City University of Hong Kong

Displaying 1-40 of 44 results

  • White Papers // Mar 2014

    Compact Ring-LWE Based Cryptoprocessor

    In this paper the authors propose an efficient and compact processor for a ring-LWE based encryption scheme. They present three optimizations of the Number Theoretic Transform (NTT) used for polynomial multiplication: they avoid pre-processing in the negative wrapped convolution by merging it with the main algorithm; they reduce the fixed...

    Provided By City University of Hong Kong

  • White Papers // Oct 2013

    Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection

    Signature-based intrusion detection systems have been widely deployed in current network environments to defend against various attacks, but the expensive process of signature matching is a major suffering problem for these detection systems. Thus, a high-performance signature matching scheme is of great importance for a signature-based IDS. In the authors'...

    Provided By City University of Hong Kong

  • White Papers // May 2013

    Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection

    False alarms are a big challenge for Intrusion Detection Systems (IDSs). A lot of approaches, especially machine learning based schemes, have been proposed to mitigate this issue by filtering out these false alarms. But a fundamental problem is how to objectively evaluate an algorithm in terms of its ability to...

    Provided By City University of Hong Kong

  • White Papers // Apr 2013

    Towards Designing Packet Filter with A Trust-based Approach using Bayesian Inference in Network Intrusion Detection

    Network Intrusion Detection Systems (NIDSs) have become an essential part for current network security infrastructure. However, in a large-scale network, the overhead network packets can greatly decrease the effectiveness of such detection systems by significantly increasing the processing burden of a NIDS. To mitigate this issue, the authors advocate that...

    Provided By City University of Hong Kong

  • White Papers // Feb 2013

    Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment

    Currently, signature-based Network Intrusion Detection Systems (NIDSs) are being widely deployed in distributed network environment with the purpose of protecting network communications from various attacks. However, signature matching has become a key limiting factor to restrict the performance of a signature-based NIDS in large-scale distributed network environment. The overhead network...

    Provided By City University of Hong Kong

  • White Papers // Nov 2012

    TAAC: Temporal Attribute-Based Access Control for Multi-Authority Cloud Storage Systems

    Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE), as a promising technique for access control of encrypted data, is...

    Provided By City University of Hong Kong

  • White Papers // Oct 2012

    Concurrent Signature without Random Oracles

    Concurrent signatures provide a way to exchange digital signature among parties in an efficient and fair manner. To the best of the authors' knowledge, all the existing solutions can only be proven secure in the random oracle model. How to build an efficient concurrent signature scheme in the standard model...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    SMashQ: Spatial Mashup Framework for k-NN Queries in Time-Dependent Road Networks

    The k-Nearest-Neighbor (k-NN) query is one of the most popular spatial query types for Location-Based Services (LBS). In this paper, the authors focus on k-NN queries in time-dependent road networks, where the travel time between two locations may vary significantly at different time of the day. In practice, it is...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    JSCloud: Toward Remote Execution of JavaScript Code on Handheld Devices

    The authors present a generic framework, JSCloud, for the remote execution of JavaScript programs. Their work dynamically estimates whether a code partition should be executed remotely. The empirical result shows that JSCloud can be useful if the JavaScript engine on a handheld device is inefficient. A modern web application often...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    Intelligent Alarm Filter using Knowledge-based Alert Verification in Network Intrusion Detection

    Network intrusions have become a big challenge to current network environment. Thus, Network Intrusion Detection Systems (NIDSs) are being widely deployed in various networks aiming to detect different kinds of network attacks (e.g., Trojan, worms). However, in real settings, a large number of alarms can be generated during the detection...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    Understanding Factors Influencing a SME to Continue Adopting the B2B Marketplace to Maintain its Presence

    The emerging online business-to-business marketplace in China, with major websites such as Alibaba and ECVV has presented a huge opportunity for small-and-medium enterprises to reach out to an extensive pool of potential corporate customers. This would not have been possible through conventional strategies such as trade fairs and road shows....

    Provided By City University of Hong Kong

  • White Papers // Jul 2012

    DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems

    Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they...

