The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a geocasting forwarding scheme for mobile nodes in vehicle ad hoc networks. Geocasting is used for sending messages to nodes in a specified area. In this paper, we invest the concept of Fermat point region, a region that the sum of distances of the vertices of the triangle to this region is minimum, to forward packets. The Fermat point regions (FPRs) are used as routing regions...
The structure of block ciphers can be separate to three part: algorithm, operation mode and Padding mode. Therefore the Cipher service provider interface of JCA can be improved for programmer. In this paper, we design the interface which can be used to efficiently construct the service of block cipher in JCA.
This paper has three major contributions. First, a vehicular ad-hoc network (VANET)-based A* (VBA*) route planning algorithm is proposed to calculate the route with the shortest travelling time or the least oil consumption, depending on two real-time traffic information sources. The first one is the recorded traffic information of the road segment that the vehicle has passed through. This traffic...
The study proposes a new interactive-video e-learning system, and the experiment targets are medical interns. The medical interns are necessary to learn through a variety of clinical cases. The system provides the function of case-based multimedia teaching materials. The medical records are depending on different cases, and instructors can online upload and edit them. The record includes text, image,...
In this paper, we propose an anonymous car rental protocol based on NFC technology. Our main contributions include: (1) Anonymity. Users provide their personal information to a trusted third party (TTP) only. The car hire providers cannot get users' real identity. (2) Unlink ability. Car rental companies are unable to establish any link between users' rental records and users' identity simply by analyzing...
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved biometric based three-factor remote user authentication scheme. An's scheme improves the security problems of previous schemes while keeping the efficiency. However, after detailed analysis, we find that An's scheme exists some weaknesses such as vulnerable to denial-of-service...
Grid/Cloud Computing is proved to be the most viable solution for e-Science as well as e-business and the new research paradigm by global collaboration and resource sharing. WLCG (Worldwide LHC Computing Grid) and EGI (European Grid Initiative) have been moving from a production system toward a sustainable infrastructure. The new generation infrastructure would be composed by Grid of Grids/Clouds,...
Cloud computing brings more flexible options for the Small and Medium Business (SMB). With the help of public cloud, such as Google Docs, the SMBs are able to share their business information in lower cost but higher efficiency. Integrity between local storages and the clouds is a critical issue which often messes up the SMBs' digital assets in a hybrid environment. The downside makes SMBs reluctant...
As much of the web information nowadays is published by roaming mobile users, and these mobile users may get services from various foreign agents, security, privacy and authentication are important for the roaming service in global mobility networks. In 2011, Chen et al. proposed a lightweight and provably secure user authentication scheme with anonymity for roaming service. We first show that their...
Biometric based access control systems (BACS) are widely used for robust and reliable identity verification, but these systems also raise some serious privacy concerns. The biometric templates, used for access control process, are stored in the system database which is vulnerable to variety of attacks. This paper presents a two stage solution for securing human iris templates used for BACS. The proposed...
An identity-based sequential aggregate signature (IBSAS) scheme provides a shorter aggregate signature for multiple signers in which each signer has signed his/her own message and all generated signatures are aggregated in sequence. During aggregate signature verification process, a verifier can identify the generated order and the validity of signatures. In 2012, Dou et al. first proposed two new...
We present a method of automated vulnerability finding in protocols that use contactless smart cards. We focus on smart cards with contactless interface because they are simpler than their counterparts with contact interface and provide less functionality, which can be modeled more easily. Our method uses model checking to find possible attacks in a model of the protocol implementation on particular...
Remote user authentication is an important and efficient method to ensure security for many network-based application systems. So far, several dynamic identity based authentication schemes have been proposed to protect the user's anonymity. Recently, Sood pointed out the security weaknesses of a dynamic identity based authentication scheme, which was proposed by Wang et al. presented an improved scheme...
The DIBR technique generates a 3-D perception through a 2-D color and a depth map sequences. Compressing depth map sequence is necessary for storage and transmission considerations. However, the tradeoff between bit rate reduction and quality degradation from compression should be addressed. We propose a bit rate-saving intra coding scheme which modifies, prior to compression, each depth map to minimize...
In this research, we implement a biometric authentication system on the Android platform, which is based on a text-dependent speaker recognition. The application makes use of the Modular Audio Recognition Framework (MARF), from which some of the algorithms are adapted in the pre-processing and feature extraction. In addition, we employ the Dynamic Time Warping (DTW) algorithm in the training and comparison...
Computation-aware (CA) scheme has been proposed to efficiently allocate computational resources. However, the computations of motion estimation could be overloaded in limited computing environments, even using the CA algorithms. In this paper, we introduce a method that achieves motion estimation in the extremely insufficient computation power. We proposed a low-distortion based PCDB list to achieve...
With the progress of science technology and the vehicle industry, there are more and more vehicles on the road. As a result, the heavy traffic often leads to more and more traffic accidents. In common traffic accident, the driver's inattention is usually a main reason. To avoid this situation, this paper proposes a sleepy eye's recognition system for drowsiness detection. First, a cascaded Adaboost...
MapReduce has become one of the most popular programming model for big data analysis in cloud systems due to its simplicity for implementing data parallel applications. There are several platforms for users to develop their applications based on MapReduce framework such as Hadoop and Twister. Hadoop is one of the most popular runtime systems for MapReduce applications and supported by various organizations,...
In this paper, we analyze the precision of the tilting angles transferred from a 3-axis accelerometer with the previously proposed CORDIC-based tilting angle identification algorithm. We found out two issues of the original 2D-CORDIC operations which would increase the errors of the calculated angles. Hence, we propose the solutions to further enhance the precision of tilting angles calculated in...
THIS PAPER PRESENTS AND DETAILS THE INVESTIGATIONS INTO THE EFFECTIVENESS OF VARIOUS SCORE LEVEL FUSION APPROACHES IN BOTH MULTI-SAMPLE AND MULTIMODAL BIOMETRIC SYSTEMS. EXPERIMENTAL INVESTIGATIONS ARE CONDUCTED USING FACE AND SPEECH MODALITIES. THE SCORES FOR FACE AND VOICE BIOMETRICS ARE BASED ON THE USE OF DIFFERENT FEATURES EXTRACTED FROM THE XM2VTS DATABASE. THESE SCORES ARE PROVIDED BY IDIAP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.