Filters








41,600 Hits in 5.2 sec

Group Signatures on Mobile Devices: Practical Experiences [chapter]

Klaus Potzmader, Johannes Winter, Daniel Hein, Christian Hanser, Peter Teufl, Liqun Chen
2013 Lecture Notes in Computer Science  
Group Signatures on Mobile Devices: Practical Experiences  ...  Group Signatures on Mobile Devices: Practical Experiences Potzmader et al. Group Signatures on Mobile Devices: Practical Experiences Potzmader et al.  ... 
doi:10.1007/978-3-642-38908-5_4 fatcat:rhwfreqoe5f23bwy2s2emedghy

Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain

Gaurav Deep, Jagpreet Sidhu, Rajni Mohana
2020 Scalable Computing : Practice and Experience  
Proposed work will help cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices.  ...  The intended user now also includes Cyber-Physical Devices. Cyber-Physical Devices share data between them, fetch data from cloud. Cloud data is managed by employees of cloud Companies.  ...  The role of the Group Manager is to provide Group membership based on Short traceable signatures.  ... 
doi:10.12694/scpe.v21i3.1737 fatcat:5w5zoazjhfhpxoe2452qvfpj6i

Privacy Analysis of Android Applications: State-of-art and Literary Assessment

Gulshan Shrivastava, Prabhat Kumar
2017 Scalable Computing : Practice and Experience  
Android applications privacy analysis is an extension to the android privacy model, which traditionally emphasizes on prevention, and detection of attacks.  ...  An appropriate action needs to be taken to protect Android device from these attacks.  ...  According to the Jupiter network report [11, 12] , 76% of mobile users depend on their mobile devices to access their most sensitive personal information, such as online banking or personal medical information  ... 
doi:10.12694/scpe.v18i3.1304 fatcat:c4flyid3gfe45n4adqr2fosinm

Moodle LMS Integration with Amazon Alexa: A Practical Experience

Javier Ochoa-Orihuel, Raúl Marticorena-Sánchez, María Consuelo Sáiz-Manzanares
2020 Applied Sciences  
, with the capabilities to process Moodle data structures and produce sensible sentences that can be understood by users when spoken by a voice device.  ...  (RQ2) to establish whether Moodle currently provides the necessary tools for voice-content creation for develop voice-first applications, aiming to provide new scientific insight to help researchers on  ...  The student group was composed by 56 female and 5 male students, with further statistical data to be seen on Table 2 .  ... 
doi:10.3390/app10196859 fatcat:whn2vjp6inbijnk6e3fs7rxjzy

SPCACF: Secured Privacy-Conserving Authentication Scheme using Cuckoo Filter in VANET

A Rengarajan, M Mohammed Thaha
2020 Scalable Computing : Practice and Experience  
To address these issues, the SPCACF scheme is proposed which is based on software devoid of relying on any particular hardware.  ...  In order to guarantee that it can assure message authentication constraint, existential enforceability of underlying signature against adaptively chosen-message attack is proved under the positive filter  ...  Group key signing and verification. RSU utilizes this module to check a lot of messages without the bilinear matching tasks in a group mode.  ... 
doi:10.12694/scpe.v21i1.1626 fatcat:wo2j4ea5f5ce5e55jgiq5hdrvq

A secure migration process for mobile agents

Najmus Saqib Malik, David Ko, Harry H. Cheng
2010 Software, Practice & Experience  
Setup for experiments: These experiments simulate the relay race concept by using mobile agents. Each machine has a Mobile-C agency running on it.  ...  In Ara [35] , mobile agents contain a passport that contains its identity, name, certificates, and signatures.  ... 
doi:10.1002/spe.1003 fatcat:onji7rcq35cldmixxf6aiwts7y

A Framework for Generating Malware Threat Intelligence

Ekta Gandotra, Divya Bansal, Sanjeev Sofat
2017 Scalable Computing : Practice and Experience  
Malware is one of the most dreadful security threats fronting the Internet today. It is evolving and making use of new ways to target computers and mobile devices.  ...  The evolution of new practices like social networking, explosion of mobile devices and cloud computing have given opportunities to attackers for discovering vulnerabilities and exploiting these for creating  ...  signature-based methods and are unable to detect previously unseen malware to offer immediate protection as these are needed to be analyzed before creating signatures for them.  ... 
doi:10.12694/scpe.v18i3.1300 fatcat:dhrm6hm33jaz3jcdkwged4g2cu

Practical experiences in enabling and ensuring quality sensing in emergency response applications

