Foreword of Special Issue on "Nomadic Services and Applications"

  title={Foreword of Special Issue on "Nomadic Services and Applications"},
  author={Jason Chi-Shun Hung},
  journal={J. Networks},
  • J. C. Hung
  • Published 5 March 2011
  • Computer Science
  • J. Networks
Nomadic Service has emerged rapidly as an exciting new paradigm that offers a challenging model of cyber-physical services and poses fascinating problems regarding distributed resource management, ranging from information sharing to cooperative computing. This special issue is intended to foster state-of-the-art research in the area of nomadic services and related applications, cloud computing technologies and services, including the topics of collaboration environment, implementation and… 
2 Citations
Monitoring Technology and Efficient Particle Searching Algorithm for SPH Model
To supervise and control the whole simulation of Smoothed Particle Hydrodynamics (SPH) model, a mixed language programming (MLP) method is particularly described that will not only take advantages of
Research on evaluation of public sports service in stadiums based on FNN algorithm
The fuzzy evaluation procedure and index of public sports service in stadiums are selected and determined according to the weight ratio and FNN algorithm for improving hidden nodes is introduced to solve the model based on the idea of neural network.


TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks
TTDD is described, a Two-Tier Data Dissemination approach that provides scalable and efficient data delivery to multiple, mobile sinks that handles sink mobility effectively with performance comparable with that of stationary sinks.
A coordination-based data dissemination protocol for wireless sensor networks
  • H. Xuan, Sungyoung Lee
  • Computer Science
    Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
  • 2004
CODE is a coordination-based data dissemination protocol for wireless sensor networks that considers energy efficiency and network lifetime, especially for sensor networks with high node density, and is based on a grid structure.
SSL Man-in-the-Middle Attacks
This paper examines the mechanics of the SSL protocol attack, then focusses on the greater risk of SSL attacks when the client is not properly implemented or configured, and posed by unprotected systems where an attacker can preload his/her own trusted root authority certificates.
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
This paper proposes SEAD, a Scalable Energy-efficient Asynchronous Dissemination protocol, to minimize energy consumption in both building the dissemination tree and disseminating data to mobile sinks to create near-optimal dissemination trees.
Research on the Freeness of Subliminal Channels in ElGamal-Type Signatures
A new subliminal-free protocol in ElGamal-Type signatures is designed in which the warden covers all the data generated by the signer and finishes the signature, but he can not forge the signatures.
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
Evidence is provided that most web browsers have severe weaknesses in the browser-to-user communication (graphical user interface), which attackers can exploit to fool users about the presence of a secure SSL/TLS connection and make them disclose secrets to attackers.
HTTPS Hacking Protection
  • T. Chomsiri
  • Computer Science
    21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
  • 2007
This paper presents 3 different methodologies to prevent the decoding using SSL-MITM on the confidential data which normally traverses over e-commerce Web sites, and evaluation of 3 schemes is conducted to show the degrees of efficiency of the techniques.
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
This work proposes context-sensitive certificate verification (CSCV), whereby the browser interrogates the user about the context in which a certificate verification error occurs, and guides the user in handling and possibly overcoming the security error.
Man-in-the-Middle Attack to the HTTPS Protocol
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data