Ionian University

Displaying 1-14 of 14 results

  • White Papers // Jan 2013

    A Model for Hybrid Evidence Investigation

    With the advent of information and communication technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist...

    Provided By Ionian University

  • White Papers // Oct 2012

    Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results

    With the advent of Information and Communication Technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist...

    Provided By Ionian University

  • White Papers // May 2012

    Scalable Facility Placement for Communication Cost Reduction in Wireless Networks

    Wireless network nodes, recently powerful enough to assume sophisticated roles, have changed the angle of studying service communication costs in modern, typically large-scale and inherently dynamic, network environments. Communication cost minimization for using a certain service, is one of the challenging issues in these environments. Its ensuing optimization problem is...

    Provided By Ionian University

  • White Papers // Jun 2011

    Non Repudiation in M- Commerce Using Joint Signature Scheme

    Being the hottest issue of today's time there as a lot of work to be done on mobile commerce. In mobile commerce mobile is used to avail a lot of services. One of these services includes online purchasing of different items. Mobile subscribers can by items anywhere at any time...

    Provided By Ionian University

  • White Papers // Feb 2011

    Secure and Privacy-Preserving, Timed Vehicular Communications

    The authors consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one message every...

    Provided By Ionian University

  • White Papers // Dec 2010

    Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey

    Current research in Location-Based Services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order...

    Provided By Ionian University

  • White Papers // Jul 2010

    Mopseus - A Digital Repository System With Semantically Enhanced Preservation Services

    Repository platforms offer significant tools aiding institutions to preserve the wealth of their information resources. This paper presents the data model as well as the architectural features of Mopseus, a digital library service, built on top of Fedora-commons middleware, designed to facilitate institutions to develop and preserve their own repositories....

    Provided By Ionian University

  • White Papers // Jul 2010

    Uncertainty for Anonymity and 2-Dimensional Range Query Distortion

    In this paper, the authors study the problem of anonymity-preserving data publishing in moving objects databases. In particular, the trajectory of a mobile user on the plane is no longer a polyline in a two-dimensional space, instead it is a two-dimensional surface: they know that the trajectory of the mobile...

    Provided By Ionian University

  • White Papers // Apr 2010

    A Distributed Privacy-Preserving Scheme for Location-Based Queries

    In this paper, the authors deal with security and historical privacy in Location Based Service (LBS) applications where users submit accurate location samples to an LBS provider. Specifically, they propose a distributed scheme that establishes access control while protecting the privacy of a user in both sporadic and continuous LBS...

    Provided By Ionian University

  • White Papers // Mar 2010

    Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

    The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In...

    Provided By Ionian University

  • White Papers // Sep 2009

    A Time Efficient Indexing Scheme for Complex Spatiotemporal Retrieval

    The paper is concerned with the time efficient processing of spatiotemporal predicates, i.e. spatial predicates associated with an exact temporal constraint. A set of such predicates forms a buffer query or a Spatio-Temporal Pattern (STP) Query with time. In the more general case of an STP query, the temporal dimension...

    Provided By Ionian University

  • White Papers // Jun 2009

    A Novel Stochastic Approach for Modeling Random Scanning Worms

    Scanning worms grow with different local velocities in different areas, because of non-uniformities that are present in real networks. The present work introduces a new stochastic model elaborating the classical epidemiological model for random scanning strategies. More specifically, random effects in worm spreading velocity are modeled by means of a...

    Provided By Ionian University

  • White Papers // Sep 2008

    Treating Scalability and Modelling Human Countermeasures Against Local Preference Worms Via Gradient Models

    A network worm is a specific type of malicious software that self propagates by exploiting application vulnerabilities in network-connected systems. Worm propagation models are mathematical models that attempt to capture the propagation dynamics of scanning worms as a means to understand their behaviour. It turns out that the emerged scalability...

    Provided By Ionian University

  • White Papers // Sep 2008

    Corfunet: A Mesh Network Providing Wireless Services at Metropolitan Level

    This paper discusses the technology and commercialization challenges of a research initiative intended to establish a wireless metropolitan network for the city of Corfu. Key wireless mesh networking issues are discussed and value for the potential service providers and users of the network is specified. The network development builds on...

