Science and Development Network (SciDev.Net)

Displaying 1-40 of 756 results

  • White Papers // Oct 2013

    Improved NC Association Security Model Based on Bluetooth 4.0

    In this paper, the potential security weaknesses in the process of secure simple pairing which is introduced by Bluetooth 4.0 are analyzed, and an improved method of secure simple pairing is proposed to compensate the security concerns. A reliable security protocol is proposed to compensate the vulnerabilities of the existing...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Key Distribution Using Double Keyed-Hash Chains for Wireless Sensor Networks

    As a security primitive, key establishment plays the most crucial role in the designing of the security mechanism in the Wireless Sensor Networks (WSNs). Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for WSNs. In this paper, the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Robust Behavior Modeling for Detecting Hard-Coded Address Contained Shellcodes

    Now-a-days, code injection is one of the most dangerous cyber attacks. Shellcode is a malicious code which is used in this type of attack. Processor emulation at network level is one of the best proposed methods against code injection attacks. Multiple run-time heuristics have been discussed in previous researches. However,...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A New Fast and High Performance Intrusion Detection System

    The cyber-attacks represent one of the most dangerous secret weapons. Intrusion detection system is an important tool to protect the authors' systems and networks against the various forms of attacks. The purpose of this paper is to build a fast and high performance hybrid hierarchical intrusion detection system called NFPHIDS...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph

    Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. Matching the API call graph using graph matching algorithm have NP-complete problem and...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC

    Recently, smart devices for various services have been developed using converged telecommunications, and the market for Near Field Communication (NFC) mobile services is expected to grow rapidly. This property makes the standard suitable for mobile coupon applications. However, mCoupons differ significantly from paper-based coupons because unprotected data can be easily...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Content Reuse Prevention Scheme to Prevent Privacy Invasion of Social Network Service

    A Social Networking Service (SNS) is an open service that enables its users to communicate freely without being constrained by time or space. In an SNS, users can share various types of content (such as pictures and videos) with government agencies, celebrities, and many other users online. If a person...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)

    SQLIA, attacker injects an input in the query in order to change the structure of the query intended by the programmer and therefore, gain access to the data in the underlying database. Due to the significance of the stored data, web application's security against SQLIA is vital. In this paper,...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Platforms and Applications in Hardware Security: Trends and Challenges

    In this paper, the authors introduces a few research studies being conducted that are using multicore embedded systems, highlighting the challenges and questions relevant to R&D (Research and Development) in computer systems architecture, focusing on design aspects and optimization of embedded systems that needs to run security solutions or crypto-graphical...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Network Security Threats Situation Assessment and Analysis Technology Study

    When low level services suffer attacks, the high level services that depend on them will suffer from indirect threats. Most evaluation methods do not consider dependency relationships among services, lack the evaluation upon indirect threats, do not discuss the composition of multiple source threats. Upon these problems, an evaluation method...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    An Improved Algorithm of Elliptic Curve Cryptograph

    So far, the Elliptic Curve Cryptosystem (ECC) provides the highest strength-per-bit of any cryptosystem. The fast implementation of elliptic curve cryptosystem key algorithms, namely, Scalar Multiplication, is studied in this paper. The limitation of the traditional fixed point comb method is analyzed, and on the basis of the study improvement...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic

    Today the scale, complexity and intensity of denial of service attacks has increased many folds. These attacks have moved from simple flooding based attacks to sophisticated Application based attacks as well as Protocol specific attacks. The challenge is to develop detection algorithms that can distinguish between the attacks like the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Secure Communication based on a Fractional Order Chaotic System

    This paper studied the fractional order chaos of PMSM system. The process that PMSM system change into chaos with the variation of fractional order is revealed by bifurcation analysis. According to the stability theory, the stability of equilibrium point of PMSM system is analyzed. In the same way, some representative...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Construction of Trusted Wireless Sensor Networks With Lightweight Bilateral Authentication

    Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, security threats need to be addressed and, taking into account its limited resources, the use of lightweight authentication...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Attack Graph Algorithm in the Application of Intrusion Detection System

