The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, the sharing of open data in any city is importance. The shared data, e.g., flood monitoring data, earthquake data, or traffic data, can be used to improve the way of human life. MQTT, the lightweight messaging protocol based on the publish-subscribe concept, is the most popular protocols used to share these data. There are two elements of MQTT messaging for sharing of any data; topic and...
Honey encryption (HE) is a novel password-based encryption scheme which is secure against brute-force attack even if users' passwords have min-entropy. However, because decryption under a wrong key produces fake but valid-looking messages to everyone, typos in password may confuse even legitimate users in HE. This has been one of the most challenging problems in HE. In this paper, we propose two types...
In order to realize the real-time collection of network information, to achieve energy saving and fault monitoring, it puts forward a method of monitoring the power consumption information based on the network data analysis. The method can use SNMP and MIB to collect the power information of the power equipment in different networks, including the CPU occupancy rate, physical and virtual memory usage...
We propose two secure protocols namely private equality test (PET) for single comparison and private batch equality test (PriBET) for batch comparisons of l-bit integers. We ensure the security of these secure protocols using somewhat homomorphic encryption (SwHE) based on ring learning with errors (ring-LWE) problem in the semi-honest model. In the PET protocol, we take two private integers input...
Address Resolution Protocol (ARP) traffic typically makes up a very significant amount of broadcast traffic in a wide range of networks. A common approach to reduce the network overhead of ARP in the context of Software Defined Networks (SDN) is via Proxy ARP, where the SDN controller answers ARP requests on behalf of the hosts. In this paper, we present a significant improvement of this approach,...
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many security functionalities, but it is hard...
Middleware in Internet of Things ecosystem plays an important role. Its role is to hide the complexity of connected devices and to provide services to domain-oriented applications that ease the development and support of these applications. Middleware should be able to work with the devices using different protocols, data models and terms. In this paper we describe a middleware, called SemIoT Platform,...
This paper presents a distributed architecture for asynchronously implementing a class of nonlinear signal processing systems as web services, which in turn can be used to solve a broad class of optimization problems. As opposed to requiring specialized servers, the presented architecture requires only the use of commodity database backends as a central resource, as might typically be used to serve...
The growth of the Internet of Things (IoT) creates the possibility of decentralized systems of sensing and actuation, potentially on a global scale. IoT devices connected to cloud networks can offer sensing and actuation as a service enabling networks of sensors to grow to a global scale. But extremely large sensor networks can violate privacy, especially in the case where IoT devices are mobile and...
Forensic Voice Comparison (FVC) is increasingly using the likelihood ratio (LR) in order to indicate whether the evidence supports the prosecution (same-speaker) or defender (different-speakers) hypotheses. In addition to support one hypothesis, the LR provides a theoretically founded estimate of the relative strength of its support. Despite this nice theoretical aspect, the LR accepts some practical...
This paper describes a new spoken dialog portal that connects systems produced by the spoken dialog academic research community and gives them access to real users. We introduce a distributed, multi-modal, multi-agent prototype dialog framework that affords easy integration with various remote resources, ranging from end-to-end dialog systems to external knowledge APIs. The portal provides seamless...
Privacy-preserving string search is a crucial task for analyzing genomics-driven big data. In this work, we propose a cryptographic protocol that uses Fully Homomorphic Encryption (FHE) to enable a client to search on a genome sequence database without leaking his/her query to the server. Though FHE supports both addition and multiplication over encrypted data, random noise inside ciphertexts grows...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
In this paper we propose a publicly available static hand pose database called OUHANDS and protocols for training and evaluating hand pose classification and hand detection methods. A comparison between the OUHANDS database and existing databases is given. Baseline results for both of the protocols are presented.
This paper proposes an ensemble based automatic speaker recognition (ASV) using adapted score fusion in noisy reverberant environment. It is well known that background noise and reverberation affect the performance of the ASV systems. Various techniques have been reported to improve the robustness against noise and reverberation, and an ensemble based method is one of the effective techniques in the...
The integration, mining, and analysis of person-specific data can provide enormous opportunities for organizations, governments, and researchers to leverage today's massive data collections. However, the use of personal or otherwise sensitive data also raises concerns about the privacy, confidentiality, and potential discrimination of people. Privacy-preserving record linkage (PPRL) is a growing research...
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, electronic identification (eID) schemes have been introduced that involve many service providers (SPs) and identity providers (IDPs) which verify the identity of users...
This study presents the development of a system which can automatically recognize home appliances based on a dataset of electric consumption profiles. The authors report the creation of AGILASx, a dataset of 50 common home appliances and devices in the Philippines. The dataset is populated with 100 appliance signatures in .XML format acquired using plug-based sensors. Each appliance signature consists...
Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed...
In this paper, we analyze some of our real-world deployment of face recognition (FR) systems for various applications and discuss the gaps between expectations of the user and what the system can deliver. We evaluate some of the existing algorithms with modifications for applications including FR on wearable devices (like Google Glass) for improving social interactions, monitoring of elderly people...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.