Broadcasting is the task of sending a message from a source node to all other nodes in the network. It is frequently referred to also as data dissemination. The design of reliable and efficient broadcast protocols is a key enabler for the successful deployment of vehicular communication services. In this paper we develop the Acknowledged […]
Secure Cloud Storage System with Secure Data Forwarding
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. We propose a new threshold proxy re-encryption scheme and integrate it with a secure decentralized code to […]
Detecting and Tracking Vehicle in Aerial Surveillance
In this paper we present automatic vehicle detection and tracking system for aerial surveillance. In the existing frameworks they apply either region based or sliding window based of vehicle detection in aerial surveillance. These method have highly depends on the color segmentation, a lot of miss detections on rotated vehicles and high computational complexity. So […]
MCE – Mobile Commerce Explorer for mining and prediction of mobile users
Abstract In this paper, we develop pattern mining and prediction techniques that explore the correlation between the moving behavior and purchasing transactions of mobile users to explore potential M-Commerce features. The MCE framework consists of three major components: The first component is Similarity Inference Model (SIM) for measuring the similarities among stores and items. […]
Source and Sink Location Hiding for Privacy Preservation
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. […]
rcda recoverable concealed data aggregation for data integrity in wireless sensor networks
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, […]
On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and have recently proposed unstructured […]
Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks
Energy awareness for computation and protocol management is becoming a crucial factor in the design of protocols and algorithms. On the other hand, in order to support node mobility, scalable routing strategies have been designed and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce the […]
A Novel Word Spotting Method Based on Recurrent Neural Networks
Keyword spotting refers to the process of retrieving all instances of a given keyword from a document. In the present paper, a novel keyword spotting method for handwritten documents is described. It is derived from a neural network-based system for unconstrained handwriting recognition. As such it performs template-free spotting, i.e., it is not necessary for […]
Packet-Hiding Methods for Preventing Selective Jamming Attacks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 6
- Next Page »