    Provided By City University of Hong Kong

  • White Papers // May 2012

    On the Capacity Gain From Antenna Correlation in Multi-User MIMO Systems

    In this paper, the authors consider multi-user Multiple-Input Multiple-Output (MIMO) systems over either Multiple Access Channels (MACs) or Broadcast Channels (BCs). Contrary to common views, they show that antenna correlation at the Mobile Unit (MU), the Base Station (BS) or both sides can be potentially beneficial for such systems. Both...

    Provided By City University of Hong Kong

  • White Papers // Apr 2012

    Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection

    Currently, Intrusion Detection Systems (IDSs) are being widely deployed in various computer networks aiming to detect all kinds of attacks. But the major problem is that a large amount of alarms are generated during their detection and most of them are non-critical alarms. This issue greatly increases the analysis workload...

    Provided By City University of Hong Kong

  • White Papers // Mar 2012

    A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection

    Now-a-days, Network Intrusion Detection Systems (NIDSs) have become an essential part for the network security infrastructure. However, the large number of false alarms is a big problem for these detection systems which greatly reduces their effectiveness and efficiency. To mitigate this problem, the authors have developed an intelligent false alarm...

    Provided By City University of Hong Kong

  • White Papers // Mar 2012

    Single Character Frequency-Based Exclusive Signature Matching Scheme

    Currently, signature-based Network Intrusion Detection Systems (NIDSs) have been widely deployed in various organizations such as universities and companies aiming to identify and detect all kinds of network attacks. However, the big suffering problem is that signature matching in these detection systems is too expensive to their performance in which...

    Provided By City University of Hong Kong

  • White Papers // Oct 2011

    Adaptive Context-aware Packet Filter Scheme using Statistic-based Blacklist Generation in Network Intrusion Detection

    By using string matching, signature-based Network Intrusion Detection Systems (NIDSs) can achieve a higher accuracy and lower false alarm rate than the anomaly-based systems. But the matching process is very expensive regarding to the performance of a signature-based NIDS in which the cost is at least linear to the size...

    Provided By City University of Hong Kong

  • White Papers // Oct 2011

    Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection

    Intrusion Detection Systems (IDSs) have been widely deployed in organizations nowadays as the last defense for the network security. However, one of the big problems of these systems is that a large amount of alarms especially false alarms will be produced during the detection process, which greatly aggravates the analysis...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    A Secure and Efficient Password-Authenticated Group Key Exchange Protocol for Mobile Ad Hoc Networks

    Password-authenticated group key exchange protocols enable communication parties to establish a common secret key (a session key) by only using short secret passwords. Such protocols have been receiving significant attention. This paper shows some security weaknesses in some recently proposed password authenticated group key exchange protocols. Furthermore, a secure and...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection

    The detection accuracy of signature-based intrusion detection systems depends heavily on the capability of their signatures and is more accurate than anomaly-based approach. But the suffering problem of these systems is that a large amount of non-critical alarms will be generated during the detection process which increase the analysis burden...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    Algorithm for Queueing Networks With Multi-Rate Traffic

    In this paper, the authors present a new algorithm for evaluating queueing networks with multi-rate traffic. The detailed state space of a node is evaluated by explicit formula. They consider reversible nodes with multi-rate traffic and find the state probabilities by taking advantage of local balance. Theory of queueing networks...

    Provided By City University of Hong Kong

  • White Papers // May 2011

    Efficient Evaluation of K-NN Queries Using Spatial Mashups

    k-Nearest-Neighbor (k-NN) queries have been widely studied in time-independent and time-dependent spatial networks. In this paper, the authors focus on k-NN queries in time-dependent spatial networks where the driving time between two locations may vary significantly at different time of the day. In practice, it is costly for a database...

    Provided By City University of Hong Kong

  • White Papers // May 2011

    Trajectory Privacy in Location-Based Services and Data Publication

    The ubiquity of mobile devices with global positioning functionality (e.g., GPS and AGPS) and Internet connectivity (e.g., 3G and Wi-Fi) has resulted in widespread development of Location-Based Services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for...

    Provided By City University of Hong Kong

  • White Papers // Mar 2011

    Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

    The authors explore the threat of Smartphone malware with access to on-board sensors, which open new avenues for illicit collection of private information. While existing work shows that such "Sensory malware" can convey raw sensor data (e.g., video and audio) to a remote server, these approaches lack stealthiness, incur significant...

