The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Workflow is an important way to mashup reusable software services to create value-added data analytics services. Workflow provenance is core to understand how services and workflows behaved in the past, which knowledge can be used to provide a better recommendation. Existing workflow provenance management systems handle various types of provenance separately. A typical data science exploration scenario,...
Service (API) discovery and recommendation is key to the wide spread of service oriented architecture and service oriented software engineering. Service recommendation typically relies on service linkage prediction calculated by the semantic distances (or similarities) among services based on their collection of inherent attributes. Given a specific context (mashup goal), however, different attributes...
The need for collaborative data analytics increases significantly when confronted with the challenges of big data. Although workflow tools offer a formal way to define, automate, and repeat multi-step computational procedures, designing complex data processing workflow requires collaboration from multiple people with complementary expertise. Existing tools are not suitable to support collaborative...
In a traditional template attack, during the template building phase, a large amount of calculation is usually needed, or, what is worse, some impossible calculation might be occurred to get the covariance matrix. Through a deep researching of template attack techniques, this paper has improved the template building method and proposed a new way which greatly simplified the template structure to avoid...
MCrypton is an ultra-lightweight symmetric cryptographic algorithm, which is designed to adapt to the resource constrained computing scenarios, such as RFID tags and sensor networks, etc. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative...
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based...
In 2011, Chen-Hsiang-Shil proposed an improved remote user authentication using smart card. Two years later, it's claimed by Chen-Tasi-Leu that Chen-Hsiang-Shil's scheme was easy to crack under off-line password guessing attack and trapped by the time synchronous problem. They improved the scheme of Chen-Hsiang-Shil's and announced that the new one can reduce the vulnerability and hold the merits...
Sharing one taxi by more than one person is treated promising, since it enables us to take a taxi in rush-hour more conveniently. Hence, we develop POP, a prototype system to find appropriate partners to share a taxi with a given passenger. The framework of POP includes two phases, namely offline preprocessing and online matching. During the offline preprocessing phase, it constructs an R-tree index...
To achieve security in distributed wireless sensor networks, one of the most promising approaches is the so-called random pre-distribution of key seeds. Pair-wise secure communication channels between nodes were established or discovered by using key information that were constructed and pre-distribution to each node in distributed wireless sensor networks. Combining DNA model with the idea of multiple...
Masking is the general method used to resist Differential Power Analysis. It makes power consumption independent of the intermediate values by XORing all the intermediate values with random values or fixed values. Fixed-value masking is faster and requires less RAM than random-value masking. The present paper proposes a fixed-value mask algorithm for SMS4 to resist power analysis attacks
In 2005, Yoon et al. proposed a remote user authentication scheme using smart card. In 2009, Li pointed out that Yoon et al.'s scheme can't against denial of service attack and performs only unilateral authentication (only user authentication). He improved Yoon et al.'s scheme and claimed that the improved scheme can eliminate the vulnerability. However, we found Li's scheme is vulnerable to malicious...
Yang-Yang proposed a new key authentication scheme based on fuzzy extractor with Smart Card. The authors claimed their scheme can resist the guessing attack, the parallel attack, masquerade attack and other attack types. In this paper, we find that the scheme proposed by Yang-Yang was unable to resist the masquerade attack as they originally claimed.
A smart card based scheme is very practical to authenticate remote user. In 2002, Chien-Jan-Tseng proposed a mutual authentication scheme using smart card. But in 2004, Ku-chen pointed out the weaknesses of Chien et al's scheme and proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. However, Hsu pointed out there is still susceptible to parallel session attack in Ku-Chen's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.