The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with FHMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme...
Market mechanism is effective to encourage more people to participate in the grid environment. Applying economic principles to grid is deemed promising to improve the overall value provided by such participants. However, resource scheduling algorithms are different depending on different needs. In this paper, we mainly focus on the consumers' own interest. Assuming that the consumers are selfish and...
Reputation systems are very useful in large online communities in which users may frequently have the opportunity to interact with users with whom they have no prior experience. Recently, how to enhance the cooperative behaviors in the reputation system that has became to one of the key open issues. Research in the evolutionary game theory shows that the group selection or multilevel selection can...
One of the challenges for ubiquitous intelligence computing is how to enable ubiquitous devices (u-devices) certain levels of intelligent/smart/autonomic/ processing capabilities. Due to their limited capacity and processing power, it is difficult to embed such capabilities into u-devices. The idea is to design an intelligence entity sharing pool in which an intelligence entity can be dynamically...
The stream/bounce effect is an example of audio/visual interaction in which two identical luminance-defined targets in a 2-D display move toward one another from opposite sides of a display, coincide, and continue past one another along collinear trajectories. The targets can be perceived to either stream past or bounce off of one another. Streaming is the dominant perception in visual only displays...
Today, with increasing deversity of network technologies, people have been likely to be interested in anonymity. The attacker might threaten anonymity of senders and receivers by confirming linkability between their sessions. Recently, Golle et al. proposed the re-encryption scheme applicable to Mix, called universal re-encryption. In this scheme, a ciphertext is supposed to be re-encrypted without...
Intrusion detection system records worm's signature, and detects the attack that lurks in traffic based on it. However, to detect the worm that corrects, and changes some oneself, a highly accurate detection technique for distinguishing the code that seems to be the worm included in traffic is requested. In this paper, we pay attention to the Toth et al.'s method to extract the executable code included...
In this paper we compare four risk analysis methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. Mehari is a method for risk analysis and risk management developed by CLUSIF (Club de la Securite del' Information Francais). Magerit is a risk analysis and management methodology for information systems developed by CSAE (Consejo Superior de Administracion Electronica). NIST800-30...
The sensitive information leakage and security risk is a problem from which both individual and enterprise suffer in massive data collection and the information retrieval by the distrusted parties. In this paper, we focus on the privacy issue of data clustering and point out some security risks in the existing data mining algorithms. Associated with cryptographic techniques, we initiate an application...
K-means clustering is a powerful and frequently used technique in data mining. However, privacy breaching is a serious problem if the k-means clustering is used without any security treatment, while privacy is a real concern in many practical applications. Recently, four privacy-preserving solutions based on cryptography have been proposed by different researchers. Unfortunately none of these four...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.