    In order to discover the network vulnerability timely and solve the very serious problems of network security, this paper puts forward the attack graph which is based on intrusion detection method. The method uses the generation global network attack graph algorithm to build network initial attack graph, and call attack...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Heuristics-Based Static Analysis Approach for Detecting Packed PE Binaries

    Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, the authors present a static heuristics based approach for the detection of packed executables. They present the PE heuristics considered for analysis and taxonomy of heuristics; a method for computing the score...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    An Adaptive Method for Source-End Detection of Pulsing DoS Attacks

    The intermittent attacking behavior of Pulsing Denial of Service (PDoS) attacks poses a real challenge to the existing DoS detection methods. In this paper, an adaptive method is presented to meet this challenge. Three features distinguish this method from others. No assumption is made on the distribution of the traffic...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Intrusion Detection Ensemble Algorithm based on Bagging and Neighborhood Rough Set

    Intrusion detection data often have some characteristics such as nonlinearity, higher dimension, much redundancy and noise, and partial continuous-attribute. This paper presents a new ensemble algorithm to improve intrusion detection precision. Firstly, it generates multiple training subsets in difference by using bootstrap technology. Then using neighborhood rough sets with different...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Mutual RFID Security Protocol for Wireless Reader

    Radio Frequency IDentification (RFID) is an automatic identification technology to remotely store and retrieve data, and has been used in various application fields. Wireless readers are used more and more widespread, it brings higher design requirements for RFID protocols. Based on wireless communication, signal broadcasting, and non-symmetry between the forward...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Policy Direction of QoS Interworking and Management Among Service Providers for Broadcast-Communication Convergent Services

    As the Internet technology evolves, the number of users enjoying not only communication services but also broadcast services through communication networks increases and the issues on Quality of user Experience (QoE) are on the rise. The convergent services are usually provided in an end-to-end manner via multiple heterogeneous carriers' network....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Novel Method to Avoid Malicious Applications on Android

    Security threats on modern Smartphones are increased rapidly with the excessive numbers of the users. According to the reports, it is exposed that most security issues are introduced from usage of malicious applications. Operating systems with the permission model, such as Android, accept one to install third-party applications. This leads...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Implementing Database Methods for Increasing the Performance of Intelligent CCTV

    This paper is written for intelligent CCTV (Closed-Circuit TeleVision) which has been important in the aspect of industrial value and social security these days. Because the intelligent CCTV can identify behavior and object automatically, and it has been used extensively. With spread use, the performance of the intelligent CCTV has...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Logistic Neural Network Approach to Extended Warranty Claims

    An extended warranty, sometimes called a service agreement, a service contract, or a maintenance agreement, is a prolonged warranty offered to consumers. Studying the extended warranty is extremely important for business investors and policymakers for effective warranty planning. However, measuring, forecasting and tracking the global diffusion of extended warranty have...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Experimental Study of DDoS Defense System for Web Service

    Web services have become major targets of DDoS attacks that can inflict the most serious damage in terms of availability. The DDoS attack is one of the most serious threat to Internet services and further there is no perfect solution to defend against variously modified attacks to heterogeneous Internet services....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

    Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator under a common Command-and-Control (C&C) infrastructure. In this paper, the authors proposed a new general detection strategy. This proposed strategy was based on degree distributions of node and abnormal net flows, and combined with data mining...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    A Similarity Search Scheme Over Encrypted Cloud Images Based on Secure Transformation

    With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Server Re-Tag Provable Data Possession in Public Cloud

    Integrity checking becomes imperative to secure data in a cloud environment. In this paper, the authors propose Server Re-Tag Provable Data Possession (SRT-PDP). By utilizing proxy re-signatures, they allow the cloud severs as the group manager to re-sign blocks after the client sign the shared data, so that existing clients...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Data Fusion With Reduced Calculation for Contextual Inference

    For any event taking place in the real world, whose information has not been obtained previously, or any event that goes beyond the boundary of data modeling, they used DST by evaluating the signals from sensors or interpreting the implied meaning of those signals and fussing them to make inference....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Template Design of Automatic Source Code Generation Based on Script Language Used in Cloud Robot Compiling Environment

