Kyushu University

Displaying 1-12 of 12 results

  • White Papers // Oct 2012

    Detecting Information Leakage via a HTTP Request Based on the Edit Distance

    Recently, the people often face the problem of information leakage. They propose a leakage detection system which is independent of a database. This system focuses on the leakage caused by human action and malware. In an existing research, researchers calculate an edit distance between the last HTTP request and the...

    Provided By Kyushu University

  • White Papers // Sep 2012

    Power and Performance Analysis of GPU-Accelerated Systems

    Graphics Processing Units (GPUs) provide significant improvements in performance and performance-per-watt as compared to traditional multicore CPUs. This energy-efficiency of GPUs has facilitated the use of GPUs in many application domains. Albeit energy efficient GPUs consume non-trivial power independently of CPUs. Therefore, the authors need to analyze the power and...

    Provided By Kyushu University

  • White Papers // Aug 2012

    Public Key Replacement and Universal Forgery of SCLS Scheme

    Certificateless cryptography eliminates the need of certificates in the PKI and solves the inherent key escrow problem in the ID-based cryptography. Recently, Du and Wen proposed a Short Certificateless Signature Scheme (SCLS) without MapToPoint hash function, and the signature size is short enough with only half of the DSA signature....

    Provided By Kyushu University

  • White Papers // May 2012

    Public-Key Cryptography From New Multivariate Quadratic Assumptions

    In this paper, the authors study a new Multivariate Quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, they research in the following two directions: they establish a precise asymptotic formulation of a family of hard MQ problems, and provide empirical evidence to confirm the...

    Provided By Kyushu University

  • White Papers // Apr 2012

    Security Analysis of Offline E-Cash Systems with Malicious Insider

    When the electronic cash systems are built, the main focus of the design is usually on preventing customers' malicious actions. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insiders in the potentially untrusted authorities can become threats to electronic cash systems....

    Provided By Kyushu University

  • White Papers // Sep 2011

    Enhancing SVO Logic for Mobile IPv6 Security Protocols

    In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node's address as a public key certificate to...

    Provided By Kyushu University

  • White Papers // Aug 2011

    A Training Based Transmission Period Setting Protocol

    The authors have proposed Intermittent Periodic Transmission (IPT forwarding) as an efficient packet relay method for wireless backhaul. In IPT forwarding, a source node sends packets to a destination node with a certain time interval (IPT duration) so that signal interference between relay nodes that send packets simultaneously are reduced...

    Provided By Kyushu University

  • White Papers // May 2011

    IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Forwarding

    Wireless backhaul has received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high throughput with a minimum delay network is highly appreciated to sustain the increasing proliferation in multimedia transmissions. In...

    Provided By Kyushu University

  • White Papers // Apr 2010

    A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES

    The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solving the vital problem of how to do bulk encryption/ decryption for high-bandwidth applications (Like multimedia and video encryption) in a way that takes advantage of both the superior power of the host and the superior security of the smart...

    Provided By Kyushu University

  • White Papers // Apr 2010

    A Novel Luby-Rackoff Based Cipher in a New Feistel-Network Based LPRKES for Smart Cards

    The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solving the vital problem of how to do bulk encryption and decryption for high-bandwidth applications (like multimedia and video encryption) in a way that takes advantage of both the superior power of the host and the superior security of the...

    Provided By Kyushu University

  • White Papers // Mar 2010

    An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding

    Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain...

    Provided By Kyushu University

  • White Papers // May 2008

    A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards

    Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, the authors propose a framework for such authentic program modification. In the authors' framework, before issuing a smart card to an...

    Provided By Kyushu University

  • White Papers // Apr 2012

    Security Analysis of Offline E-Cash Systems with Malicious Insider

    When the electronic cash systems are built, the main focus of the design is usually on preventing customers' malicious actions. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insiders in the potentially untrusted authorities can become threats to electronic cash systems....

    Provided By Kyushu University

  • White Papers // Oct 2012

    Detecting Information Leakage via a HTTP Request Based on the Edit Distance

    Recently, the people often face the problem of information leakage. They propose a leakage detection system which is independent of a database. This system focuses on the leakage caused by human action and malware. In an existing research, researchers calculate an edit distance between the last HTTP request and the...

    Provided By Kyushu University

  • White Papers // Apr 2010

    A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES

    The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solving the vital problem of how to do bulk encryption/ decryption for high-bandwidth applications (Like multimedia and video encryption) in a way that takes advantage of both the superior power of the host and the superior security of the smart...

    Provided By Kyushu University

  • White Papers // Apr 2010

    A Novel Luby-Rackoff Based Cipher in a New Feistel-Network Based LPRKES for Smart Cards

    The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solving the vital problem of how to do bulk encryption and decryption for high-bandwidth applications (like multimedia and video encryption) in a way that takes advantage of both the superior power of the host and the superior security of the...

    Provided By Kyushu University

  • White Papers // May 2008

    A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards

    Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, the authors propose a framework for such authentic program modification. In the authors' framework, before issuing a smart card to an...

    Provided By Kyushu University

  • White Papers // May 2011

    IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Forwarding

    Wireless backhaul has received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high throughput with a minimum delay network is highly appreciated to sustain the increasing proliferation in multimedia transmissions. In...

    Provided By Kyushu University

  • White Papers // Mar 2010

    An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding

    Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain...

    Provided By Kyushu University

  • White Papers // Sep 2011

    Enhancing SVO Logic for Mobile IPv6 Security Protocols

    In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node's address as a public key certificate to...

    Provided By Kyushu University

  • White Papers // Aug 2011

    A Training Based Transmission Period Setting Protocol

    The authors have proposed Intermittent Periodic Transmission (IPT forwarding) as an efficient packet relay method for wireless backhaul. In IPT forwarding, a source node sends packets to a destination node with a certain time interval (IPT duration) so that signal interference between relay nodes that send packets simultaneously are reduced...

    Provided By Kyushu University

  • White Papers // Aug 2012

    Public Key Replacement and Universal Forgery of SCLS Scheme

    Certificateless cryptography eliminates the need of certificates in the PKI and solves the inherent key escrow problem in the ID-based cryptography. Recently, Du and Wen proposed a Short Certificateless Signature Scheme (SCLS) without MapToPoint hash function, and the signature size is short enough with only half of the DSA signature....

    Provided By Kyushu University

  • White Papers // Sep 2012

    Power and Performance Analysis of GPU-Accelerated Systems

    Graphics Processing Units (GPUs) provide significant improvements in performance and performance-per-watt as compared to traditional multicore CPUs. This energy-efficiency of GPUs has facilitated the use of GPUs in many application domains. Albeit energy efficient GPUs consume non-trivial power independently of CPUs. Therefore, the authors need to analyze the power and...

    Provided By Kyushu University

  • White Papers // May 2012

    Public-Key Cryptography From New Multivariate Quadratic Assumptions

    In this paper, the authors study a new Multivariate Quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, they research in the following two directions: they establish a precise asymptotic formulation of a family of hard MQ problems, and provide empirical evidence to confirm the...

    Provided By Kyushu University