Chaoyang University of Technology

Displaying 1-21 of 21 results

  • White Papers // Jul 2013

    High-Reliable Dispatching Mechanisms for Tasks in Cloud Computing

    Cloud computing is a popular and attractive issue in recent years, because it can provide a lot of services to users via Internet. The cloud computing consists of a huge number of heterogeneous servers, memories, and various applied services. The development of cloud computing has expressed a high degree of...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A New Remote User Authentication Scheme Using Smart Cards

    The authors have proposed a remote user authentication scheme without using a password file or a verification table. Their scheme can withstand the attack of replaying a previously intercepted login request message. The security of the scheme relies on the difficulty of computing discrete logarithms over finite fields. In this...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

    In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficient non-repudiable threshold proxy signature scheme with known signers was proposed by H.-M. Sun. Sun's scheme has...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2012

    Security Enhancement for Protecting Password Transmission

    The rapid growth of networks in both number and size encourages more and more computers to link together to share various resources and exchange huge amounts of information. In 2002, Hwang and Yeh proposed some improved schemes to mend several security flaws in the Peyravian-Zunic password transmission scheme and password...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2011

    Mobile Banking Payment System

    With the rapid development of the Internet and information technology, electronic commerce system is flourishing. In electronic commerce, customers use electronic money (e-money) instead of cash. E-money in wide use includes electronic cash, electronic checks, electronic coupons, and so on. E-money is fixed at face-value and is backed by banks....

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2011

    Security Enhancement by Cipher-Based Authentication and Key Agreement in a Cloud Computing Environment

    Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Performance of Energy Efficient Relaying for Cluster-Based Wireless Sensor Networks

    This paper proposes a novel energy efficient data relaying scheme to improve energy efficiency for cluster-based Wireless Sensor Networks (WSNs). In order to reduce the energy dissipation of transmitting sensing data at each sensor, the fixed clustering algorithm uniformly divides the sensing area into clusters where the cluster head is...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2010

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are...

    Provided By Chaoyang University of Technology

  • White Papers // May 2010

    A Provably Secure and Efficient Strong Designated Verifier Signature Scheme

    Strong designated verifier signature scheme could make it possible for a signer to convince only the designated verifier that the signature is made by the signer. In 2007, Lee et al. proposed a designated verifier signature scheme with message recovery, attaching target message with signature, to prevent any attack by...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2009

    An Improved Location-Aided Routing Protocol for Mobile Ad Hoc Networks with Greedy Approach

    A Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network that does not have a fixed infrastructure. Due to the high mobility of nodes, the network topology of MANETs always changes. This makes it more difficult to find the routes that message packets use when they are routed. In...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    An Adaptive Load Balance Allocation Strategy for Small Antenna Based Wireless Networks

    Technological advances and rapid development in handheld wireless terminals have facilitated the rapid growth of wireless communications. Since this tremendous growth of wireless communication requirements is expected under the constraint of limited bandwidth. The small antenna frameworks that can provide more flexible to handle the limited bandwidth will be the...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A New Method for Indoor Location Base on Radio Frequency Identification

    In recent years, there has dramatic proliferation of research concerned with Radio Frequency IDentification (RFID). The RFID technologies are getting considerable attentions not only academic research but also the applications of enterprise. One of most important issues of applications is the indoor position location. Many researchers have used varied technologies...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A Nonce-Based Mutual Authentication System With Smart Card

    To access a service over Internet, a remote user should make a mutual authentication with the service provider. Currently, a password based authentication mechanism is widely used. User authentication is an important security mechanism for recognizing legal remote users. The authors propose an available and secure authentication scheme for service...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    Improvement on a Trapdoor Hash Function

    The digital counterpart to a handwritten signature is the digital signature, which is an important primitive element in public key cryptosystems. Generally, a signer signed on a message (document) and then sent receiver (verifier) the digital signatures. The recipient verifies signatures by means of a pre-defined formula for verification of...

