Chaoyang University of Technology

Displaying 1-15 of 15 results

  • White Papers // Jul 2013

    High-Reliable Dispatching Mechanisms for Tasks in Cloud Computing

    Cloud computing is a popular and attractive issue in recent years, because it can provide a lot of services to users via Internet. The cloud computing consists of a huge number of heterogeneous servers, memories, and various applied services. The development of cloud computing has expressed a high degree of...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A New Remote User Authentication Scheme Using Smart Cards

    The authors have proposed a remote user authentication scheme without using a password file or a verification table. Their scheme can withstand the attack of replaying a previously intercepted login request message. The security of the scheme relies on the difficulty of computing discrete logarithms over finite fields. In this...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

    In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficient non-repudiable threshold proxy signature scheme with known signers was proposed by H.-M. Sun. Sun's scheme has...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2012

    Security Enhancement for Protecting Password Transmission

    The rapid growth of networks in both number and size encourages more and more computers to link together to share various resources and exchange huge amounts of information. In 2002, Hwang and Yeh proposed some improved schemes to mend several security flaws in the Peyravian-Zunic password transmission scheme and password...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2011

    Mobile Banking Payment System

    With the rapid development of the Internet and information technology, electronic commerce system is flourishing. In electronic commerce, customers use electronic money (e-money) instead of cash. E-money in wide use includes electronic cash, electronic checks, electronic coupons, and so on. E-money is fixed at face-value and is backed by banks....

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2011

    Security Enhancement by Cipher-Based Authentication and Key Agreement in a Cloud Computing Environment

    Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Wave Pipelined VLSI Architecture for a Viterbi Decoder Using Self Reset Logic With 0.65nm Technology

    In 3G mobile terminals the Viterbi Decoder consumes approximately one third of the power consumption of a base band mobile transceiver. Viterbi decoders employed in digital wireless communications are complex and dissipate large power. A low power Viterbi decoder is designed in circuit level using self-reset logic and wave pipelining...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Performance of Energy Efficient Relaying for Cluster-Based Wireless Sensor Networks

    This paper proposes a novel energy efficient data relaying scheme to improve energy efficiency for cluster-based Wireless Sensor Networks (WSNs). In order to reduce the energy dissipation of transmitting sensing data at each sensor, the fixed clustering algorithm uniformly divides the sensing area into clusters where the cluster head is...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2010

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are...

    Provided By Chaoyang University of Technology

  • White Papers // May 2010

    A Provably Secure and Efficient Strong Designated Verifier Signature Scheme

    Strong designated verifier signature scheme could make it possible for a signer to convince only the designated verifier that the signature is made by the signer. In 2007, Lee et al. proposed a designated verifier signature scheme with message recovery, attaching target message with signature, to prevent any attack by...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2009

    An Improved Location-Aided Routing Protocol for Mobile Ad Hoc Networks with Greedy Approach

    A Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network that does not have a fixed infrastructure. Due to the high mobility of nodes, the network topology of MANETs always changes. This makes it more difficult to find the routes that message packets use when they are routed. In...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    Improvement on a Trapdoor Hash Function

    The digital counterpart to a handwritten signature is the digital signature, which is an important primitive element in public key cryptosystems. Generally, a signer signed on a message (document) and then sent receiver (verifier) the digital signatures. The recipient verifies signatures by means of a pre-defined formula for verification of...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A Nonce-Based Mutual Authentication System With Smart Card

    To access a service over Internet, a remote user should make a mutual authentication with the service provider. Currently, a password based authentication mechanism is widely used. User authentication is an important security mechanism for recognizing legal remote users. The authors propose an available and secure authentication scheme for service...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    An Adaptive Load Balance Allocation Strategy for Small Antenna Based Wireless Networks

    Technological advances and rapid development in handheld wireless terminals have facilitated the rapid growth of wireless communications. Since this tremendous growth of wireless communication requirements is expected under the constraint of limited bandwidth. The small antenna frameworks that can provide more flexible to handle the limited bandwidth will be the...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A New Method for Indoor Location Base on Radio Frequency Identification

    In recent years, there has dramatic proliferation of research concerned with Radio Frequency IDentification (RFID). The RFID technologies are getting considerable attentions not only academic research but also the applications of enterprise. One of most important issues of applications is the indoor position location. Many researchers have used varied technologies...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2011

