Chinese Academy of Sciences

Displaying 1-40 of 100 results

  • White Papers // Apr 2014

    A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers

    Virtual Machine (VM) scheduling is an important technique to efficiently operate the computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and thus to optimize energy consumption. However, the interference between collocated VMs is usually ignored, which can result in very...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking

    Data generation is a key issue in big data benchmarking that aims to generate application-specific data sets to meet the 4V requirements of big data. Specifically, big data generators need to generate scalable data (Volume) of different types (Variety) under controllable generation rates (Velocity) while keeping the important characteristics of...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BigDataBench: a Big Data Benchmark Suite from Internet Services

    As architecture, systems, and data management communities pay greater attention to innovative big data systems and architecture, the pressure of benchmarking and evaluating these systems rises. However, the complexity, diversity, frequently changed workloads, and rapid evolution of big data systems raise great challenges in big data benchmarking. Considering the broad...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2014

    BigOP: Generating Comprehensive Big Data Workloads as a Benchmarking Framework

    Big Data is considered proprietary asset of companies, organizations, and even nations. Turning big data into real treasure requires the support of big data systems. A variety of commercial and open source products have been unleashed for big data storage and processing. While big data users are facing the choice...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    A Hybrid Circular Queue Method for Iterative Stencil Computations on GPUs

    In this paper, the authors present a hybrid circular queue method that can significantly boost the performance of stencil computations on GPU by carefully balancing usage of registers and shared-memory. Unlike earlier methods that rely on circular queues predominantly implemented using indirectly addressable shared memory, their hybrid method exploits a...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    An Empirical Model for Predicting Cross-Core Performance Interference on Multicore Processors

    Despite their widespread adoption in cloud computing, multicore processors are heavily under-utilized in terms of computing resources. To avoid the potential for negative and unpredictable interference, co-location of a latency-sensitive application with others on the same multicore processor is disallowed, leaving many cores idle and causing low machine utilization. To...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Repair Locality with Multiple Erasure Tolerance

    In distributed storage systems, using erasure codes instead of straightforward replication may lead to desirable improvements in storage overhead and reliability. A challenge of the coding technique is to efficiently repair the packets loss caused by node failures so that the system keeps the same level of redundancy. However, traditional...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    A Generic Framework for Anonymous Authentication in Mobile Networks

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, the authors present a generic construction that converts any existing secure password authentication...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2013

    Generalized (Identity-Based) Hash Proof System and its Applications

    In this paper, the authors generalize the paradigm of Hash Proof System (HPS) proposed by Cramer and Shoup. In the central of their generalization, they lift subset membership problem to distribution distinguish problem. Their generalized HPS clarifies and encompass all the known Public-Key Encryption (PKE) schemes that essentially implement the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    Integrated PKE and PEKS - Stronger Security Notions and New Constructions

    In this paper, the authors investigate the security for integrated Public-Key Encryption (PKE) and Public-key Encryption with Keyword Search (PEKS) schemes. They observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    PRE: Stronger Security Notions and Efficient Construction with New Property

    In a Proxy Re-Encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Cryptanalysis of the OKH Authenticated Encryption Scheme

    Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

    Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. The...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

    The general principle for algebraic attack for multi-output stream ciphers was proposed by Courtois. Furthermore, Armknecht, and Krause gave a definition of algebraic immunity for multi-output Boolean functions in, and investigated some construction methods of multi-output Boolean functions with maximal algebraic immunity. In this paper, several new characterizations of algebraic...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting

    Deterministic-Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios (e.g. search on encrypted data) where the latter exhibits inherent drawbacks. In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs. A...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Gradient-Based Multi-Path Routing Protocol for Low Duty-Cycled Wireless Sensor Networks

    Low duty cycled sleep scheduling can largely prolong the lifetime of a Wireless Sensor Network (WSN). However, it also brings big challenge to the design of efficient routing protocols. Inappropriate selection of routes can largely offset the efficiency of a sleep scheduling mechanism. This paper aims to provide a simple...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    DSRelay: A Scheme of Cooperative Downloading Based on Dynamic Slot

    People's growing dependency on the Internet makes them want to access the network anytime and anywhere, even while driving cars. Although 3G or 4G networks can be used to achieve this goal, roadside APs have the advantages of low cost and high bandwidth. At present, however, APs cannot cover all...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Coverage Optimization for Femtocell Clusters Using Modified Particle Swarm Optimization

    Coverage optimization is a main challenge for femtocell clusters which are considered to be a promising solution to provide seamless cellular coverage for large indoor areas. Although Particle Swarm Optimization (PSO) can be employed to solve the coverage optimization of femtocell clusters, it reduces to Single Particle Swarm Optimization (SPSO)...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives

    Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g., block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary's...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks

    Boolean functions are frequently used in the design of stream ciphers, block ciphers and hash functions. One of the most vital roles in cryptography of Boolean functions is to be used as filter and combination generators of stream ciphers based on Linear Feedback Shift Registers (LFSR). The study of the...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2013

    Generalized (Identity-Based) Hash Proof System and its Applications

    In this paper, the authors generalize the paradigm of Hash Proof System (HPS) proposed by Cramer and Shoup. In the central of their generalization, they lift subset membership problem to distribution distinguish problem. Their generalized HPS clarifies and encompass all the known Public-Key Encryption (PKE) schemes that essentially implement the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    Integrated PKE and PEKS - Stronger Security Notions and New Constructions

    In this paper, the authors investigate the security for integrated Public-Key Encryption (PKE) and Public-key Encryption with Keyword Search (PEKS) schemes. They observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    PRE: Stronger Security Notions and Efficient Construction with New Property

    In a Proxy Re-Encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Cryptanalysis of the OKH Authenticated Encryption Scheme

    Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting

    Deterministic-Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios (e.g. search on encrypted data) where the latter exhibits inherent drawbacks. In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs. A...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

    The general principle for algebraic attack for multi-output stream ciphers was proposed by Courtois. Furthermore, Armknecht, and Krause gave a definition of algebraic immunity for multi-output Boolean functions in, and investigated some construction methods of multi-output Boolean functions with maximal algebraic immunity. In this paper, several new characterizations of algebraic...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

    Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. The...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Exploiting Constructive Interference for Scalable Flooding in Wireless Networks

    Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize millisecond network flooding latency and sub-microsecond time synchronization accuracy, require no network state information and adapt to topology changes. However, constructive interference has a...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    An Efficient Direct Anonymous Attestation Scheme with Forward Security

    Direct Anonymous Attestation (DAA) is a cryptographic mechanism adopted by the trusted computing group in its specifications for Trusted Computing Platforms (TCP). In this paper, the authors propose a new DAA scheme and prove it is secure under the strong RSA assumption and the decisional Diffie-Hellman assumption. While satisfying all...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2009

    A Fast Geometric Rectification of Remote Sensing Imagery Based on Feature Ground Control Point Database

    In this paper, the authors presents the basis of the traditional design of database for ground control point, tries to founded a fast auto-correction method of satellite remote sensing imagery based on feature ground control point database which brings local feature points as the effective supplement and aims to achieve...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2010

    Frequency-Hopping/M-Ary Frequency-Shift Keying for Wireless Sensor Networks: Noncoherent Detection and Performance

    In this paper, a novel WSN framework, namely the FH/MFSK WSN, is proposed, which monitors M-ary events and conveys signals from local sensors to fusion center with the aid of Frequency-Hopping (FH) and M-ary Frequency-Shift Keying (MFSK) techniques. The source events under observation by local sensors are assumed to have...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    Location Prediction Model Based on Bayesian Network Theory

    Location prediction is one of the key technologies of active mobility management in the next generation of mobile communication systems. Most of known location prediction models only take parts of predictive factors into account, which leads to a low prediction success ratio of these models. The motivation of this paper...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    Joint Rate Control and Routing for Energy-Constrained Wireless Sensor Networks with the Real-Time Requirement

    In the this paper, the authors study the tradeoff between network lifetime and network utility for energy-constrained Wireless Sensor Networks (WSNs) with the real-time requirement. By introducing a parameter r, they combine these two objectives into a single weighted objective, and consider rate control and routing in this tradeoff framework...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    An Efficient Multicast Search Scheme Under 2D Markov Walk Model

    In order to improve the efficiency of paging management, various paging strategies have been proposed for tracking single mobile user in the wireless cellular network. However, most of the schemes have ignored the important problem of efficient search for multiple mobile users under delay and bandwidth constraints. Given the condition...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    On Characterizing PPStream: Measurement and Analysis of P2P IPTV Under Large-Scale Broadcasting

    Despite the recent and remarkable popularity of P2P IPTV systems, the study of their characteristics on largescale broadcasting is rare. In this paper, the authors have undertaken a measurement study on one of the most popular P2P IPTV systems, PPStream, during the 29th Olympics broadcasting. They deployed their dedicated measurement...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    Andbot: Towards Advanced Mobile Botnets

    With the rapid development of the computing and Internet access (i.e., using WiFi, GPRS and 3G) capabilities of smartphones, constructing practical mobile botnets has become an underlying trend. In this paper, the authors introduce the design of a mobile botnet called Andbot which exploits a novel Command and Control (C&C)...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2009

    Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

    Wireless ad hoc networks find a wide range of applications in military surveillance, emergency disaster relief and environmental monitoring, some of which impose stringent requirement on the communication latency. A communication session in a wireless ad hoc network is achieved either through a single-hop transmission if the communication parties are...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2010

    A Cross-Layer Strategy for Energy-Efficient Cooperative Communication in Wireless Sensor Networks

    Cooperative communication has been shown to provide significant performance gains over fading channels in wireless networks, as well as enhancement of the energy efficiency in sensor networks. However, the cross-layer optimization and QoS providing in cooperative networks has not received much attention yet. In this paper, the authors investigate the...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2010

    Scalable Group Management in Large-Scale Virtualized Clusters

    To save cost, recently more and more users choose to provision resources at the granularity of Virtual Machines (VMs) in cluster systems, especially of data centres, and virtualized clusters emerges as promising platforms for both scientific computing and business services. For a cluster system, a member view is the uniform...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2009

    Throughput Capacity of Opportunistic Routing in Wireless Sensor Networks

    Recently, the idea of Opportunistic Routing (OR) has been widely explored to cope with the unreliable transmissions by exploiting the broadcast nature and spatial diversity of the wireless medium in order to improve the performance of wireless sensor networks. However, there are few theoretical analyses on the maximum throughput of...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    An Empirical Study on Evolution of API Documentation

    With the evolution of an API library, its documentation also evolves. The evolution of API documentation is common knowledge for programmers and library developers, but not in a quantitative form. Without such quantitative knowledge, programmers may neglect important revisions of API documentation, and library developers may not effectively improve API...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2009

    Designing and Analyzing a Flash File System With Alloy

    Alloy is a lightweight modeling language based on first-order relational logic. The language is expressive enough to describe structurally complex systems, but simple enough to be amenable to fully automated analysis. The Alloy Analyzer, with its SAT- based analysis engine, allows one to simulate traces of a system, visualize them,...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2011

    Compact Distributed Target-Tracking Algorithm With Binary Sensors

    A popular family of sensing systems work using binary sensors. In this study, the behavior of binary sensing methods is investigated where the individual sensors only return information regarding the target's presence or absence within their own sensing range. In order to enhance their performance the authors propose a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2011

    Inferring Protocol State Machine From Network Traces: A Probabilistic Approach

    Application-level protocol specifications (i.e., how a protocol should behave) are helpful for network security management, including intrusion detection and intrusion prevention. The knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown protocol specifications highly rely on manual operations, such as...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    A Massively Parallel Approach for Nonlinear Interdependency Analysis of Multivariate Signals With GPGPU

    Non-Linear Interdependency (NLI) analysis is an effective method for measurement of synchronization among brain regions, which is an important feature of normal and abnormal brain functions. But its application in practice has long been largely hampered by the ultra-high complexity of the NLI algorithms. The authors developed a massively parallel...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2011

    A Study of an Improved PSO Algorithm Used in an Adaptive Optics System

    Wavefront sensor-less adaptive optics is an important method for correcting wavefront aberration. An appropriate optimization algorithm is crucial to aberration correction. An Improved Particle Swarm Optimization (IPSO) is presented which well addresses slow convergence rate and low calculation precision in the standard PSO. In IPSO, mutation strategies are adopted to...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Accelerating Sparse Matrix Vector Multiplication on Many-Core GPUs

    Many-core GPUs provide high computing ability and substantial bandwidth; however, optimizing irregular applications like SpMV on GPUs becomes a difficult but meaningful task. In this paper, the authors propose a novel method to improve the performance of SpMV on GPUs. A new storage format called HYB-R is proposed to exploit...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2011

    Fully Secure (Doubly-)Spatial Encryption Under Simpler Assumptions

    Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives

    Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g., block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary's...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks

    Boolean functions are frequently used in the design of stream ciphers, block ciphers and hash functions. One of the most vital roles in cryptography of Boolean functions is to be used as filter and combination generators of stream ciphers based on Linear Feedback Shift Registers (LFSR). The study of the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2011

    Load-Aware and Position-Aided Routing in Satellite IP Networks

    Satellite communication is regarded as a promising way to achieve seamless global coverage with an array of advantages over the traditional terrestrial network. However, the non-uniform distribution of users and the highly topological dynamics have been a matter of facts. The traditional load balancing technique is able to guarantee a...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2011

    A Two-Tiered Reliable Application Layer Multicast

    This paper presents a two-tiered reliable Application Layer Multicast (ALM) solution, called HRALM, to provide lossless ALM services. HRALM builds a domain-based multicast tree, and divides the members into two transport planes (i.e., Plane 1 and Plane 2) in terms of the tree. In any domain, the distance between each...

    Provided By Chinese Academy of Sciences