A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding

A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding Abstract In this letter, a new secure information transmissionscheme based on polar codes with a pre-shared secret key isproposed. In polar codes, after the channel polarization is induced,good split channels are used to transmit the user message and badchannels are utilized to

A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks

A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Abstract As wireless communication gains popularity, significant research has been devoted to supporting real-time transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless hybrid network that integrates a mobile wireless ad hoc network (MANET) and a wireless infrastructure

A Mechanism Design Approach to Resource Procurement in Cloud Computing

A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal

A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks

A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks Abstract This paperfirst envisions the advent of the wireless mesh networks with multiple radios and directional antennas in future.Then, based on the observation that simplicity induces efficiency and scalability, the paper proposes a joint geometric deploymentand routing strategy for such mesh networks, and also

Web Image Re-Ranking Using Query-Specific Semantic Signatures

Web Image Re-Ranking Using Query-Specific Semantic Signatures Abstract Image re-ranking, as an effective way to improve the results of web-based image search, has been adopted by current commercial search engines. Given a query keyword, a pool of images is first retrieved by the search engine based on textual information. By asking the user to select

Video Dissemination over Hybrid Cellular and Ad Hoc Networks

Video Dissemination over Hybrid Cellular and Ad Hoc Networks Abstract We study the problem of disseminating videos to mobile users by using a hybrid cellular and ad hoc network. In particular, we formulate the problem of optimally choosing the mobile devices that will serve as gateways from the cellular to the ad hoc network, the

Uniform Embedding for Efficient JPEG Steganography

Uniform Embedding for Efficient JPEG Steganography Abstract Steganography is the science and art of covertcommunication, which aims to hide the secret messages intoa cover medium while achieving the least possible statisticaldetectability. To this end, the framework of minimal distor-tion embedding is widely adopted in the development of thesteganographic system, in which a well designed distortionfunction

SOS A Distributed Mobile Q&A System Based On Social Networks

SOS A Distributed Mobile Q&A System Based On Social Networks Abstract Recently, emerging research efforts have been focused on question and answer (Q&A) systems based on social networks.The social-based Q&A systems can answer non-factual questions, which cannot be easily resolved by web search engines. These systems either rely on a centralized server for identifying friends

Security Analysis of Handover Key Management in 4G LTESAE Networks

Security Analysis of Handover Key Management in 4G LTESAE Networks Abstract The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology into its fourth generation. One of the unique challenges of fourth-generation technology is how to close a security gap through which a single compromised or malicious device

Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption

Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption Abstract The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with