    The existing robot programming education consumes a lot of time in the process of building compile environment. Therefore, a robot developer should study many languages for development of firmware. To solve this problem, the authors proposed the script language to compile in cloud environment. The proposed script language reduces time...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    Efficient Mobile Business Development Based on Business Process Framework

    This paper applies mobile app. development from the existing web page business through the Business Process Framework (BPF). To apply BPF, the authors should modify & add the needed functions for mobile app. development, and also the layer structure of BPF to integrate the modeling information that needs to develop...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Oct 2013

    An Empirical Study to Compare the Performance of Some Symmetric and Asymmetric Ciphers

    In this paper, the authors present empirical results obtained from Java implementation of Elliptic Curve Cryptosystem (ECC) as an asymmetric block cipher algorithm and a set of symmetric block cipher algorithms namely Triple-Data Encryption Standard (T-DES), Advanced Encryption Standard (AES), and Blowfish. Performance evaluation based on CPU execution time is...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Aug 2013

    Object-Oriented Analysis and Design Methodology for Secure Web Applications -Focused on Role Based Access Control-

    In order to develop such web-based application systems efficiently, object-oriented analysis and design methodology is used, and Java EE (Java Platform, Enterprise Edition) technologies are used for its implementation. In addition, security issues have become increasingly important. Consequently, since the security method by Java EE mechanism is implemented at the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Aug 2013

    A Study on Data Analysis Process Management System in MapReduce Using BPM

    MapReduce is a distribution-system-based programming model to process massive data and has been utilized as an analysis model not only in the academic world but also in the industrial fields. However, developers who implement MapReduce have some deficiency in understanding the data analysis, while data analysts have difficulty in programming...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Aug 2013

    Least Privilege for Database Administrators

    In today's world, despite layered protections, intruders, insiders and financially-motivated attackers will try to exploit privileged accounts to access sensitive application data. When it comes to the database, this includes abuse of privileged user accounts that have the powerful DataBase Administrator (DBA) role. Because of the extensive access given to...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Aug 2013

    A Design of Dynamic Database Middleware System for Plant Factory

    General middleware for WSN/M2M/IoT service limited functions with pre-defined types of devices, sensors and controllers for indoor or outdoor environment monitoring and managing Plant Factory. And thus, it requires additional setup expense in the system and further configuration for defining new devices. So, it would be valuable to apply adaptive...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2013

    Privacy Models for RFID Authentication Protocols

    Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, the authors consider privacy issues in RFID systems where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2013

    Design Study of the U-City Home Network Based on the CEaaS of Cloud Computing

    According to the recent advancement of wired and wireless communication network technology such as mobile communication and high-speed Internet, home network service based on Internet information appliance makes great strides. Particularly, the UPnP based technology that guarantees QoS (Quality of Service) for heterogeneous devices is now applied to the development...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2013

    A Cloud based Smart Education System for e-Learning Content Services

    An increasing number of universities and educational institutions in the USA and UK are adopting cloud computing not only for increased cost savings but also for improving the efficiency and convenience of educational services. This paper proposes a cloud-based smart education system for e-learning content services to delivering and sharing...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2013

    Designated-Verifier Provable Data Possession in Public Cloud

    Integrity checking becomes imperative to secure data in a cloud environment. In this paper, the authors propose Designated Verifier Provable Data Possession (DV-PDP). In public clouds, DV-PDP is a matter of crucial importance when the client cannot perform the remote data possession checking. They study the DV-PDP system security model....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2013

    ResSig: An Resource Constraint Based Malware Behavioral Signature

    Attacker obscures malware into different versions, making syntactic nature based detection ineffective. State-of-the-art behavioral signature, behavior graph, is effective but unfortunately too complicated to be extracted from malware samples. In addition, malware detection using behavior graph is NP-Complete, thus it is too slow to be used in real-time detectors. This...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    The Characteristics of Smartwork Security Compare to Traditional Telework

    Smartwork has been thought to satisfy both employee and company's interests. Nonetheless, there are critical barriers of introducing smartwork because of security problem. In order to derive threats and vulnerabilities of smartwork, the authors derive threats through structured interview with heavy users or designers of smartwork, then verify the derived...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Hidden Attribute Certificate-Based Encryption Extensions Model