Chris Davison, Daniel Massaguer, Lilia Paradis, M. Reza Rahimi, Bo Xing, Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
Based on our findings, we propose a series of practical techniques that potentially enhances the reliability of data delivery over heterogeneous wireless networks, by exploiting the availability of multiple  ...  networks, the rescue workers' mobility, and the possibility of having rescue teams carry redundant sensors.  ...  However, most off-the-shelf mobile devices currently have single radios; even for the devices with multiple radios, practical constraints exist probably only one radio is allowed to function at a time.  ... 
doi:10.1109/percomw.2010.5470636 dblp:conf/percom/DavisonMPRXHMV10 fatcat:nlv7oyzj4zg43dt5lsnfvhjvcm

Secured Identity Based Cryptosystem Approach for Intelligent Routing Protocol in VANET

A Karthikeyan, P G Kuppusamy, Iraj S Amiri
2020 Scalable Computing : Practice and Experience  
Existing arrangements either depend vigorously on a carefully designed hardware or cannot fulfill the security necessity.  ...  Vehicular specially appointed systems named as Vehicular Ad-hoc NETwork (VANET) have been raising dependent on the condition of-art advancements in remote and system communication.  ...  A cryptographic primitive scheme [15] was proposed for public updating of reputation score based on the Boneh-Boyen-Shacham short group signature scheme.  ... 
doi:10.12694/scpe.v21i1.1608 fatcat:5ntui3ukhffihfkb4c6n74h5py

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark [article]

Flor Álvarez, Max Kolhagen, Matthias Hollick
2018 arXiv   pre-print
on their mobile devices.  ...  Furthermore, they support neither cross-application on mobile devices nor strong protection of key material using hardware security modules.  ...  to bootstrap security on their mobile devices.  ... 
arXiv:1808.04671v1 fatcat:t2iisnthzzbafccnonyit56ke4

On the Security of Authenticated Group Key Agreement Protocols

Suman Bala, Gaurav Sharma, Hmani Bansal, Tarunpreet Bhatia
2019 Scalable Computing : Practice and Experience  
The group key agreement protocol enables to derive a shared session key for the remote members to communicate securely.  ...  Recently, several attempts are made to utilize group key agreement protocols for secure multicasting in Internet of Things.  ...  [23] argued about the insufficiency of UF-ACMA secure signature scheme and proposed a UF-ACM-ESL secure signature based on Schnorr [17] .  ... 
doi:10.12694/scpe.v20i1.1440 fatcat:52dy6kz66zehvg6prkgvj5dslq

Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation

Yang Liu, Andrew Simpson
2016 Software, Practice & Experience  
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users -such as location, installed applications and cookies associated with built-in  ...  This paper focuses on the requirements and design of PPTMA, and also describes an initial prototype.  ...  Together with the unique device ID, the tracking effectiveness of mobile devices can be more effective than on PCs. 8. Installed apps.  ... 
doi:10.1002/spe.2403 fatcat:vhaevnwsabh33fraq5cst34dwa

D'Agents: Applications and performance of a mobile-agent system

Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson, Daniela Rus
2002 Software, Practice & Experience  
Although significant additional experiments are needed to fully characterize the complex mobile-agent performance space, the results here help answer the basic question of when mobile agents should be  ...  In the application, a client machine searches a single remote information service in one of two ways, namely, sending a mobile agent or making traditional client/server invocations across the network.  ...  financial support of the D'Agents project: ONR contract N00014-95-1-1204, AFOSR/DoD contract F49620-97-1-03821, and DARPA contract F30602-98-2-0107; to the army of student programmers who have worked on  ... 
doi:10.1002/spe.449 fatcat:vneumashobdybiqqyci77qf53m

Distributed computing in practice: the Condor experience

Douglas Thain, Todd Tannenbaum, Miron Livny
2005 Concurrency and Computation  
As new protocols such as GRAM [23] , GSI [28], and GridFTP [8] developed, the project applied them to production systems and suggested changes based on the experience.  ...  Throughout, we reflect on the lessons of experience and chart the course traveled by research ideas as they grow into production systems. In this environment, the Condor project was born.  ...  Digital Pictures for their Condor enthusiasm and for sharing their experiences with us. Jamie Frey, Mike Litzkow, and Alain Roy provided sound advice as this chapter was written.  ... 
doi:10.1002/cpe.938 fatcat:7ewsokcld5curbe6ku3r5khu2y

Experiences of Neighbourhood Walkability Among Older Australians Living in High Density Inner-City Areas

Desley Vine, Laurie Buys, Rosemary Aird
2012 Planning Theory & Practice  
Lord and Luxembourg (2007) on the other hand, used in-depth interviews and geographic information systems (GIS) software to study the mobility practices of older adults living in two different countries  ...  The findings from this group of studies highlight three key issues related to older people and their outof home mobility.  ... 
doi:10.1080/14649357.2012.696675 fatcat:laarwvydnrfirpvareqhdex2q4
« Previous Showing results 1 — 15 out of 41,600 results