In this paper we propose a novel location-privacy preserving mechanism for Location based services. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users’ location to the server; we propose a mechanism in which a user can hide in the mobile crowd while […]
Interpreting the Public Sentiment Variations on Twitter
This paper presented a study on the implementation of fault-tolerant network interfaces for NoCs. A fault-free network interface assumes a particular relevance in the design of a reliable multiprocessor system-on chip (MPSoC). In this paper, we focus on an NI providing basic communication services. Presented fault models and fault-tolerant techniques can be, however, extended to […]
A New Compression Algorithm for Fingerprint Image
This paper proposed a fingerprint compression based on sparse representation. The proposed method has the ability by updating the dictionary. The specific process is as follows: construct a base matrix whose columns represent features of the fingerprint images, referring the matrix dictionary whose columns are called atoms; for a given whole fingerprint, divide it into […]
KEPTE Key Pre-distribution Based Tag Encoding Scheme
This paper presents mathematical relations in linear network coding and proposes a key pre-distribution-based tag encoding (KEPTE) scheme to detect polluted data packets. This paper also quantitatively gave the security analysis of KEPTE and compared its performance and overhead with other schemes. The main advantages of KEPTE can be summarized as: 1) It is computationally […]
Design and Implementation of a Technique for a Capacitive Touch Screen
This paper presented the design and implementation of a technique to transmit information through a capacitive touch screen. The key idea is to exploit the pervasive capacitive touch screen and touchpad input devices as receivers for an identification code transmitted by hardware identification token. While the token can take many forms, we consider here an […]
OME -A New Paradigm for GUI Testing
In this paper we develop a new paradigm for GUI testing, called Observe-Model-Exercise (OME*). We make use of a new context-aware mapping that maintains information about the event sequences that were used to reach model elements. We simultaneously extract new GUI model elements—events and follows relationships—during test execution. We develop a unique signature for each […]
CaRP – Framework for graphical Password
Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots. This paper introduce a new security primitive based on hard AI problems, namely, a novel family of graphical password systems integrating Captcha technology, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical […]
Cloud-Assisted Privacy-Preserving E-Health System
This paper proposed a cloud-assisted mobile-access of health data with privacy and audit-ability. The system consists of two components: searchable encryption and auditable access control. Upon receiving the health data from users, the private cloud processes and stores it on public cloud such that storage privacy and efficient retrieval can be guaranteed. The private cloud […]
A Study on Online Service Migration from a Competitive Analysis Perspective
This paper introduces the service migration problem and formalize, it in the competitive analysis framework. For a single-server setting, we present a randomized online algorithm MIX and a deterministic online algorithm CEN that achieve a competitive ratio of in the worst case, i.e., without any knowledge of the future demand, where is the substrate size. […]
A Novel Network Security Metric Computation and Application
In this paper, we propose a novel network security metric, k-zero day safety. This is among the first efforts on network security metrics that is capable of modeling the security risk of unknown zero-day attacks. The metric would bring about new opportunities to the quantitative evaluation, hardening, and design of secure networks. We then studied […]
- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- …
- 15
- Next Page »