The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The secure set-intersection protocol is a cryptographic protocol that retrieves the intersection of two or more datasets without revealing any additional information apart from the intersection data. In this paper we formalize the secure matching tag, which is frequently used in the existing secure set-intersection protocols, and propose applying the tag to privacy-enhancing biometrics. Due to the...
In this paper, we propose a node's call-for-assistant protocol, named an event-driven mobile assistant protocol (EDMAP for short), with which when a node N is going to exhaust its energy, it calls for mobile nodes to help it to relay packets so the tasks of sensing environment or environment change and relay packets for upstream nodes can be proceeded. Experimental results show that this approach...
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the other hand, RSA cryptography has been widely used and is defined over a certain composite order as the modulus. In detail, it generally needs to be a product of two large prime numbers. In order to apply RSA-based techniques to pairing-based cryptography, the authors have proposed...
Flash has a number of security defects even though Flash Player is installed on most of world's PC. Protection using sandbox has limitation to protect a user from vulnerabilities of Flash application because an attacker can attack a vulnerable Flash application when a sandbox can't work if an engineer or a web administrator set sandbox permission wrongly. Another way to solve it is testing. As a testing,...
Wireless Sensor Networks (WSN) are a sensing, computing and communication infrastructure that are able to observe and respond to phenomena in the natural environment and in our physical and cyber infrastructure. The sensors themselves can range from small passive micro sensors to larger scale, controllable weather-sensing platforms. In this work, we investigate how the sensor network performs in the...
The importance of mobility in networks is being increased together with its number of users and applications. However, we still do not have broadly accepted solutions for mobility in Internet or other type of networks. In particular, mobility is difficult in heterogeneous networks, where heterogeneity could expand over ownership, administration, technology, and so on. We propose for such heterogeneous...
This paper proposes a new method that efficiently uses the RFID data collected from apparel shops. This method learns prediction models from the data by using data mining techniques. The models represent relationships between the number of sales in the next term and the actions of customers, such as the number of pick-up, the number of fitting, the number of customers, and so on. It is possible to...
Recently, the quantity of accessible data continues increasing, and the importance of data mining is also increasing. On the other hand, highly developed computing facility enabled visual data mining in immersive environment. Visualization has an important role in current data mining, and the rapid progress on visualization devices, such as super high definition stereo display, can enhance the existing...
User demands to have access to complete and accurate information requires integration of data from distributed stores. Those stores provide dynamically changing data that could be partially redundant because of many intentional or unintentional reasons. The unintentional reasons could be the way the data was collected by those information stores and intentional reasons could be replication or the...
Cloud computing is a new form of technology, which infrastructure, developing platform, software, and storage can be delivered as a service in a pay as you use cost model. However, for critical business application and more sensitive information, cloud providers must be selected based on high level of trustworthiness. In this paper, we present a trust model to evaluate cloud services in order to help...
Recently, Web-page browsings at various terminals have become popular due to deployments of small mobile devices and large flat displays. To deal with this recent trend, we have proposed a Web-page layout optimization method for multimodal browsing sizes. It dynamically changes box locations and font sizes by switching CSS files for different browsing sizes, so that the main content can be accessed...
In recent years, there has been an increasing interest in P2P (Peer-to-Peer) streaming environments. In P2P streaming environments, compared with the traditional server-client model, the load of the server can be reduced by transmitting the divided streaming data (pieces) among clients. However, when bandwidths between clients are narrow, interruption occurs since clients cannot receive the necessary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.