The Internet has become in a place for the exchange and publication of data. Nowadays, Web portals serve as an important means to access information. In this context, the concepts of quality in general and of data qua...
详细信息
To generate a multi-document extractive summary, the measurement of sentence relevance is of vital importance. Earlier work, exploring statistics of textual terms at the word (surface) level, faces the problem that th...
详细信息
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks i...
详细信息
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a...
详细信息
Describing CSCL scenarios can be performed in a standard way. To do so, Instructional Design or so called Learning Design (LD) can be used for describing CSCL scenarios by mean of a de facto specification known as IMS...
详细信息
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route re...
详细信息
ISBN:
(纸本)9781424443376
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route request phase, source nodes will discovery multiple routes to the destination node, one for primary path, and the others for the backup paths. During the discovery procedure, each node will estimate the link expire time by way of the moving speed and direction of the precursor node. When a link breakage is about to occur, source node will try to switch the transmission to the backup route. The simulation result shows that ARSMA is able to improve the delivery ratio and reduce the end-to-end delay.
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed...
详细信息
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications ...
详细信息
ISBN:
(纸本)9781605583945
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems. we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ciphertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead. Copyright 2009 ACM.
暂无评论