Dongseo University

Displaying 1-10 of 10 results

  • White Papers // Oct 2013

    A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used for many real-time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security-performance balanced user authentication scheme for WSNs, which is an enhancement...

    Provided By Dongseo University

  • White Papers // Mar 2013

    Secure Storage and Access of Data in Cloud Computing

    Cloud computing is the most demanded advanced technology throughout the world. It is one of the most significant topic whose application is being researched in today's time. One of the prominent services offered in cloud computing is the cloud storage. With the cloud storage, data is stored on multiple third...

    Provided By Dongseo University

  • White Papers // Jan 2013

    An Improved Calculation Method for Activity Energy Expenditure by using PNS

    In daily life, walking is one of the most energy consumed activity. There are many researches' focuses on energy expenditure estimation using GPS and 3-axis accelerometer for location tracking and activity monitoring. However, in the case of walking on a slope, GPS location tracking method and 3-axis accelerometer method are...

    Provided By Dongseo University

  • White Papers // Oct 2012

    Data Mining of High Accuracy for the Efficiency in the Task of Massive Printing

    Random forests are known to be robust for missing and erroneous data as well as irrelevant features. Moreover, even though the forests have many trees, they can utilize the fast building property of decision trees, so they do not require much computing time. In this paper an efficient procedure that...

    Provided By Dongseo University

  • White Papers // May 2012

    Algebraic Countermeasure to Enhance the Improved Summation Generator with 2 Bit Memory

    Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, the authors have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against...

    Provided By Dongseo University

  • White Papers // Oct 2011

    Impact of Wireless Mesh Networks in Real-Time Test-Bed Setup

    Wireless Mesh Networks (WMNs) is a new emerging technology in wireless networks. WMNs are flexible, cost effective and light infrastructure based wireless technology. The IEEE has set off the task group for 802.11s to reconcile about the WMNs development. The WMNS draft still far from its final version but major...

    Provided By Dongseo University

  • White Papers // May 2011

    RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    In recent years, Wireless Sensor Networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any...

    Provided By Dongseo University

  • White Papers // May 2011

    Middleware Framework in Ubiquitous Computing System With MedRec Architecture

    Due to advent trends and development ubiquitous computing system it's becoming one of the emerging areas of research these days. There are several attributes such as mobility, unpredictability, dynamic, heterogeneous environment etc due to which it's really difficult to develop a robust and interactive application in for ubiquitous computing. By...

    Provided By Dongseo University

  • White Papers // Apr 2010

    Generating Better Radial Basis Function Network for Large Data Set of Census

    Radial basis function networks are known to have good performance compared to other artificial neural networks like multilayer perceptrons. Because the size of target data sets in data mining is very large and artificial neural networks including radial basis function networks require intensive computing, sampling is needed. So, because the...

    Provided By Dongseo University

  • White Papers // Nov 2009

    Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards

    Password-based user-authentication schemes have been widely used when users access a server to avail internet services. Multiserver password-authentication schemes enable remote users to obtain service from multiple servers without separately registering with each server. In 2008, Jia-Lun Tsai proposed an improved and efficient password-authenticated key agreement scheme for a multiserver...

    Provided By Dongseo University

  • White Papers // May 2012

    Algebraic Countermeasure to Enhance the Improved Summation Generator with 2 Bit Memory

    Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, the authors have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against...

    Provided By Dongseo University

  • White Papers // Jan 2013

    An Improved Calculation Method for Activity Energy Expenditure by using PNS

    In daily life, walking is one of the most energy consumed activity. There are many researches' focuses on energy expenditure estimation using GPS and 3-axis accelerometer for location tracking and activity monitoring. However, in the case of walking on a slope, GPS location tracking method and 3-axis accelerometer method are...

    Provided By Dongseo University

  • White Papers // Nov 2009

    Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards

    Password-based user-authentication schemes have been widely used when users access a server to avail internet services. Multiserver password-authentication schemes enable remote users to obtain service from multiple servers without separately registering with each server. In 2008, Jia-Lun Tsai proposed an improved and efficient password-authenticated key agreement scheme for a multiserver...

    Provided By Dongseo University

  • White Papers // Apr 2010

    Generating Better Radial Basis Function Network for Large Data Set of Census

    Radial basis function networks are known to have good performance compared to other artificial neural networks like multilayer perceptrons. Because the size of target data sets in data mining is very large and artificial neural networks including radial basis function networks require intensive computing, sampling is needed. So, because the...

    Provided By Dongseo University

  • White Papers // Oct 2011

    Impact of Wireless Mesh Networks in Real-Time Test-Bed Setup

    Wireless Mesh Networks (WMNs) is a new emerging technology in wireless networks. WMNs are flexible, cost effective and light infrastructure based wireless technology. The IEEE has set off the task group for 802.11s to reconcile about the WMNs development. The WMNS draft still far from its final version but major...

    Provided By Dongseo University

  • White Papers // May 2011

    Middleware Framework in Ubiquitous Computing System With MedRec Architecture

    Due to advent trends and development ubiquitous computing system it's becoming one of the emerging areas of research these days. There are several attributes such as mobility, unpredictability, dynamic, heterogeneous environment etc due to which it's really difficult to develop a robust and interactive application in for ubiquitous computing. By...

    Provided By Dongseo University

  • White Papers // Oct 2012

    Data Mining of High Accuracy for the Efficiency in the Task of Massive Printing

    Random forests are known to be robust for missing and erroneous data as well as irrelevant features. Moreover, even though the forests have many trees, they can utilize the fast building property of decision trees, so they do not require much computing time. In this paper an efficient procedure that...

    Provided By Dongseo University

  • White Papers // Oct 2013

    A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used for many real-time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security-performance balanced user authentication scheme for WSNs, which is an enhancement...

    Provided By Dongseo University

  • White Papers // Mar 2013

    Secure Storage and Access of Data in Cloud Computing

    Cloud computing is the most demanded advanced technology throughout the world. It is one of the most significant topic whose application is being researched in today's time. One of the prominent services offered in cloud computing is the cloud storage. With the cloud storage, data is stored on multiple third...

    Provided By Dongseo University

  • White Papers // May 2011

    RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    In recent years, Wireless Sensor Networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any...

    Provided By Dongseo University