    Provided By Chaoyang University of Technology

  • White Papers // Apr 2009

    Using Rough Set and Support Vector Machine for Network Intrusion Detection

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    Revisit Consensus With Dual Fallible Communication in Cloud Computing

    Off late, the network bandwidth increased and hardware devices have continuously to enhanced, resulting the vigorous development of the internet. Nowadays, cloud computing is using the low-power hosts to achieve high reliability that will be to ensure the ability to be better. However, the high capability most with high fault-tolerant...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Unified Framework of Data Exchange Mechanism in an Intelligent Transportation System

    An Intelligent Transportation System (ITS) incorporates a variety of equipment and devices that all work in mutual harmony. However, each piece of equipment or device has its data format and protocol. Therefore, they cannot directly exchange data with each other. In this research, a unified framework for data exchange in...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Hybrid Intrusion Detection System of Cluster-Based Wireless Sensor Networks

    Recent advances in Wireless Sensor Networks (WSNs) have made them extremely useful in various applications. WSNs are susceptible to attack, because they are cheap, small devices and are deployed in open and unprotected environments. In this paper, the authors propose an Intrusion Detection System (IDS) created in Cluster-based Wireless Sensor...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Channel Allocation Based WiMax Topology

    Along with information technology of flourishing, the popularization rate of the wireless communication equipment is higher and higher. However, WiMax is the one of new broadband wireless technologies. It can provide high data rate, large network coverage, and different application services. When large amount of users use these applications, the...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    Capability Based Clustering Mechanism in WiMAX

    WiMAX is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to wired broadband like cable and DSL. WiMAX can provide mobile wireless broadband connectivity without the requirement for direct line-of-sight with a base station. With the development of wireless network, WiMAX has long...

    Provided By Chaoyang University of Technology

  • White Papers // Dec 2008

    Location-Based Multicast Routing Protocol for Mobile Ad Hoc Networks

    Wireless network offers freedom moving around the effective transmission area and the flexibility and easy to use function for Internet application. Many applications of computer network involve multiple users that will rely on the ability of the network to provide multicast services. Thus, multicasting will be concerned as an essential...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    An Adaptive Load Balance Allocation Strategy for Small Antenna Based Wireless Networks

    Technological advances and rapid development in handheld wireless terminals have facilitated the rapid growth of wireless communications. Since this tremendous growth of wireless communication requirements is expected under the constraint of limited bandwidth. The small antenna frameworks that can provide more flexible to handle the limited bandwidth will be the...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A New Method for Indoor Location Base on Radio Frequency Identification

    In recent years, there has dramatic proliferation of research concerned with Radio Frequency IDentification (RFID). The RFID technologies are getting considerable attentions not only academic research but also the applications of enterprise. One of most important issues of applications is the indoor position location. Many researchers have used varied technologies...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2009

    An Improved Location-Aided Routing Protocol for Mobile Ad Hoc Networks with Greedy Approach

    A Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network that does not have a fixed infrastructure. Due to the high mobility of nodes, the network topology of MANETs always changes. This makes it more difficult to find the routes that message packets use when they are routed. In...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    Revisit Consensus With Dual Fallible Communication in Cloud Computing

    Off late, the network bandwidth increased and hardware devices have continuously to enhanced, resulting the vigorous development of the internet. Nowadays, cloud computing is using the low-power hosts to achieve high reliability that will be to ensure the ability to be better. However, the high capability most with high fault-tolerant...

    Provided By Chaoyang University of Technology

  • White Papers // Dec 2008

    Location-Based Multicast Routing Protocol for Mobile Ad Hoc Networks

    Wireless network offers freedom moving around the effective transmission area and the flexibility and easy to use function for Internet application. Many applications of computer network involve multiple users that will rely on the ability of the network to provide multicast services. Thus, multicasting will be concerned as an essential...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Unified Framework of Data Exchange Mechanism in an Intelligent Transportation System

    An Intelligent Transportation System (ITS) incorporates a variety of equipment and devices that all work in mutual harmony. However, each piece of equipment or device has its data format and protocol. Therefore, they cannot directly exchange data with each other. In this research, a unified framework for data exchange in...

