You are previewing International Journal of Technology and Human Interaction (IJTHI) Volume 12, Issue 2.
O'Reilly logo
International Journal of Technology and Human Interaction (IJTHI) Volume 12, Issue 2

Book Description

An increasing amount of research is being done in the area where technology and humans meet. The success or failure of technologies, the question whether technology helps humans to fulfill their goals or whether it hinders them is in most cases not a technical one. Even though this problem has been recognized in many academic disciplines that deal with technology, we are still far from being able to present a set of theories that would allow us to understand the interaction of technology and humans and to put it to practical use. The International Journal of Technology and Human Interaction (IJTHI) aims to provide a platform for leading research that addresses issues of human and technology interaction. IJTHI seeks original contributions concerning any aspect of technology and human interaction dealing with the development, usage, failure, success, policies, strategies, and applications of them. The journal invites contributions from both scholars and practitioners involved in research, management, and the utilization of technology and human interaction.

This issue contains the following articles:

  • An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem
  • Design and Analysis of the Secure Scheme for Quantum Positioning based on Entangled Photon Pair
  • An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks
  • D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks
  • Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack
  • A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
  • A Message Topic Model for Multi-Grain SMS Spam Filtering

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on Data Security, Privacy, and Trust in Networked Environments
  5. An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THE PRINCIPLE OF INTEGRAL IMAGING
    4. 3. NEW 3D DIGITALWATERMARKING METHOD BASED ON INTEGRAL IMAGING
    5. 4. EXPERIMENTAL RESULTS AND DISCUSSIONS
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  6. Design and Analysis of the Secure Scheme for Quantum Positioning based on Entangled Photon Pair
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DESIGN OF QUANTUM POSITIONING SCHEME
    4. 3. THEORETICAL PROOF OF POSITIONING SCHEME
    5. 4. KEY TECHNICAL ANALYSIS
    6. 5. COMPARISON AND ANALYSIS OF THE TRADITIONAL POSITIONING TECHNOLOGY AND QUANTUM POSITIONING TECHNOLOGY
    7. 6. CONCLUSION
    8. 7. FUTURE RESEARCH DIRECTIONS
    9. REFERENCES
  7. An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. PRELIMINARIES
    5. 4. OUR PROPOSED SCHEME
    6. 5. SECURITY ANALYSIS
    7. 6. PERFORMANCE EVALUATIONS
    8. 7. CONCLUSION
    9. ACKNOWLEDGMENT
    10. REFERENCES
  8. D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. DEFINITION AND NOTATION
    5. 4. IMPROVED DEMPSTER-SHAFER EVIDENCE THEORY
    6. 5. A TRUST MODEL BASED ON IMPROVED DEMPSTER-SHAFER EVIDENCE TEHROY
    7. 6. SIMULATION AND ANALYSIS
    8. 7. CONCLUSION
    9. 8. FUTURE RESEARCH DIRECTIONS
    10. ACKNOWLEDGMENT
    11. REFERENCES
  9. Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DEFINITION AND NOTATION
    4. 3. DESCRYPTION OF ICEBERG
    5. 4. BIT-PATTERN INTEGRAL ATTACK ON ICEBERG
    6. 5. CONCLUSION
    7. 6. FUTURE RESEARCH DIRECTIONS
    8. ACKNOWLEDGMENT
    9. REFERENCES
  10. A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PRELIMINARIES
    4. 3. A BGN-TYPE MULTI-USER HOMOMORPHIC ENCRYPTION SCHEME
    5. 4. CONCLUSION
    6. 5. FUTURE RESEARCH DIRECTIONS
    7. ACKNOWLEDGMENT
    8. REFERENCES
  11. A Message Topic Model for Multi-Grain SMS Spam Filtering
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORKS
    4. 3. MESSAGE TOPIC MODEL
    5. 4. EXPERIMENTS AND DISCUSSION
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  12. Call For Articles