    Provided By City University of Hong Kong

  • White Papers // Oct 2010

    Query-Aware Location Anonymization for Road Networks

    Recently, several techniques have been proposed to protect the user location privacy for location-based services in the Euclidean space. Applying these techniques directly to the road network environment would lead to privacy leakage and inefficient query processing. In this paper, the authors propose a new location anonymization algorithm that is...

    Provided By City University of Hong Kong

  • White Papers // Oct 2010

    The Effects Of News About Future Productivity On International Relative Prices: An Empirical Investigation

    In this paper, the authors find that expected (news) and unexpected (contemporaneous) components of productivity changes have opposite effects on the US real exchange rate. Following Barsky and Sims' (2010) identification method, they decompose US total factor productivity (TFP) into news and contemporaneous productivity changes. The US real exchange rate...

    Provided By City University of Hong Kong

  • White Papers // May 2010

    Actionable Meta Models to Support Inter Organizational Business Processes Modeling for e-Services

    E-services usually span multiple organizations and evolve in time-domain due to the changes in the environment pertaining to each organization. Enacting composite e-services over evolving inter-organizational business processes is a challenging task. In this paper, the authors highlight modeling of business processes for e-services and present enactment of the e-services...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    Energy Efficient Multipath Routing in Large Scale Sensor Networks With Multiple Sink Nodes

    Due to the battery resource constraint, it is a critical issue to save energy in wireless sensor networks, particularly in large sensor networks. One possible solution is to deploy multiple sink nodes simultaneously. In this paper, the authors propose a protocol called MRMS (Multipath Routing in large scale sensor networks...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    Joint Channel-Network Coding for the Gaussian Two-Way Two-Relay Network

    New aspects arise when generalizing two-way relay network with one relay to two-way relay network with multiple relays. To study the essential features of the two-way multiple-relay network, the authors focus on the case of two relays in their work. The problem of how two terminals, equipped with multiple antennas,...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks

    Computing Bilinear Pairing on sensor platforms has become an important research topic since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs). Some previous works have provided benchmarks for the pairing computation on sensors. However, a complete pairingbased cryptographic scheme requires much more than just a bilinear pairing operation,...

    Provided By City University of Hong Kong

  • White Papers // Jan 2010

    Target Trajectory Querying in Wireless Sensor Networks

    In this paper, the authors focus on the query problem of trajectory tracking of moving targets in a wireless sensor network. Their motivation is to design in-network storage and querying protocols to support queries for searching a given target signature in a low query latency, high query reliability, and energy...

    Provided By City University of Hong Kong

  • White Papers // Aug 2009

    Performance Analysis of Best-Effort Service in Saturated IEEE 802.16 Networks

    The IEEE 802.16 standard is a promising technology for the fourth-generation mobile networks and is being actively promoted by the WiMAX Forum, an industry-led consortium. Among the various service classes supported in the standard, best-effort service is expected to be the major service class subscribed by users due to its...

    Provided By City University of Hong Kong

  • White Papers // Jul 2009

    Synthesizing System Integration Requirements Model Fragments

    Systems integration is an enduring issue in organizations. Many organizations have often been faced with the predicament of managing large and complex IT infrastructures accumulated over the years. Before proposing suitable integration architecture and selecting appropriate implementation solutions, a holistic and clear understanding of the enterprise-wide integration requirements among various...

    Provided By City University of Hong Kong

  • White Papers // Jun 2009

    Low Latency High Bandwidth Anonymous Overlay Network With Anonymous Routing

    Most existing anonymous networks focus on providing strong anonymity for the price of having lower bandwidth, higher latency and degraded usability when compared with the conventional use of the Internet. They also often anonymize only a few specific applications. In this paper, the authors propose a new approach of constructing...

    Provided By City University of Hong Kong

  • White Papers // Apr 2009

    Asymmetric Information And Global Sourcing

    This paper aims to study the choice of offshoring modes made by multinationals in the presence of asymmetric information. The authors focus on two types of asymmetric information, namely hidden characteristics and hidden action. The former creates adverse selection problem, and the later leads to moral hazard problem, both of...

