Fujian normal university

Displaying 1-5 of 5 results

  • White Papers // Sep 2013

    Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy

    As the security key management problem is of great importance in Heterogeneous Wireless Sensor Networks (HWSN), in this paper, the authors concentrate on how to design an effective security key management scheme in HWSN based on the clustering strategy. HWSN is belonged a special kind of wireless sensor networks, which...

    Provided By Fujian normal university

  • White Papers // Jul 2012

    A Provably Secure Certificate Based Ring Signature Without Pairing

    The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, the authors propose an efficient certificate-based ring...

    Provided By Fujian normal university

  • White Papers // Mar 2012

    A Novel Fusion Method in Distributed Multi-View Video Coding Over Wireless Video Sensor Network

    To meet the special requirements of resource-limited video sensors in Wireless Video Sensor Network (WVSN), low-complexity video encoding technique is highly desired. In Distributed Multi-view Video Coding (DMVC) system, multi-view video sources are encoded separately and decoded dependently, so the burden of huge computation is shifted from the encoder side...

    Provided By Fujian normal university

  • White Papers // Apr 2011

    An Efficient Remote Data Possession Checking in Cloud Storage

    As cloud storage can achieve the goal that getting all storage resources in a plug-and-play way, it becomes a focus of attention. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, because of security and reliability, cloud storage is not widely adopted. When users...

    Provided By Fujian normal university

  • White Papers // Jan 2011

    Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-Server Environments

    Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, the authors show that Hsiang and Shih's scheme is still vulnerable to off-line password guessing attacks, impersonation attacks and server spoofing attacks. And it cannot resist against extracting secret data...

    Provided By Fujian normal university

  • White Papers // Sep 2013

    Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy

    As the security key management problem is of great importance in Heterogeneous Wireless Sensor Networks (HWSN), in this paper, the authors concentrate on how to design an effective security key management scheme in HWSN based on the clustering strategy. HWSN is belonged a special kind of wireless sensor networks, which...

    Provided By Fujian normal university

  • White Papers // Jul 2012

    A Provably Secure Certificate Based Ring Signature Without Pairing

    The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, the authors propose an efficient certificate-based ring...

    Provided By Fujian normal university

  • White Papers // Mar 2012

    A Novel Fusion Method in Distributed Multi-View Video Coding Over Wireless Video Sensor Network

    To meet the special requirements of resource-limited video sensors in Wireless Video Sensor Network (WVSN), low-complexity video encoding technique is highly desired. In Distributed Multi-view Video Coding (DMVC) system, multi-view video sources are encoded separately and decoded dependently, so the burden of huge computation is shifted from the encoder side...

    Provided By Fujian normal university

  • White Papers // Apr 2011

    An Efficient Remote Data Possession Checking in Cloud Storage

    As cloud storage can achieve the goal that getting all storage resources in a plug-and-play way, it becomes a focus of attention. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, because of security and reliability, cloud storage is not widely adopted. When users...

    Provided By Fujian normal university

  • White Papers // Jan 2011

    Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-Server Environments

    Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, the authors show that Hsiang and Shih's scheme is still vulnerable to off-line password guessing attacks, impersonation attacks and server spoofing attacks. And it cannot resist against extracting secret data...

    Provided By Fujian normal university