    An encryption extensions model based on hidden attribute certificate is proposed in this paper, which can represent any key by using "And", "or" Logic and the threshold monotony of the access rules, and in order to resist the collusion attack, multiple users use a combination of their keys to decrypt...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Sep 2011

    Equivalent Key Recovery Attack on H2-MAC Instantiated with MD5*

    This paper presents the first equivalent key recovery attack on H2-MAC-MD5, which conduces to a selective forgery attack directly. H2-MAC is similar with HMAC except that the outer key is omitted. For HMAC-MD5, since the available differential paths are pseudo-collisions, all the key recovery attacks are in the related-key setting,...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    An Action Based Access Control Model for Multi-Level Security

    The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multi-level security management is widely used in operation systems and information management systems. Focus on the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Equivalent Key Recovery Attack to H2-MAC

    In this paper, the authors propose an efficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). They can successfully recover the equivalent key of H2-MAC in about 2n=2 on-line MAC queries...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    A Novel Nonlinear Network Coding Signature Scheme Determined by the SIS Problem

    Network coding signature schemes can be employed to pre-vent malicious modification of data in network transition. But existing network coding signature schemes are only suitable for linear network coding. To adapt to nonlinear network coding, in this paper the authors introduce the concept of nonlinear network coding signature scheme and...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    SPA: Self-certified PKC-based Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks

    As an important component of Intelligent Transportation Systems (ITS), vehicular ad-hoc networks can provide safer and more comfortable driving circumstance for the drivers. Pseudonyms certificate and group-oriented signature are two most widely adopted privacy-preserving technique in VANET. However, the two methods exists many efficiency flaws which affect their application. To...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Efficient Virtual Machine Scheduling Exploiting VCPU Characteristics

    Xen supports CPU-intensive domains fairly well, however, it has drawback for supporting I/O domains because I/O domain requires low latency data processing. In this paper, the authors propose a VCPU scheduling framework exploiting VCPU characteristics for supporting accurate resource measuring scheme. Their approach categorizes the VCPU characteristics into three model,...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Efficient Data Deduplication System Considering File Modification Pattern

    In a data deduplication system, the performance of data deduplication algorithms is varying on the condition of file contents. For example, if a file is modified at the end of file region then Fixed-Length Chunking algorithm superior to Variable-Length Chunking in terms of computation time with similar space reduction result....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Analysis of Urban Transit Environment for Video Analytics Application and Processing Scenarios

    In order to apply the video analytic algorithms in metro railway system, the input images should be classified according to the camera installation environment and its role to handle corresponding events. Before the authors implement the integrated surveillance system at subway stations, they investigated the required camera's role at each...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Information Hiding Scheme with Reversibility Using Difference Segmentation and Histogram Adjustment

    Secret data delivery is a most important activity in the modern life. Steganography technique uses a cover medium to carry secret data and deliver it to right receivers over public computer networks. Because a stego medium is easier to cheat an unexpected user's observation, Steganography technique is more suitable for...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Integrated Surveillance System and Field Test in Urban Transit System

    The security issue in urban transit system has been widely considered as the common matters in mass transition system. The safe urban transit system is highly demanded because of the vast number of daily passengers, and providing safety is one of the most challenging projects. The authors implemented a field...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Model-Driven Secure Development Lifecycle

    Building security into software development lifecycles and doing it right is hard. To address the challenge, several prominent organizations have published process-oriented security guidelines to bring security activities into a structured way. Although these efforts contribute to measurable improvements in software and system security, they are often too verbose and...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Evaluation of Time Complexity Based on Max Average Distance for K-Means Clustering

    Clustering method is used in diverse scopes, namely, information retrieve, communication security system, data mining, etc. It is divided into hierarchical clustering, partitioning clustering, and more. K-means is one of partitioning clustering. The authors improve performance of K-means to select initial centers of cluster through calculating rather than random selecting....

