Harbin Engineering University

Displaying 1-10 of 10 results

  • White Papers // May 2013

    The Firewall Rule Authentication Method Based on 6to4 Tunnel

    As the enterprise network security barrier, the firewall plays an important role. However, if the user do not configure the firewall properly, this barrier is useless. Current the study of firewall rules configuration validation are not too much, the IPSec firewall rule authentication method based on the 6to4 tunnel mode...

    Provided By Harbin Engineering University

  • White Papers // Jan 2013

    On the (in)security of Some Smart-Card-Based Password Authentication Schemes for WSN

    In this paper, the authors investigate a temporal-credential-based password authentication scheme introduced by Xue et al. in 2012. This protocol only involves hash and XOR operations and thus is suitable for the resource-constrained WSN environments where an external user wants to obtain real-time data from the sensor nodes inside WSN....

    Provided By Harbin Engineering University

  • White Papers // Dec 2012

    A Weighted Cluster-Based Cooperative Spectrum Detection Algorithm for Cognitive Radio

    Cognitive radio has been considered as a potential wireless communication technology for efficient utilization of underutilized spectrum when primary users are absent. However, the performance of local single sensing degrades due to the complexities of wireless environment. The traditional cluster-based cooperative method can reduce the demand for the control channel,...

    Provided By Harbin Engineering University

  • White Papers // Dec 2012

    The Correlation Matrix Model of Capacity Analysis in Unmanned Aerial Vehicle MIMO Channel

    The 3D-GBSBCM (Geometrically Based Single Bounce Cylinder Model) channel model is applied in UAV (Unmanned Aerial Vehicle) MIMO communication system which involves direct, reflection and diffuses components. The concise and precise space-time-frequency correlation functions of the UAV channel model are presented. Methods of channel matrix factorization and channel coefficient normalization...

    Provided By Harbin Engineering University

  • White Papers // Oct 2012

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to the smart card security breach problem,...

    Provided By Harbin Engineering University

  • White Papers // Oct 2012

    Crash Recovery for Embedded Main Memory Database

    In the last years, the deployment of embedded real-time communication systems has increased dramatically. At the same time, the amount of data that needs to be managed by embedded real-time main memory databases is increasing, thus requiring an efficient data management. However, system crash will cause data loss in main...

    Provided By Harbin Engineering University

  • White Papers // Aug 2012

    On the Security of an Improved Password Authentication Scheme Based on ECC

    The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointed out that Lin and Hwang et al.'s password-based authentication scheme is vulnerable to various attacks, and then presented an...

    Provided By Harbin Engineering University

  • White Papers // Aug 2012

    The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    The competitive price game model is used to analyze the spectrum sharing in the cognitive radio networks. This paper focuses on the improved spectrum sharing problem with constraints of available spectrum resource from primary users. The constrained spectrum sharing model based on competitive price game is established. In order to...

    Provided By Harbin Engineering University

  • White Papers // May 2012

    Secure Password-Based Remote User Authentication Scheme With Non-Tamper Resistant Smart Cards

    It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec'11, Li et al. showed that Kim and Chung's password-based remote user authentication scheme is vulnerable to various attacks...

    Provided By Harbin Engineering University

  • White Papers // Sep 2011

    A Stepwise Subcarrier Allocation Algorithm for SC-FDMA Systems

    This paper investigates the dynamic subcarrier allocation problem of uplink Single Carrier Frequency Division Multiple Access (SC-FDMA) systems. A kind of stepwise subcarrier allocation algorithm is formulated, which allocates the subcarriers in two steps: subcarrier to group allocation and the subcarrier to user allocation. On this foundation, for meeting different...

    Provided By Harbin Engineering University

  • White Papers // Aug 2012

    On the Security of an Improved Password Authentication Scheme Based on ECC

    The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointed out that Lin and Hwang et al.'s password-based authentication scheme is vulnerable to various attacks, and then presented an...

    Provided By Harbin Engineering University

  • White Papers // Dec 2012

    The Correlation Matrix Model of Capacity Analysis in Unmanned Aerial Vehicle MIMO Channel

    The 3D-GBSBCM (Geometrically Based Single Bounce Cylinder Model) channel model is applied in UAV (Unmanned Aerial Vehicle) MIMO communication system which involves direct, reflection and diffuses components. The concise and precise space-time-frequency correlation functions of the UAV channel model are presented. Methods of channel matrix factorization and channel coefficient normalization...

    Provided By Harbin Engineering University

  • White Papers // Aug 2012

    The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    The competitive price game model is used to analyze the spectrum sharing in the cognitive radio networks. This paper focuses on the improved spectrum sharing problem with constraints of available spectrum resource from primary users. The constrained spectrum sharing model based on competitive price game is established. In order to...

    Provided By Harbin Engineering University

  • White Papers // Oct 2012

    Crash Recovery for Embedded Main Memory Database

    In the last years, the deployment of embedded real-time communication systems has increased dramatically. At the same time, the amount of data that needs to be managed by embedded real-time main memory databases is increasing, thus requiring an efficient data management. However, system crash will cause data loss in main...

    Provided By Harbin Engineering University

  • White Papers // May 2013

    The Firewall Rule Authentication Method Based on 6to4 Tunnel

    As the enterprise network security barrier, the firewall plays an important role. However, if the user do not configure the firewall properly, this barrier is useless. Current the study of firewall rules configuration validation are not too much, the IPSec firewall rule authentication method based on the 6to4 tunnel mode...

    Provided By Harbin Engineering University

  • White Papers // Dec 2012

    A Weighted Cluster-Based Cooperative Spectrum Detection Algorithm for Cognitive Radio

    Cognitive radio has been considered as a potential wireless communication technology for efficient utilization of underutilized spectrum when primary users are absent. However, the performance of local single sensing degrades due to the complexities of wireless environment. The traditional cluster-based cooperative method can reduce the demand for the control channel,...

    Provided By Harbin Engineering University

  • White Papers // Sep 2011

    A Stepwise Subcarrier Allocation Algorithm for SC-FDMA Systems

    This paper investigates the dynamic subcarrier allocation problem of uplink Single Carrier Frequency Division Multiple Access (SC-FDMA) systems. A kind of stepwise subcarrier allocation algorithm is formulated, which allocates the subcarriers in two steps: subcarrier to group allocation and the subcarrier to user allocation. On this foundation, for meeting different...

    Provided By Harbin Engineering University

  • White Papers // May 2012

    Secure Password-Based Remote User Authentication Scheme With Non-Tamper Resistant Smart Cards

    It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec'11, Li et al. showed that Kim and Chung's password-based remote user authentication scheme is vulnerable to various attacks...

    Provided By Harbin Engineering University

  • White Papers // Jan 2013

    On the (in)security of Some Smart-Card-Based Password Authentication Schemes for WSN

    In this paper, the authors investigate a temporal-credential-based password authentication scheme introduced by Xue et al. in 2012. This protocol only involves hash and XOR operations and thus is suitable for the resource-constrained WSN environments where an external user wants to obtain real-time data from the sensor nodes inside WSN....

    Provided By Harbin Engineering University

  • White Papers // Oct 2012

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to the smart card security breach problem,...

    Provided By Harbin Engineering University