Search results for "Unique identifier"

showing 3 items of 3 documents

Notice of Violation of IEEE Publication Principles: Distributed Multimedia Digital Libraries on Peer-to-Peer Networks

2007

This paper presents an original approach to image sharing in large, distributed digital libraries, in which a user is able to interactively search interesting resources by means of content-based image retrieval techniques. The approach described here addresses the issues arising when the content is managed through a peer-to-peer architecture. In this case, the retrieval facilities are likely to be limited to queries based on unique identifiers or small sets of keywords, which may be quite inadequate, so we propose a novel algorithm for routing user queries that exploits compact representations of multimedia resources shared by each peer in order to dynamically adapt the network topology to …

ExploitMultimediabusiness.industryComputer scienceImage sharingPeer-to-peercomputer.software_genreDigital libraryNetwork topologyUnique identifierWorld Wide WebbusinesscomputerImage retrievalContent management14th International Conference of Image Analysis and Processing - Workshops (ICIAPW 2007)
researchProduct

Discovery privacy threats via device de-anonymization in LoRaWAN

2021

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

Information privacyIoTDe-anonymizationde-anonymizationsComputer scienceEmerging technologiesComputer Networks and CommunicationsInternet of ThingsDevice identificationcomputer.software_genreComputer securityprivacyLoRaSecurity and privacyUnique identifierDe-anonymizationLoRaWAN; Security; privacy; de-anonymizationsLorawanApplication serverNetwork packetProbabilistic logicIdentification (information)internet of things; lora; lorawan; security; privacy; network optimizationSecuritycomputerNetwork optimizationComputer Communications
researchProduct

Notice of Violation of IEEE Publication Principles: Enhanced P2P Services Providing Multimedia Content

2006

[This paper has been withdrawn by the publisher]Traditional peer-to-peer (P2P) services provide only basic searching facilities, based on unique identifiers or small sets of keywords. Unfortunately, this approach is very inadequate and inefficient when a huge amount of multimedia resources is shared. In this paper, we present an original image and video sharing system, in which a user is able to interactively search interesting resources by means of content-based image and video retrieval techniques. In order to limit the network traffic cost, maximizing the usefulness of each peer contacted in the query process, we also propose the adoption of an adaptive overlay routing algorithm, exploit…

Unique identifierNoticeMultimediaProcess (engineering)Computer scienceOrder (business)OverlayNetwork topologycomputer.software_genreImage retrievalcomputerImage (mathematics)Eighth IEEE International Symposium on Multimedia (ISM'06)
researchProduct