    Security Enhancement by Cipher-Based Authentication and Key Agreement in a Cloud Computing Environment

    Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Performance of Energy Efficient Relaying for Cluster-Based Wireless Sensor Networks

    This paper proposes a novel energy efficient data relaying scheme to improve energy efficiency for cluster-based Wireless Sensor Networks (WSNs). In order to reduce the energy dissipation of transmitting sensing data at each sensor, the fixed clustering algorithm uniformly divides the sensing area into clusters where the cluster head is...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2011

    Mobile Banking Payment System

    With the rapid development of the Internet and information technology, electronic commerce system is flourishing. In electronic commerce, customers use electronic money (e-money) instead of cash. E-money in wide use includes electronic cash, electronic checks, electronic coupons, and so on. E-money is fixed at face-value and is backed by banks....

    Provided By Chaoyang University of Technology

  • White Papers // May 2010

    A Provably Secure and Efficient Strong Designated Verifier Signature Scheme

    Strong designated verifier signature scheme could make it possible for a signer to convince only the designated verifier that the signature is made by the signer. In 2007, Lee et al. proposed a designated verifier signature scheme with message recovery, attaching target message with signature, to prevent any attack by...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2012

    Security Enhancement for Protecting Password Transmission

    The rapid growth of networks in both number and size encourages more and more computers to link together to share various resources and exchange huge amounts of information. In 2002, Hwang and Yeh proposed some improved schemes to mend several security flaws in the Peyravian-Zunic password transmission scheme and password...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A New Remote User Authentication Scheme Using Smart Cards

    The authors have proposed a remote user authentication scheme without using a password file or a verification table. Their scheme can withstand the attack of replaying a previously intercepted login request message. The security of the scheme relies on the difficulty of computing discrete logarithms over finite fields. In this...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

    In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficient non-repudiable threshold proxy signature scheme with known signers was proposed by H.-M. Sun. Sun's scheme has...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2013

    High-Reliable Dispatching Mechanisms for Tasks in Cloud Computing

    Cloud computing is a popular and attractive issue in recent years, because it can provide a lot of services to users via Internet. The cloud computing consists of a huge number of heterogeneous servers, memories, and various applied services. The development of cloud computing has expressed a high degree of...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    Improvement on a Trapdoor Hash Function

    The digital counterpart to a handwritten signature is the digital signature, which is an important primitive element in public key cryptosystems. Generally, a signer signed on a message (document) and then sent receiver (verifier) the digital signatures. The recipient verifies signatures by means of a pre-defined formula for verification of...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A Nonce-Based Mutual Authentication System With Smart Card

    To access a service over Internet, a remote user should make a mutual authentication with the service provider. Currently, a password based authentication mechanism is widely used. User authentication is an important security mechanism for recognizing legal remote users. The authors propose an available and secure authentication scheme for service...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2010

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Wave Pipelined VLSI Architecture for a Viterbi Decoder Using Self Reset Logic With 0.65nm Technology

    In 3G mobile terminals the Viterbi Decoder consumes approximately one third of the power consumption of a base band mobile transceiver. Viterbi decoders employed in digital wireless communications are complex and dissipate large power. A low power Viterbi decoder is designed in circuit level using self-reset logic and wave pipelining...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2009

    An Improved Location-Aided Routing Protocol for Mobile Ad Hoc Networks with Greedy Approach

    A Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network that does not have a fixed infrastructure. Due to the high mobility of nodes, the network topology of MANETs always changes. This makes it more difficult to find the routes that message packets use when they are routed. In...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    An Adaptive Load Balance Allocation Strategy for Small Antenna Based Wireless Networks

    Technological advances and rapid development in handheld wireless terminals have facilitated the rapid growth of wireless communications. Since this tremendous growth of wireless communication requirements is expected under the constraint of limited bandwidth. The small antenna frameworks that can provide more flexible to handle the limited bandwidth will be the...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A New Method for Indoor Location Base on Radio Frequency Identification

    In recent years, there has dramatic proliferation of research concerned with Radio Frequency IDentification (RFID). The RFID technologies are getting considerable attentions not only academic research but also the applications of enterprise. One of most important issues of applications is the indoor position location. Many researchers have used varied technologies...

    Provided By Chaoyang University of Technology