Guangdong University of Business Studies

Displaying 1-4 of 4 results

  • White Papers // Jan 2012

    Study and Implementation of Wireless Sensor Networks Collaboration Based on Bio-Inspired Trust and Reputation Model(BTRM)

    Wireless Sensor Networks (WSNs) are usually deployed in the non-controlled environment without maintenance, facing the danger of information disclosure, tampering, replay attacks, denial of service and other threats, it makes collaboration among WSN nodes become more and more vital. Some common trust collaboration model is analyzed and summarized in this...

    Provided By Guangdong University of Business Studies

  • White Papers // Jun 2011

    Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Authenticating remote users in Wireless Sensor Networks (WSN) is an important security issue due to their unattended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource constrained environment is a critical security concern. Recently, Yeh et...

    Provided By Guangdong University of Business Studies

  • White Papers // May 2011

    Breaking a Certificateless Key Agreement Protocol Withour Bilinear Pairing

    Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Many certificateless designated verifier signature protocols using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than...

    Provided By Guangdong University of Business Studies

  • White Papers // Aug 2009

    Developing Model Of E-commerce E-marketing

    First, the author analyzed the basic content of e-commerce and e-marketing. Second, they discussed the common characteristics and relationship between them. Third, they gave the definition of e-commerce e-marketing, analyzed the relationship between e-commerce e-marketing and e-commerce, e-marketing, and gave out the implementing process of e-commerce e-marketing. Forth, gave out...

    Provided By Guangdong University of Business Studies

  • White Papers // Aug 2009

    Developing Model Of E-commerce E-marketing

    First, the author analyzed the basic content of e-commerce and e-marketing. Second, they discussed the common characteristics and relationship between them. Third, they gave the definition of e-commerce e-marketing, analyzed the relationship between e-commerce e-marketing and e-commerce, e-marketing, and gave out the implementing process of e-commerce e-marketing. Forth, gave out...

    Provided By Guangdong University of Business Studies

  • White Papers // Jun 2011

    Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Authenticating remote users in Wireless Sensor Networks (WSN) is an important security issue due to their unattended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource constrained environment is a critical security concern. Recently, Yeh et...

    Provided By Guangdong University of Business Studies

  • White Papers // May 2011

    Breaking a Certificateless Key Agreement Protocol Withour Bilinear Pairing

    Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Many certificateless designated verifier signature protocols using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than...

    Provided By Guangdong University of Business Studies

  • White Papers // Jan 2012

    Study and Implementation of Wireless Sensor Networks Collaboration Based on Bio-Inspired Trust and Reputation Model(BTRM)

    Wireless Sensor Networks (WSNs) are usually deployed in the non-controlled environment without maintenance, facing the danger of information disclosure, tampering, replay attacks, denial of service and other threats, it makes collaboration among WSN nodes become more and more vital. Some common trust collaboration model is analyzed and summarized in this...

    Provided By Guangdong University of Business Studies