    Provided By City University of Hong Kong

  • White Papers // Mar 2009

    TinyPairing: Computing Tate Pairing on Sensor Nodes With Higher Speed and Less Memory

    Resource-constrained wireless sensors are small embedded platforms with limited computational power and memory capacity. One of the most popular sensor platforms, MICAz, which has been extensively used in both the research community and the industry, has only 4KB RAM, 128KB ROM, and an 8-bit/7.3828-MHz ATmega128L micro-controller. On these platforms, symmetric...

    Provided By City University of Hong Kong

  • White Papers // Mar 2009

    Alliance Partners And Firm Performance: Resource Complementarity And Status Association

    Bridging the resource-based view and the institutional perspective, this study explores the performance consequences of firms' alliance partner selections by examining the interactions of resource complementarity and institutional associations (reflected through both societal and network status) between the firm and its partners. The integrative framework suggests that a joint consideration...

    Provided By City University of Hong Kong

  • White Papers // Dec 2008

    Guideline to Back Up Your Computer and Important Files

    To backup is to make spare copies of file and store them separately to the originals. In the world of computers loss of data can be devastating, and while there are possibilities for recovery of data after a disaster it is far easier to restore the files from backup than...

    Provided By City University of Hong Kong

  • White Papers // Sep 2008

    XTOPO: An XML-Based Topology for Information Highway on the Internet

    The need for interoperation and data exchange through the Internet makes XML (eXtensible Markup Language) a dominant standard language. Much work have been done on translating relational data into XML document and vice versa. However, there is not an integrated method to combine them together as one technology for mass...

    Provided By City University of Hong Kong

  • White Papers // Sep 2008

    Topology Control for Throughput Optimization in Wireless Mesh Networks

    In this paper, the authors consider the problem of topology control by joint power control and routing to maximize the network throughput in wireless mesh networks. First, they present two mathematical formulations of the joint power control and routing problem according to two different definitions of network throughput: the total...

    Provided By City University of Hong Kong

  • White Papers // Mar 2014

    Compact Ring-LWE Based Cryptoprocessor

    In this paper the authors propose an efficient and compact processor for a ring-LWE based encryption scheme. They present three optimizations of the Number Theoretic Transform (NTT) used for polynomial multiplication: they avoid pre-processing in the negative wrapped convolution by merging it with the main algorithm; they reduce the fixed...

    Provided By City University of Hong Kong

  • White Papers // Jul 2008

    eCRM Technologies, Capabilities and SME Performance Benefits

    Organizations today have a diversity of applications available to support the management of customer relationships, namely electronic-Customer Relationship Management (eCRM) applications. Despite the growing need of understanding eCRM in Small and Medium-sized Enterprises (SMEs), eCRM research is largely focused on large organizations. Building on the theory of dynamic capabilities, this...

    Provided By City University of Hong Kong

  • White Papers // Jul 2007

    Defining Requirements for Business Process Flexibility

    This paper discussed about the business process flexibility focuses primarily on defining and classifying business process flexibility and developing strategies, architectures, and tactics for achieving it. However, to specify the required type and level of business process flexibility it is essential to understand how the need for flexibility arises in...

    Provided By City University of Hong Kong

  • White Papers // May 2010

    Actionable Meta Models to Support Inter Organizational Business Processes Modeling for e-Services

    E-services usually span multiple organizations and evolve in time-domain due to the changes in the environment pertaining to each organization. Enacting composite e-services over evolving inter-organizational business processes is a challenging task. In this paper, the authors highlight modeling of business processes for e-services and present enactment of the e-services...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    A Secure and Efficient Password-Authenticated Group Key Exchange Protocol for Mobile Ad Hoc Networks

    Password-authenticated group key exchange protocols enable communication parties to establish a common secret key (a session key) by only using short secret passwords. Such protocols have been receiving significant attention. This paper shows some security weaknesses in some recently proposed password authenticated group key exchange protocols. Furthermore, a secure and...

    Provided By City University of Hong Kong

  • White Papers // Oct 2011

    Adaptive Context-aware Packet Filter Scheme using Statistic-based Blacklist Generation in Network Intrusion Detection

    By using string matching, signature-based Network Intrusion Detection Systems (NIDSs) can achieve a higher accuracy and lower false alarm rate than the anomaly-based systems. But the matching process is very expensive regarding to the performance of a signature-based NIDS in which the cost is at least linear to the size...