    Provided By Ionian University

  • White Papers // Jun 2011

    Non Repudiation in M- Commerce Using Joint Signature Scheme

    Being the hottest issue of today's time there as a lot of work to be done on mobile commerce. In mobile commerce mobile is used to avail a lot of services. One of these services includes online purchasing of different items. Mobile subscribers can by items anywhere at any time...

    Provided By Ionian University

  • White Papers // Feb 2011

    Secure and Privacy-Preserving, Timed Vehicular Communications

    The authors consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one message every...

    Provided By Ionian University

  • White Papers // Dec 2010

    Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey

    Current research in Location-Based Services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order...

    Provided By Ionian University

  • White Papers // Sep 2008

    Treating Scalability and Modelling Human Countermeasures Against Local Preference Worms Via Gradient Models

    A network worm is a specific type of malicious software that self propagates by exploiting application vulnerabilities in network-connected systems. Worm propagation models are mathematical models that attempt to capture the propagation dynamics of scanning worms as a means to understand their behaviour. It turns out that the emerged scalability...

    Provided By Ionian University

  • White Papers // Jul 2010

    Uncertainty for Anonymity and 2-Dimensional Range Query Distortion

    In this paper, the authors study the problem of anonymity-preserving data publishing in moving objects databases. In particular, the trajectory of a mobile user on the plane is no longer a polyline in a two-dimensional space, instead it is a two-dimensional surface: they know that the trajectory of the mobile...

    Provided By Ionian University

  • White Papers // Mar 2010

    Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

    The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In...

    Provided By Ionian University

  • White Papers // Apr 2010

    A Distributed Privacy-Preserving Scheme for Location-Based Queries

    In this paper, the authors deal with security and historical privacy in Location Based Service (LBS) applications where users submit accurate location samples to an LBS provider. Specifically, they propose a distributed scheme that establishes access control while protecting the privacy of a user in both sporadic and continuous LBS...

    Provided By Ionian University

  • White Papers // Jun 2009

    A Novel Stochastic Approach for Modeling Random Scanning Worms

    Scanning worms grow with different local velocities in different areas, because of non-uniformities that are present in real networks. The present work introduces a new stochastic model elaborating the classical epidemiological model for random scanning strategies. More specifically, random effects in worm spreading velocity are modeled by means of a...

    Provided By Ionian University

  • White Papers // Sep 2008

    Corfunet: A Mesh Network Providing Wireless Services at Metropolitan Level

    This paper discusses the technology and commercialization challenges of a research initiative intended to establish a wireless metropolitan network for the city of Corfu. Key wireless mesh networking issues are discussed and value for the potential service providers and users of the network is specified. The network development builds on...

    Provided By Ionian University

  • White Papers // May 2012

    Scalable Facility Placement for Communication Cost Reduction in Wireless Networks

    Wireless network nodes, recently powerful enough to assume sophisticated roles, have changed the angle of studying service communication costs in modern, typically large-scale and inherently dynamic, network environments. Communication cost minimization for using a certain service, is one of the challenging issues in these environments. Its ensuing optimization problem is...

    Provided By Ionian University

  • White Papers // Jul 2010

    Mopseus - A Digital Repository System With Semantically Enhanced Preservation Services

    Repository platforms offer significant tools aiding institutions to preserve the wealth of their information resources. This paper presents the data model as well as the architectural features of Mopseus, a digital library service, built on top of Fedora-commons middleware, designed to facilitate institutions to develop and preserve their own repositories....

    Provided By Ionian University

  • White Papers // Sep 2009

    A Time Efficient Indexing Scheme for Complex Spatiotemporal Retrieval

    The paper is concerned with the time efficient processing of spatiotemporal predicates, i.e. spatial predicates associated with an exact temporal constraint. A set of such predicates forms a buffer query or a Spatio-Temporal Pattern (STP) Query with time. In the more general case of an STP query, the temporal dimension...

    Provided By Ionian University

  • White Papers // Oct 2012

    Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results

    With the advent of Information and Communication Technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist...

    Provided By Ionian University

  • White Papers // Jan 2013

    A Model for Hybrid Evidence Investigation

    With the advent of information and communication technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist...

    Provided By Ionian University