The ultimate purpose of a pedestrian-detection system (PDS) is to reduce pedestrian-vehicle-related injury. Most such systems tend to adopt expensive sensors, such as infrared devices, in expectation of better perform...
详细信息
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a n...
详细信息
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a new architecture integrating fingerprint with cryptosystem is proposed to protect contents from unauthorized access and illegal redistribution. We describe a scheme integrating anti-collusion code and home page public-key cryptosystem. The proposed scheme is shown feasible and realistic for implementing with respect to computation/communication cost.
As computing is changing and becoming increasingly social in nature, the role of emotions in computing has become ever more relevant and commercial. Emotions are central to culture, creativity, and interaction. The to...
详细信息
A number of Denial of Service (DoS) attacks in IEEE 802.11 are due to unauthenticated/unencrypted management and control frames. Current IEEE 802.11 simulators deal with Physical and MAC layers and do not include the ...
详细信息
A number of Denial of Service (DoS) attacks in IEEE 802.11 are due to unauthenticated/unencrypted management and control frames. Current IEEE 802.11 simulators deal with Physical and MAC layers and do not include the exchange of management and control frames, thus making it difficult to simulate an attack (DoS) and its possible solution. A basic IEEE 802.11 network simulator using Verilog is presented. Basic aim is to design a simulator using a hardware description language (HDL) such as Verilog, since the functions and protocols described in state machines are best simulated using a HDL. Besides simulation of a simple wireless network, the paper also presents simulation of a spoofed MAC disassociation DoS attack and one of its possible solutions. The proposed simulator includes the communication setup process and can be used for simulating other DoS attacks and their possible solutions.
The wide spread acceptance of IEEE WLANs is a result of industrial standardization to ensure product compatibility and reliability among various manufacturers. Several WLANs solutions are available with varying charac...
详细信息
The wide spread acceptance of IEEE WLANs is a result of industrial standardization to ensure product compatibility and reliability among various manufacturers. Several WLANs solutions are available with varying characteristics and interoperability. The IEEE Standard 802.11 is one of the most widely adopted mechanisms for wireless LANs. It defines both physical (PHY) and medium access control (MAC) layer protocol however;it provides limited data confidentiality and has cumbersome procedure for key exchange. In response IEEE introduced a port based network access control standard 802.1x to authenticate and authorize devices interconnected various IEEE 802 LANs. 802.1x only defines authentication not the actual authentication method which allows the developers to construct their own algorithm and consequently a lot of wireless vendors implemented their own 802.1x adaptation such as MD5 Message Digest 5, TLS (Transport Layer Security), TTLS (Tunneled TLS), PEAP (Protected Extensible Authentication Protocol), LEAP (Lightweight Extensible Authentication Protocol) and others. This versatility in 802.1x adaptations has made it difficult for the WLANs users to choose an appropriate mechanism in relation to performance and security of networks. An effort has been made in [1] to carry out comparative analysis of IEEE authentication methods in different security combinations. This work supplements the efforts cited in [1] and incorporates more results in added network configurations. The paper finally recommends the users an appropriate IEEE authentication methods depending upon the need, requirements and security concerns.
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring tha...
详细信息
ISBN:
(纸本)9781424429165
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.
This paper describes a proof-of-the-principle experiment in which maximum entropy learning is used for the automatic induction of shallow morphological features for the resource-scarce Bantu language of Gĩkũyũ. This n...
详细信息
ISBN:
(纸本)9781605603162
This paper describes a proof-of-the-principle experiment in which maximum entropy learning is used for the automatic induction of shallow morphological features for the resource-scarce Bantu language of Gĩkũyũ. This novel approach circumvents the limitations of typical unsupervised morphological induction methods that employ minimum-edit distance metrics to establish morphological similarity between words. The experimental results show that the unsupervised maximum entropy learning approach compares favorably to those of the established AutoMorphology method.
Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually considered after ...
详细信息
Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports ...
详细信息
ISBN:
(纸本)9781615677221
Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports on a research project that was concerned with the life cycle development for large scale data mining projects. The paper provides a detailed view of the design and development of a generic data mining life cycle called DMLC. The life cycle aims to support all members of data mining project teams as well as IT managers and academic researchers and can improve project success rates and strategic decision support. An extensive analysis of eight life cycles leads to a list of advantages, disadvantages, and characteristics of the life cycles. This is extended and generates a conglomerate of several guidelines which serve as the foundation for the development of a new generic data mining life cycle. The new life cycle is further developed to incorporate process, people and data aspects respectively. A detailed study of the human resources involved in a data mining project enhances the DMLC.
In this paper, we present a novel multiple-valued logic circuits design style based on negative differential resistance (NDR) devices and the monostable-to-multistable transition logic (MML) operating principle. We in...
详细信息
暂无评论