Download e-book for kindle: Advances in Intelligent Systems and Applications - Volume 2: by Yi-Pin Liao, Chih-Ming Hsiao (auth.), Jeng-Shyang Pan,

By Yi-Pin Liao, Chih-Ming Hsiao (auth.), Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin (eds.)

ISBN-10: 3642354726

ISBN-13: 9783642354724

ISBN-10: 3642354734

ISBN-13: 9783642354731

The box of clever structures and purposes has accelerated vastly over the last twenty years. Theoretical and functional ends up in this sector are becoming quickly as a result of many profitable functions and new theories derived from many different difficulties. This publication is devoted to the clever structures and functions in lots of various features. specifically, this ebook is to supply highlights of the present examine in clever platforms and functions. It includes study papers within the following particular topics:

l Authentication, id, and Signature

l Intrusion Detection

l Steganography, information Hiding, and Watermarking

l Database, process, and verbal exchange Security

l laptop imaginative and prescient, item monitoring, and development Recognition

l photo Processing, scientific snapshot Processing, and Video Coding

l electronic content material, electronic existence, and Human laptop Interaction

l Parallel, Peer-to-peer, allotted, and Cloud Computing

l software program Engineering and Programming Language

This ebook presents a connection with theoretical difficulties in addition to useful ideas and functions for the cutting-edge leads to clever structures and functions at the aforementioned issues. specifically, either the educational neighborhood (graduate scholars, post-doctors and schools) in electric Engineering, machine technology, and utilized arithmetic; and the commercial neighborhood (engineers, engineering managers, programmers, study lab staffs and executives, protection managers) will locate this booklet interesting.

Show description

Read Online or Download Advances in Intelligent Systems and Applications - Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 PDF

Best international books

Read e-book online Advances in Cryptology - CRYPTO 2009: 29th Annual PDF

This publication constitutes the refereed complaints of the twenty ninth Annual overseas Cryptology convention, CRYPTO 2009, held in Santa Barbara, CA, united states in August 2009. The 38 revised complete papers offered have been conscientiously reviewed and chosen from 213 submissions. Addressing all present foundational, theoretical and examine facets of cryptology, cryptography, and cryptanalysis in addition to complex functions, the papers are equipped in topical sections on key leakage, hash-function cryptanalysis, privateness and anonymity, interactive proofs and zero-knowledge, block-cipher cryptanalysis, modes of operation, elliptic curves, cryptographic hardness, merkle puzzles, cryptography within the actual global, assaults on signature schemes, mystery sharing and safe computation, cryptography and game-theory, cryptography and lattices, identity-based encryption and cryptographers’ toolbox.

Get Experimental Algorithms: 8th International Symposium, SEA PDF

This booklet constitutes the refereed court cases of the eighth foreign Symposium on Experimental and effective Algorithms, SEA 2009, held in Dortmund, Germany, in June 2009. The 23 revised complete papers have been rigorously reviewed and chosen from sixty four submissions and current present study on experimental assessment and engineering of algorithms, in addition to in numerous facets of computational optimization and its purposes.

Computational Processing of the Portuguese Language: 9th - download pdf or read online

The foreign convention on Computational Processing of Portuguese—PROPOR —is the most occasion within the region of average language processing that's taken with Portuguese and the theoretical and technological concerns on the topic of this language. It w- comes contributions for either written and spoken language processing.

Additional info for Advances in Intelligent Systems and Applications - Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012

Example text

3] proposed an improved scheme to preserve user anonymity, however, Bindu et al. [1] showed that the scheme is vulnerable to the insider attack and man‐in‐ the-middle attack. Lin et al. [13] presented a strong password authentication protocol with one-way hash function. But the scheme is insufficient of mutual authentication and user anonymity. Juang [7] presents a simple authentication scheme in 2004, but the users cannot change passwords freely and the scheme does not provide mutual authentication.

In a recent paper, Harn and Lin [7] proposed a new approach to detect and identify cheaters. The algorithm uses shares to detect and identify cheaters. , the threshold) shares in the secret reconstruction, the redundant shares can be used to detect and identify cheaters. In this approach, shares in a secret sharing scheme serve for two purposes; that are, (a) reconstructing the secret and (b) detecting and identifying cheaters. Since Harn and Lin’s algorithm requires more than t shares in the secret reconstruction, the algorithm does not work if there are exact t shares.

In our proposed algorithm, the number of participated shares is t and the threshold is t . From Theorems 2, 3 and 4, we can obtain the following results: (1) Under Type 1 attack, the proposed algorithm can successfully detect cheaters if t ≤ t − 1, and identify cheaters if t ≤ t − c − 1; (2) Under Type 2 attack, the proposed algorithm can successfully detect cheaters if t ≤ t − c, and identify cheaters if {c + 1 ≤ t ≤ t − c − 1} ∪ {t ≤ min{c, t − 2c}}; (3) Under Type 3 attack, the proposed algorithm can successfully detect cheaters if t ≤ t − c, and identify cheaters if t ≤ min{t − 1, t − 2c}.

Download PDF sample

Advances in Intelligent Systems and Applications - Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 by Yi-Pin Liao, Chih-Ming Hsiao (auth.), Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin (eds.)


by Anthony
4.3

Rated 4.84 of 5 – based on 34 votes

admin