    Provided By Chaoyang University of Technology

  • White Papers // Apr 2009

    Using Rough Set and Support Vector Machine for Network Intrusion Detection

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2011

    Security Enhancement by Cipher-Based Authentication and Key Agreement in a Cloud Computing Environment

    Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2010

    Performance of Energy Efficient Relaying for Cluster-Based Wireless Sensor Networks

    This paper proposes a novel energy efficient data relaying scheme to improve energy efficiency for cluster-based Wireless Sensor Networks (WSNs). In order to reduce the energy dissipation of transmitting sensing data at each sensor, the fixed clustering algorithm uniformly divides the sensing area into clusters where the cluster head is...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Hybrid Intrusion Detection System of Cluster-Based Wireless Sensor Networks

    Recent advances in Wireless Sensor Networks (WSNs) have made them extremely useful in various applications. WSNs are susceptible to attack, because they are cheap, small devices and are deployed in open and unprotected environments. In this paper, the authors propose an Intrusion Detection System (IDS) created in Cluster-based Wireless Sensor...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    A Channel Allocation Based WiMax Topology

    Along with information technology of flourishing, the popularization rate of the wireless communication equipment is higher and higher. However, WiMax is the one of new broadband wireless technologies. It can provide high data rate, large network coverage, and different application services. When large amount of users use these applications, the...

    Provided By Chaoyang University of Technology

  • White Papers // Mar 2009

    Capability Based Clustering Mechanism in WiMAX

    WiMAX is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to wired broadband like cable and DSL. WiMAX can provide mobile wireless broadband connectivity without the requirement for direct line-of-sight with a base station. With the development of wireless network, WiMAX has long...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2011

    Mobile Banking Payment System

    With the rapid development of the Internet and information technology, electronic commerce system is flourishing. In electronic commerce, customers use electronic money (e-money) instead of cash. E-money in wide use includes electronic cash, electronic checks, electronic coupons, and so on. E-money is fixed at face-value and is backed by banks....

    Provided By Chaoyang University of Technology

  • White Papers // May 2010

    A Provably Secure and Efficient Strong Designated Verifier Signature Scheme

    Strong designated verifier signature scheme could make it possible for a signer to convince only the designated verifier that the signature is made by the signer. In 2007, Lee et al. proposed a designated verifier signature scheme with message recovery, attaching target message with signature, to prevent any attack by...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2013

    High-Reliable Dispatching Mechanisms for Tasks in Cloud Computing

    Cloud computing is a popular and attractive issue in recent years, because it can provide a lot of services to users via Internet. The cloud computing consists of a huge number of heterogeneous servers, memories, and various applied services. The development of cloud computing has expressed a high degree of...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    A Nonce-Based Mutual Authentication System With Smart Card

    To access a service over Internet, a remote user should make a mutual authentication with the service provider. Currently, a password based authentication mechanism is widely used. User authentication is an important security mechanism for recognizing legal remote users. The authors propose an available and secure authentication scheme for service...

    Provided By Chaoyang University of Technology

  • White Papers // Jul 2009

    Improvement on a Trapdoor Hash Function

    The digital counterpart to a handwritten signature is the digital signature, which is an important primitive element in public key cryptosystems. Generally, a signer signed on a message (document) and then sent receiver (verifier) the digital signatures. The recipient verifies signatures by means of a pre-defined formula for verification of...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A New Remote User Authentication Scheme Using Smart Cards

    The authors have proposed a remote user authentication scheme without using a password file or a verification table. Their scheme can withstand the attack of replaying a previously intercepted login request message. The security of the scheme relies on the difficulty of computing discrete logarithms over finite fields. In this...

    Provided By Chaoyang University of Technology

  • White Papers // Sep 2012

    Security Enhancement for Protecting Password Transmission

    The rapid growth of networks in both number and size encourages more and more computers to link together to share various resources and exchange huge amounts of information. In 2002, Hwang and Yeh proposed some improved schemes to mend several security flaws in the Peyravian-Zunic password transmission scheme and password...

    Provided By Chaoyang University of Technology

  • White Papers // Oct 2012

    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

    In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficient non-repudiable threshold proxy signature scheme with known signers was proposed by H.-M. Sun. Sun's scheme has...

    Provided By Chaoyang University of Technology

  • White Papers // Aug 2010

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are...

    Provided By Chaoyang University of Technology