Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important […]
A Report-based payment scheme for Multihop Wireless Networks
We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store indisputable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., […]
Degraded Document Images Binarization Technique
In this paper, we propose a novel document image binarization technique that addresses these issues by using adaptive image contrast. The adaptive image contrast is a combination of the local image contrast and the local image gradient that is tolerant to text and background variation caused by different types of document degradations. In the proposed […]
IMPROVED COLOR BARCODE WITH INTERFERENCE CANCELLATION
we propose a model-based interference cancellation procedure to overcome interference that is computationally inexpensive and provides a significant performance improvement. Specifically, we exploit this spectral diversity to realize a three-fold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary […]
A novel method to extract features for iris recognition system
IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode […]
Secure Management of Personal Health Records by Applying Attribute-Based Encryption
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ […]
Efficiently achieving data staging and caching in a cloud system
In this paper, we study this data staging problem by leveraging the dynamic programming (DP) techniques to optimally migrate, replicate, and cache the shared data items in cloud systems with or without some practical resource constraints in an efficient way while minimizing the monetary cost for transmitting and caching the data items.To this end, we […]
CLEAN-SLATE ROUTING IN SENSOR NETWORKS
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ […]
Towards Privacy-Preserving Location proof Updating System
Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicioususers to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy -Preserving Location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs […]
Optimal Geographical Forwarding using Relay Selection in Wireless Sensor Networks with Sleep-Wake Cycling Nodes
Our work is motivated by geographical forwarding of sporadic alarm packets to a base station in a wireless sensor network (WSN), where the nodes are sleep-wake cycling periodically and asynchronously. We seek to develop local forwarding algorithms that can be tuned so as to tradeoff the end-to-end delay against a total cost, such as the […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- 12
- Next Page »