Time filter

Source Type

Liu Y.-C.,Chang Gung University | Kao C.-Y.,Chang Gung University | Chakrabarti A.,Indian Institute of Science | Chen C.-H.,CyberTrust Technology Institute
Advances in Mechanical Engineering | Year: 2016

Generating a range of concepts is often a significant challenge for novice designers given their limited design experience and domain knowledge. This article develops a tool to support novice designers in formulating a design strategy for converting existing artifacts or mechanical objects into abstract representations. The app-based tool is aimed at supporting novice designers in (1) archiving existing artifacts, (2) converting artifacts into abstract representations for divergent activities, and (3) observing the kinematic movements of three-dimensional mechanical objects through augmented reality. An experiment conducted in 2014 investigated how the tool's augmented reality function and the proposed strategy supported novice designers. A total of 13 second-year industrial design students generated 88 separate ideas. From 12 possible mechanical movements, four participants generated between 11 and 22 ideas each, while another five participants generated 1 or 2 ideas each. Each participant successfully proposed a concept that adapted the selected mechanism in response to a given problem in a given environment. Comparing pre- and posttest scores of each participant, 11 of 13 participants improved their knowledge of kinematic mechanisms. The results suggested that the use of the proposed tool and strategy has potential to help some novice designers explore new concepts and acquire related design knowledge. © The Author(s) 2016. Source

Huang S.-Y.,CyberTrust Technology Institute | Fan C.-I.,National Sun Yat - sen University | Tseng Y.-F.,National Sun Yat - sen University
Future Generation Computer Systems | Year: 2015

Predicate encryption is a cryptographic primitive that provides fine-grained control over access to encrypted data. It is often used for encrypted data search in a cloud storage environment. In this paper, we propose an enabled/disabled predicate encryption scheme, which is the first work that provides timed-release services and data self-destruction (they correspond to the terms "enabled" and "disabled," respectively). Owing to these properties, the sender can set the readable/unreadable time of the files to be sent to the receiver. The receiver can read the sent file only after the readable time. After the unreadable time, the structure of the file will be destroyed and the file will become unreadable. Furthermore, for practical usage purposes, the extended scheme, which is based on the proposed scheme, provides not only timed-release services and data self-destruction but also long message encryption and undecryptable search. In the extended scheme, the length of encrypted messages does not depend on the order of the group. Moreover, the cloud server can obtain only the matched ciphertexts after the search. © 2015 Elsevier B.V. Source

Lin F.Y.-S.,National Taiwan University | Chen P.-Y.,National Taiwan University | Chen P.-Y.,CyberTrust Technology Institute | Chen Q.-T.,National Taiwan University
Advances in Intelligent and Soft Computing | Year: 2012

In this paper, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger value of the Average DOD, the more damage degree of the network would be. An attack-defense scenario as a mathematical model would be used to support network operators to predict that all the likelihood strategies both cyber attacker and network defender would take. The attacker could use the attack resources to launch attack on the nodes of network. On the other hand, the network defender allocates existed resources of defender to protect survival nodes of network. In the process of problem solving, the "gradient method" and "game theory" would be adopted to find the optimal resource allocation strategies for both cyber attacker and network defender. © 2012 Springer-Verlag. Source

Lin P.-C.,National Chung Cheng University | Chen S.-Y.,National Chung Cheng University | Lin C.-H.,CyberTrust Technology Institute
2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014 | Year: 2015

Web applications, such as video streaming, map services and office applications, have become very popular due to the advances of web technology. Traditional traffic classification methods based on port numbers and payload signatures barely work because the applications run on the same port numbers (usually port 80 and 443) and the payloads are usually encrypted. Furthermore, a web application may provide multiple functions, and the traffic from them has diverse characteristics. In this work, we use statistical features from application messages to characterize the traffic from individual functions of web applications, and perform fine-grained classification to identify the application functions. The experimental results show the classification can achieve high accuracy up to 98.30% for the interaction functions and 92.72% for the download functions. © 2014 IEEE. Source

Fan C.-I.,National Sun Yat - sen University | Huang S.-Y.,CyberTrust Technology Institute | Lai Y.-L.,National Sun Yat - sen University
IEEE Transactions on Industrial Informatics | Year: 2014

According to related research, energy consumption can be effectively reduced by using energy management information of smart grids. In smart grid architecture, electricity suppliers can monitor, predicate, and control energy generation/consumption in real time. Users can know the current price of electrical energy and obtain energy management information from smart meters. It helps users reduce home's energy use. However, electricity consumptions of users may divulge the privacy information of users. Therefore, privacy of users and communication security of the smart grid become crucial security issues. This paper presents a secure power-usage data aggregation scheme for smart grid. Electricity suppliers can learn about the current power usage of each neighborhood to arrange energy supply and distribution without knowing the individual electricity consumption of each user. This is the first scheme against internal attackers, and it provides secure batch verification. Additionally, the security of the proposed scheme is demonstrated by formal proofs. © 2005-2012 IEEE. Source

Discover hidden collaborations