Nanjing University of Aeronautics and Astronautics

Displaying 1-8 of 8 results

  • White Papers // Aug 2013

    A Formal Model of Trust Chain Based on Multi-Level Security Policy

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. The authors use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Oct 2011

    Influence of Technical Parameters on the Mechanical Properties of Diamond Coating in Infrared Window

    Diamond coatings were prepared on mono-crystalline silicon by the hot filament chemical vapor deposition. The mechanical properties of the diamond coatings related with the micro-hardness measurement and the elastic modulus measurement were evaluated by using a nano-indenter system. The influence of the technical parameters such as methane volume ratio, substrate...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Jul 2011

    Dynamic Role-Based Access Control for Web Services Using Context and Trust

    Currently, the security issues of Web services are hot area in Information System (IS). This research mainly discusses the key technologies of information access control focusing on following works: after analyzing the dynamic characteristic of application nature for Web services, a Dynamic Role-Based Access Control using Context and Trust model...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Mar 2011

    Novel Carrier Frequency Offset Estimator in MIMO-OFDM System

    In this paper, the authors address the problem of Carrier Frequency Offset (CFO) estimation for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The authors reconstruct the received signal to form data model with multi-invariance property, and then multi-invariance MUSIC algorithm for CFO estimation is proposed. Their proposed algorithm...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2010

    Design and Implementation of a Novel General-Purpose Enterprise Application Business Infrastructure Software Platform

    Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application development platforms focus on technical aspects rather than business, so it lead to a high degree of difficulty and heavy workload during the building of specific enterprise applications. Other platforms...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2010

    Chosen Public Key and Ciphertext Secure Proxy Re-Encryption Schemes

    A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegate. Proxy re-encryption schemes have been found useful in many applications, including e-mail forwarding, law-enforcement monitoring, and content distribution. Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen ciphertext...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Nov 2008

    Full Security: Fuzzy Identity Based Encryption

    At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2007

    Entropy-Inspired Competitive Clustering Algorithms

    Clustering is the process of grouping data points into classes or clusters so that members of the same cluster are more similar to each other in some sense than to members of other clusters. Clustering is useful for exploring the underlying structure of a given data set and has been...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Nov 2008

    Full Security: Fuzzy Identity Based Encryption

    At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Mar 2011

    Novel Carrier Frequency Offset Estimator in MIMO-OFDM System

    In this paper, the authors address the problem of Carrier Frequency Offset (CFO) estimation for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The authors reconstruct the received signal to form data model with multi-invariance property, and then multi-invariance MUSIC algorithm for CFO estimation is proposed. Their proposed algorithm...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Jul 2011

    Dynamic Role-Based Access Control for Web Services Using Context and Trust

    Currently, the security issues of Web services are hot area in Information System (IS). This research mainly discusses the key technologies of information access control focusing on following works: after analyzing the dynamic characteristic of application nature for Web services, a Dynamic Role-Based Access Control using Context and Trust model...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Oct 2011

    Influence of Technical Parameters on the Mechanical Properties of Diamond Coating in Infrared Window

    Diamond coatings were prepared on mono-crystalline silicon by the hot filament chemical vapor deposition. The mechanical properties of the diamond coatings related with the micro-hardness measurement and the elastic modulus measurement were evaluated by using a nano-indenter system. The influence of the technical parameters such as methane volume ratio, substrate...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2010

    Design and Implementation of a Novel General-Purpose Enterprise Application Business Infrastructure Software Platform

    Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application development platforms focus on technical aspects rather than business, so it lead to a high degree of difficulty and heavy workload during the building of specific enterprise applications. Other platforms...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2010

    Chosen Public Key and Ciphertext Secure Proxy Re-Encryption Schemes

    A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegate. Proxy re-encryption schemes have been found useful in many applications, including e-mail forwarding, law-enforcement monitoring, and content distribution. Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen ciphertext...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Dec 2007

    Entropy-Inspired Competitive Clustering Algorithms

    Clustering is the process of grouping data points into classes or clusters so that members of the same cluster are more similar to each other in some sense than to members of other clusters. Clustering is useful for exploring the underlying structure of a given data set and has been...

    Provided By Nanjing University of Aeronautics and Astronautics

  • White Papers // Aug 2013

    A Formal Model of Trust Chain Based on Multi-Level Security Policy

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. The authors use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust...

    Provided By Nanjing University of Aeronautics and Astronautics