Privacy Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and [...]

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

Abstracts Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which [...]

Authenticating Location-Based Skyline Queries in Arbitrary Subspaces

Abstract With the ever-increasing use of smartphones and tablet devices, location-based services (LBSs) have experienced explosive growth in the past few years. To scale up services, there has been a rising trend of outsourcing data management to Cloud service providers, which provide query services to clients on behalf of data owners. However, in this data-outsourcing [...]

Shortest Path Computing in Relational DBMSs

Abstract This paper takes the shortest path discovery to study efficient relational approaches to graph search queries. We first abstract three enhanced relational operators, based on which we introduce an FEM framework to bridge the gap between relational operations and graph operations. We show new features introduced by recent SQL standards, such as window function [...]

An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring in Real-World Limited Bandwidth Networks ppt

Automated motion detection technology is an integral component of intelligent transportation systems, and is particularly essential for management of traffic and maintenance of traffic surveillance systems. Traffic surveillance systems using video communication over real-world networks with limited bandwidth often encounter difficulties due to network congestion and/or unstable bandwidth. This is especially problematic in wireless video [...]