"While interconnected systems proliferate in nowadays computing and communications technology there are few reports investigating their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of computing architectures and networks comprising complex interconnected communication systems adapted towards a generalized analysis. These models, based on Markov processes, allow calculation of critical security factors, related to intrusion detection, of such interconnected systems components and the evaluation of the associated security mechanisms. Although, at this step two interconnected systems are analyzed, the systematic model introduced allows for a generalized model of N interconnected systems. We herein show the principles of such an analysis. Security parameters calculation and Security mechanisms evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality of service characteristics corresponding to the complex interconnected computing and communication systems.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning 在教学模式中嵌入隐性知识以促进电子学习的框架
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.48
Rizwana Irfan, M. U. Shaikh
{"title":"Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning","authors":"Rizwana Irfan, M. U. Shaikh","doi":"10.1109/NTMS.2008.ECP.48","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.48","url":null,"abstract":"Globalization has brought with it acute need of knowledge availability, due to which e-learning has been expressing dramatic growth day by day. Using this technology one can create opportunities for the learner to get knowledge whenever and wherever it is required. For better and accurate delivery of knowledge, it is very important to enhance quality, availability and processing of current training systems. E-learning should be adaptive and in accord with the requirement of the learner. A course should be designed on the basis of student's background, interests and aptitude. Much has been written on the contents' management of e-learning based on theoretical knowledge. Likewise, much has been written on the contents' delivery issues in e-learning but less effort has been made regarding e-learning, based on experimental knowledge. In this paper the authors have tried to emphasize the need of tacit learning and have designed a framework which helps to incorporate the tacit knowledge, hence trying to attain true essence of knowledge.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
AdaMS: An Adaptation Multimedia System for Heterogeneous Environments 异构环境下的自适应多媒体系统
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.15
F. M. Bouyakoub, Abdelkader Belkhir
{"title":"AdaMS: An Adaptation Multimedia System for Heterogeneous Environments","authors":"F. M. Bouyakoub, Abdelkader Belkhir","doi":"10.1109/NTMS.2008.ECP.15","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.15","url":null,"abstract":"This paper presents a new adaptation platform for composite multimedia documents in SMIL (synchronized multimedia integration language) format. Our adaptation system, named AdaMS, allows users of heterogeneous terminals to reach the same multimedia content. The platform assumes the management of user's profiles (user preferences, device characteristics...) for the adaptation process, as well as the management of the new presentations versions, created according to the user profile. The adaptation process is a combination of on stock and on demand adaptation. The aim is to have a balance between the two methods to optimize the adaptation process. Unlike other existing platforms, our system gives the possibility to the user to begin the visualisation of the multimedia presentation before the end of the adaptation process, thus reducing user waiting time.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信