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Construct a New ELGamal-Type Public Key Cryptography Over Finite Field

    A new ELGamal-type public key cryptosystem using ergodic matrix is proposed in this paper, which is based on isomorphism over finite field. The security of this scheme is equal to the intractability of polynomial discrete logarithm problem over finite field in the standard mode. At the same time, an optimization...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Intrusion Trace Classification Using Inter-Element Dependency Models with K-Truncated Generalized Suffix Tree

    Policy has been widely used in field information security. Semantic policy has being widespread concerned by the academic and industry world due to its powerful ability of expression. While policy conflicts have become a key issue constraining its application. In this paper, first a Semantic Security Policy Language (SSPL) is...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Optimized Discriminant Locality Preserving Projection of Gabor Feature for Biometric Recognition

    Discriminant Locality Preserving Projection (DLPP) cannot obtain optimal discriminant vectors which utmostly optimize the objective of DLPP. This paper proposed a Gabor based Optimized Discriminant Locality Preserving Projections (ODLPP) algorithm which can directly optimize discriminant locality preserving criterion on high-dimensional Gabor feature space via simultaneous diagonalization, without any dimensionality reduction...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    A Reputation Evaluation Technique for Web Services

    To select a most trustworthy one among web services with the same functionality, a trust and reputation management framework for web service selection is proposed. A reputation evaluation algorithm is proposed for the new added web service based on the similarity theory. Similarities and trusts are used as weights for...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Secure ebXML Business Transaction Models Applying Web Service Security Standards

    ebXML is an e-business standard which enables enterprises to exchange business messages, conduct trading relationships, communicate data in common terms and define and register business processes using Web services. ebXML business transaction models are proposed which allow trading partners to securely exchange business transactions by employing Web service security standard...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    A Semantic Rule-Based Detection Scheme Against Flooding Attacks on Cloud Environment

    With the progress the Internet, more and more applications provide Web services. This paper shows web page has evolved to be dynamic. User also can interact with the web page. Some malicious users have malicious browsing behaviors, such as flooding attack, to waste the resources and bandwidth of the host...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Performance Analysis of Graph Laplacian Matrices in Detecting Protein Complexes

    Detecting protein complexes is an important way to discover the relationship between network topological structure and its functional features in Protein-Protein Interaction (PPI) network. The spectral clustering method is a popular approach. However, how to select its optimal Laplacian matrix is still an open problem. Here, the authors analyzed the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Security Requirements of a Mobile Device Management System

    Many enterprises are adopting Mobile Device Management systems to monitor the status and control the functionalities of Smart phones and Tablet PCs in order to solve the security problems of confidential enterprise data being leaked whenever a device is misused or lost. However, no criteria have been established as yet...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    An Action Based Access Control Model for Multi-Level Security

    The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multi-level security management is widely used in operation systems and information management systems. Focus on the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    The Design and Analysis of a Hardware-Based Anomaly Detection Scheme

    The authors propose and analyze a novel approach for security based on an execution behavior of an application program, which aims at detecting previously unknown anomaly execution patterns. Their scheme, which is a sort of hardware-based approach, uses the basic block information of an application program for the purpose of...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    A Novel Approach for SMS Security*

    In this paper, the author present Common Public Key Cryptography for SMS security. An SMS has two discussions. At the first, an SMS should be monitored by adapted agency or government because it can be abused to crime. Next the SMS increases a double charge in occurrence of communication. For...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    An Eficient Wrapper-Based Digital Rights Management

    In this paper, the authors propose a novel digital publication issuing mechanism, which supports business model, and implemented the system. In this mechanism, they adopted API-HOOK to avoid changing habits of customers. However, the properties of digital contents make themselves be easily copied and transferred if there is not any...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2012

    Voucher Web Metering Using Identity Management Systems

    Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher scheme that uses an identity management systems solution to incorporate a Web Metering function. The proposed scheme runs transparently to the visitor and utilizes security properties available in identity...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2011

    Functional Architecture for 5G Mobile Networks

    In this paper, the authors propose novel network architecture for next generation 5G mobile networks. The proposed architecture is based on user-centric mobile concept in heterogeneous wireless environment. The implementation of the proposed architecture is performed in the service stratum, while the radio access technologies belong to the transport stratum...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2011