    Provided By City University of Hong Kong

  • White Papers // Oct 2013

    Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection

    Signature-based intrusion detection systems have been widely deployed in current network environments to defend against various attacks, but the expensive process of signature matching is a major suffering problem for these detection systems. Thus, a high-performance signature matching scheme is of great importance for a signature-based IDS. In the authors'...

    Provided By City University of Hong Kong

  • White Papers // Mar 2012

    A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection

    Now-a-days, Network Intrusion Detection Systems (NIDSs) have become an essential part for the network security infrastructure. However, the large number of false alarms is a big problem for these detection systems which greatly reduces their effectiveness and efficiency. To mitigate this problem, the authors have developed an intelligent false alarm...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection

    The detection accuracy of signature-based intrusion detection systems depends heavily on the capability of their signatures and is more accurate than anomaly-based approach. But the suffering problem of these systems is that a large amount of non-critical alarms will be generated during the detection process which increase the analysis burden...

    Provided By City University of Hong Kong

  • White Papers // Apr 2012

    Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection

    Currently, Intrusion Detection Systems (IDSs) are being widely deployed in various computer networks aiming to detect all kinds of attacks. But the major problem is that a large amount of alarms are generated during their detection and most of them are non-critical alarms. This issue greatly increases the analysis workload...

    Provided By City University of Hong Kong

  • White Papers // Mar 2012

    Single Character Frequency-Based Exclusive Signature Matching Scheme

    Currently, signature-based Network Intrusion Detection Systems (NIDSs) have been widely deployed in various organizations such as universities and companies aiming to identify and detect all kinds of network attacks. However, the big suffering problem is that signature matching in these detection systems is too expensive to their performance in which...

    Provided By City University of Hong Kong

  • White Papers // Oct 2011

    Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection

    Intrusion Detection Systems (IDSs) have been widely deployed in organizations nowadays as the last defense for the network security. However, one of the big problems of these systems is that a large amount of alarms especially false alarms will be produced during the detection process, which greatly aggravates the analysis...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    Intelligent Alarm Filter using Knowledge-based Alert Verification in Network Intrusion Detection

    Network intrusions have become a big challenge to current network environment. Thus, Network Intrusion Detection Systems (NIDSs) are being widely deployed in various networks aiming to detect different kinds of network attacks (e.g., Trojan, worms). However, in real settings, a large number of alarms can be generated during the detection...

    Provided By City University of Hong Kong

  • White Papers // Apr 2013

    Towards Designing Packet Filter with A Trust-based Approach using Bayesian Inference in Network Intrusion Detection

    Network Intrusion Detection Systems (NIDSs) have become an essential part for current network security infrastructure. However, in a large-scale network, the overhead network packets can greatly decrease the effectiveness of such detection systems by significantly increasing the processing burden of a NIDS. To mitigate this issue, the authors advocate that...

    Provided By City University of Hong Kong

  • White Papers // Feb 2013

    Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment

    Currently, signature-based Network Intrusion Detection Systems (NIDSs) are being widely deployed in distributed network environment with the purpose of protecting network communications from various attacks. However, signature matching has become a key limiting factor to restrict the performance of a signature-based NIDS in large-scale distributed network environment. The overhead network...

    Provided By City University of Hong Kong

  • White Papers // May 2013

    Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection

    False alarms are a big challenge for Intrusion Detection Systems (IDSs). A lot of approaches, especially machine learning based schemes, have been proposed to mitigate this issue by filtering out these false alarms. But a fundamental problem is how to objectively evaluate an algorithm in terms of its ability to...

    Provided By City University of Hong Kong

  • White Papers // Jul 2009

    Synthesizing System Integration Requirements Model Fragments

    Systems integration is an enduring issue in organizations. Many organizations have often been faced with the predicament of managing large and complex IT infrastructures accumulated over the years. Before proposing suitable integration architecture and selecting appropriate implementation solutions, a holistic and clear understanding of the enterprise-wide integration requirements among various...

    Provided By City University of Hong Kong

  • White Papers // Dec 2008

    Guideline to Back Up Your Computer and Important Files

    To backup is to make spare copies of file and store them separately to the originals. In the world of computers loss of data can be devastating, and while there are possibilities for recovery of data after a disaster it is far easier to restore the files from backup than...

    Provided By City University of Hong Kong

  • White Papers // Sep 2008

    XTOPO: An XML-Based Topology for Information Highway on the Internet

    The need for interoperation and data exchange through the Internet makes XML (eXtensible Markup Language) a dominant standard language. Much work have been done on translating relational data into XML document and vice versa. However, there is not an integrated method to combine them together as one technology for mass...

    Provided By City University of Hong Kong

  • White Papers // Mar 2009

    Alliance Partners And Firm Performance: Resource Complementarity And Status Association

    Bridging the resource-based view and the institutional perspective, this study explores the performance consequences of firms' alliance partner selections by examining the interactions of resource complementarity and institutional associations (reflected through both societal and network status) between the firm and its partners. The integrative framework suggests that a joint consideration...

    Provided By City University of Hong Kong

  • White Papers // Oct 2010

    The Effects Of News About Future Productivity On International Relative Prices: An Empirical Investigation

    In this paper, the authors find that expected (news) and unexpected (contemporaneous) components of productivity changes have opposite effects on the US real exchange rate. Following Barsky and Sims' (2010) identification method, they decompose US total factor productivity (TFP) into news and contemporaneous productivity changes. The US real exchange rate...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    Energy Efficient Multipath Routing in Large Scale Sensor Networks With Multiple Sink Nodes

    Due to the battery resource constraint, it is a critical issue to save energy in wireless sensor networks, particularly in large sensor networks. One possible solution is to deploy multiple sink nodes simultaneously. In this paper, the authors propose a protocol called MRMS (Multipath Routing in large scale sensor networks...

    Provided By City University of Hong Kong

  • White Papers // Jun 2009

    Low Latency High Bandwidth Anonymous Overlay Network With Anonymous Routing

    Most existing anonymous networks focus on providing strong anonymity for the price of having lower bandwidth, higher latency and degraded usability when compared with the conventional use of the Internet. They also often anonymize only a few specific applications. In this paper, the authors propose a new approach of constructing...

    Provided By City University of Hong Kong

  • White Papers // Apr 2009

    Asymmetric Information And Global Sourcing

    This paper aims to study the choice of offshoring modes made by multinationals in the presence of asymmetric information. The authors focus on two types of asymmetric information, namely hidden characteristics and hidden action. The former creates adverse selection problem, and the later leads to moral hazard problem, both of...

    Provided By City University of Hong Kong

  • White Papers // Jan 2010

    Target Trajectory Querying in Wireless Sensor Networks

    In this paper, the authors focus on the query problem of trajectory tracking of moving targets in a wireless sensor network. Their motivation is to design in-network storage and querying protocols to support queries for searching a given target signature in a low query latency, high query reliability, and energy...

    Provided By City University of Hong Kong

  • White Papers // May 2008

    Fast Sensor Deployment for Fusion-Based Target Detection

    Recently, Wireless Sensor Networks (WSNs) have been increasingly available for mission-critical applications such as target detection, object tracking, and security surveillance. These applications often impose stringent performance requirements including high detection probability and low false alarm rate. A fundamental problem is how to deploy sensors such that the sensing performance...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    Joint Channel-Network Coding for the Gaussian Two-Way Two-Relay Network

    New aspects arise when generalizing two-way relay network with one relay to two-way relay network with multiple relays. To study the essential features of the two-way multiple-relay network, the authors focus on the case of two relays in their work. The problem of how two terminals, equipped with multiple antennas,...

    Provided By City University of Hong Kong

  • White Papers // Sep 2008

    Topology Control for Throughput Optimization in Wireless Mesh Networks

    In this paper, the authors consider the problem of topology control by joint power control and routing to maximize the network throughput in wireless mesh networks. First, they present two mathematical formulations of the joint power control and routing problem according to two different definitions of network throughput: the total...