    Designing the Multimedia Push Framework for Mobile Applications

    Mobile applications mostly require multimedia data from a server through the mobile network. To update multimedia data in the application with new data in the server, push mechanism is usually used. Push frameworks provide simple mechanism that a server can notify mobile applications to contact the server to fetch new...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Sep 2012

    Speech Acts-Enhanced SIP Communication

    In workplaces, phone calls constitute a very common way of communication. However, the callee typically has no means to know what the caller wants to talk about. This can be counterproductive if the callee is busy performing a task that is more important and/ or urgent than the conversation that...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Sep 2012

    Intercultural Challenges in Offshore Software Development Outsourcing Relationships: A Systematic Literature Review Protocol with Preliminary Results

    Offshore Software Development Outsourcing (OSDO) is an emerging business approach adopted by many software development organisations in developed countries. There are many motivations for developing software at offshore locations including access to large labor pool, low development cost, high quality and round-the-clock development. However, in spite of these motivations OSDO...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jun 2011

    Density Based k-Nearest Neighbors Clustering Algorithm for Trajectory Data

    With widespread availability of low cost GPS, cellular phones, satellite imagery, robotics, Web traffic monitoring devices, it is becoming possible to record and store data about the movement of people and objects at a large amount. While these data hide important knowledge for the enhancement of location and mobility oriented...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jun 2011

    A Survey on Density Based Clustering Algorithms for Mining Large Spatial Databases

    Density based clustering algorithm is one of the primary methods for clustering in data mining. The clusters which are formed based on the density are easy to understand and it does not limit itself to the shapes of clusters. This paper gives a detailed survey of the existing density based...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments

    Advances in the areas of pervasive environments, computing, and networking are leading to an infrastructure composed of a large number of heterogeneous services/devices. Although some network protocols accommodate heterogeneity of services and/or devices, existing protocols have various design goals and solutions. This paper outlines a Ubiquitous Web Services Framework which...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    A Vision-Based 3D Hand Interaction for Marker-Based AR

    The hand interaction between a virtual object and human on Augmented Reality is a major issue to manipulate a rendered object in a convenient way. Conventional 2D image-based recognition and interaction technique in AR has a limitation to perform a natural interaction between the user and the virtual object. In...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    A Study on Longitudinal Differences in Website User's Trust Factors According to Website Types and Time Differences

    As internet businesses are expanding in diverse areas, studies related to web sites are also being performed actively. Especially in the area of e-commerce, web sites trust factors have been treated as a major research issue. However, these studies are mostly on demographic differences among site visitors including cultural differences,...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    Planning Methodology for Mapping Between Network Bandwidth Capacity and Physical Traffic

    Optimal resources allocation should be done in first establishment stage. But, optimal capacity allocation in consideration of practical standards such as current traffic volume has a significant impact on performance. In this paper, the authors attempted to model an appropriate mapping method based on network traffic as the basis for...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    A Study on the Factors Affecting the Intention to Use Smartphone Banking: The Differences Between the Transactions of Account Check and Account Transfer

    Banking transactions using Smartphone's or more commonly known as "Smartphone banking" are increasingly becoming popular as a way for financial transactions given the growing number of Smartphone users. The Smartphone banking is considered to be different from mobile banking because of the unique and innovative features of Smartphone's - a...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    Analyzing Technical Characteristics of Internet-Based Convergent Media and Regulation Determinant

    This paper is to suggest a regulation determinant applicable for Internet-based convergent media. The adaptation of Internet in the media industry has dismissed the role of scarcity and pervasiveness which used to justify regulating media. A basic question is how technical feature of convergent media affects diversity, one of the...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Jul 2012

    The Study on the Flow Experience of Mobile Facebook Use Effects on the Post-Hoc Interpersonal Relationships

    This paper empirically investigates the flow experiences of different feeling levels when using SNS and how this has impact on the interpersonal communication. Using a survey of Facebook users, this paper examines how the flow factors of intrinsic motivation impacts the self-disclosure of SNS and the post-hoc interpersonal relation change...

    Provided By Science and Development Network (SciDev.Net)