    Provided By City University of Hong Kong

  • White Papers // Mar 2010

    TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks

    Computing Bilinear Pairing on sensor platforms has become an important research topic since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs). Some previous works have provided benchmarks for the pairing computation on sensors. However, a complete pairingbased cryptographic scheme requires much more than just a bilinear pairing operation,...

    Provided By City University of Hong Kong

  • White Papers // Mar 2009

    TinyPairing: Computing Tate Pairing on Sensor Nodes With Higher Speed and Less Memory

    Resource-constrained wireless sensors are small embedded platforms with limited computational power and memory capacity. One of the most popular sensor platforms, MICAz, which has been extensively used in both the research community and the industry, has only 4KB RAM, 128KB ROM, and an 8-bit/7.3828-MHz ATmega128L micro-controller. On these platforms, symmetric...

    Provided By City University of Hong Kong

  • White Papers // Mar 2011

    Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

    The authors explore the threat of Smartphone malware with access to on-board sensors, which open new avenues for illicit collection of private information. While existing work shows that such "Sensory malware" can convey raw sensor data (e.g., video and audio) to a remote server, these approaches lack stealthiness, incur significant...

    Provided By City University of Hong Kong

  • White Papers // Aug 2009

    Performance Analysis of Best-Effort Service in Saturated IEEE 802.16 Networks

    The IEEE 802.16 standard is a promising technology for the fourth-generation mobile networks and is being actively promoted by the WiMAX Forum, an industry-led consortium. Among the various service classes supported in the standard, best-effort service is expected to be the major service class subscribed by users due to its...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    JSCloud: Toward Remote Execution of JavaScript Code on Handheld Devices

    The authors present a generic framework, JSCloud, for the remote execution of JavaScript programs. Their work dynamically estimates whether a code partition should be executed remotely. The empirical result shows that JSCloud can be useful if the JavaScript engine on a handheld device is inefficient. A modern web application often...

    Provided By City University of Hong Kong

  • White Papers // May 2012

    On the Capacity Gain From Antenna Correlation in Multi-User MIMO Systems

    In this paper, the authors consider multi-user Multiple-Input Multiple-Output (MIMO) systems over either Multiple Access Channels (MACs) or Broadcast Channels (BCs). Contrary to common views, they show that antenna correlation at the Mobile Unit (MU), the Base Station (BS) or both sides can be potentially beneficial for such systems. Both...

    Provided By City University of Hong Kong

  • White Papers // Jul 2012

    DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems

    Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they...

    Provided By City University of Hong Kong

  • White Papers // Nov 2012

    TAAC: Temporal Attribute-Based Access Control for Multi-Authority Cloud Storage Systems

    Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE), as a promising technique for access control of encrypted data, is...

    Provided By City University of Hong Kong

  • White Papers // Oct 2012

    Concurrent Signature without Random Oracles

    Concurrent signatures provide a way to exchange digital signature among parties in an efficient and fair manner. To the best of the authors' knowledge, all the existing solutions can only be proven secure in the random oracle model. How to build an efficient concurrent signature scheme in the standard model...

    Provided By City University of Hong Kong

  • White Papers // Sep 2011

    Algorithm for Queueing Networks With Multi-Rate Traffic

    In this paper, the authors present a new algorithm for evaluating queueing networks with multi-rate traffic. The detailed state space of a node is evaluated by explicit formula. They consider reversible nodes with multi-rate traffic and find the state probabilities by taking advantage of local balance. Theory of queueing networks...

    Provided By City University of Hong Kong

  • White Papers // Aug 2012

    SMashQ: Spatial Mashup Framework for k-NN Queries in Time-Dependent Road Networks

    The k-Nearest-Neighbor (k-NN) query is one of the most popular spatial query types for Location-Based Services (LBS). In this paper, the authors focus on k-NN queries in time-dependent road networks, where the travel time between two locations may vary significantly at different time of the day. In practice, it is...

    Provided By City University of Hong Kong

  • White Papers // Oct 2010

    Query-Aware Location Anonymization for Road Networks

    Recently, several techniques have been proposed to protect the user location privacy for location-based services in the Euclidean space. Applying these techniques directly to the road network environment would lead to privacy leakage and inefficient query processing. In this paper, the authors propose a new location anonymization algorithm that is...

    Provided By City University of Hong Kong