National Tsing Hua University

Displaying 1-37 of 37 results

  • White Papers // Jan 2014

    Comments on \"EIBAS: An Efficient Identity Broadcast Authentication Scheme in Wireless Sensor Networks\"

    Recently, the researcher proposed an efficient identity-based broadcast authentication scheme based on Tso et al.'s IBS scheme with message recovery to achieve security requirements in wireless sensor networks. They claim that their scheme can achieve security requirements and mitigated Denial-of-Service (DoS) attack by limiting the times of signature verification failures...

    Provided By National Tsing Hua University

  • White Papers // Oct 2013

    QoE-Aware Virtual Machine Placement for Cloud Games

    The authors study and optimization problem to maximize the cloud gaming provider's total profit while achieving just-good-enough Quality-of-Experience (QoE). They conduct measurement studies to derive the QoE and performance models. They formulate and optimally solve the problem. The optimization problem has exponential running time, and they develop an efficient heuristic...

    Provided By National Tsing Hua University

  • White Papers // Jul 2013

    Control Flow Pattern Recognition for BPMN Process Models

    Business process modeling is the first and the most important task in Business Process Management (BPM). Business process models are implicitly composed of a set of control flow patterns, such as the parallel split, synchronization, exclusive choice, simple merge, etc. Several studies have proposed the concepts and definitions of control...

    Provided By National Tsing Hua University

  • White Papers // May 2013

    Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks

    Two-factor user authentication is an important research issue for providing security and privacy in Hierarchical Wireless Sensor Networks (HWSNs). In 2012, Das, Sharma, Chatterjee and Sing proposed a dynamic password-based user authentication scheme for HWSNs. In this paper, the authors show weaknesses of Das et al.'s scheme such as failing...

    Provided By National Tsing Hua University

  • White Papers // Nov 2012

    Linear Precoding and Power Allocation Optimization With Partial CSI Under Per BS Power Constraints for Cooperative MIMO TDD Systems

    In downlink, multicell cooperation is a powerful method to mitigate intercell interference and to increase transmit diversity. The cooperation can especially improve the Bit Error Rate (BER) performance under large scale fading. However, those cooperative Base Stations (BSs) need to share all the Channel State Information (CSI) among all BSs...

    Provided By National Tsing Hua University

  • White Papers // Oct 2012

    Secret Key Generation Over Correlated Wireless Fading Channels Using Vector Quantization

    Vector quantization schemes are proposed to extract secret keys from correlated wireless fading channels. By assuming that the channel between two terminals are reciprocal, its estimates can be used as the common randomness for generating secret keys at the two terminals. Most schemes in the literature assume that channels are...

    Provided By National Tsing Hua University

  • White Papers // Sep 2012

    Are Securities Also Derivatives?

    In this paper, the authors have used the arbitrage theorem (gordan theorem) to show that first, all securities are derivatives for each other, and they are priced by the same risk neutral probability measure. Second, after the firm changes its debt-equity ratio, the equityholders can always combine the new equity...

    Provided By National Tsing Hua University

  • White Papers // Jul 2012

    Coverage-Extended Cooperative Geographic Routing With Optimal Power Allocation for Wireless Multihop Networks

    Cooperative geographic routing has emerged as an efficient, scalable routing paradigm that exploits the joint merit of cooperative diversity and position-aided localized operation to enhance the network performance. In terms of the hop efficiency, an existing scheme called Relay-Aware Cooperative Routing (RACR) has offered a cross-layer approach based on its...

    Provided By National Tsing Hua University

  • White Papers // May 2012

    TGMD: A Trajectory-Based Group Message Delivery Protocol for Vehicular Ad Hoc Networks

    Infrastructure-To-Vehicle (I2V) group message delivery is a common operation required by a wide variety of Vehicular Ad hoc NETwork (VANET) applications. However, due to the highly dynamic mobility in VANETs, it remains a difficult problem to deliver messages to a group of moving vehicles scattering over the whole network. The...

    Provided By National Tsing Hua University

  • White Papers // May 2012

    Pushing Uplink Goodput of an Asymmetric Access Network Beyond Its Uplink Bandwidth

    Asymmetric access networks with downlink bandwidth 10 - 1000 times higher than uplink bandwidth are common, and upgrading these links may not be economically feasible in many usage scenarios. In this paper, the authors design, implement, and evaluate a parameterized Asymmetric Communication Layer (ACL) protocol that capitalizes the otherwise idling...

    Provided By National Tsing Hua University

  • White Papers // Apr 2012

    Ontology Application to Question Generation in E-Learning Systems in Mobile Industry

    Due to the rapid development of information technologies in recent years, the application of information systems and the spread of networks gradually change the life style of people today. It also allows a new way about education, E-learning, to rise up. In this paper, the authors focus on how to...

    Provided By National Tsing Hua University

  • White Papers // Mar 2012

    Flooding-Assisted Informed Dynamic Scheduling for Rateless Codes

    As part of the tradeoff between error performance, decoding complexity and the overhead of rate-less codes, the combination of Incremental Decoding (ID) and Informed Dynamic Scheduling (IDS), known as IDIDS (Incremental Decoding with Informed Dynamic Scheduling), is an attractive solution in Binary Symmetric Channels (BSC). However, applying IDIDS in the...

    Provided By National Tsing Hua University

  • White Papers // Mar 2012

    Throughput Maximization for Cognitive Radio Networks With Wideband Spectrum Sensing

    Spectrum sensing is an important issue in Cognitive Radio (CR) networks. In a periodic sensing frame structure, the spectrum sensing performance and the protection to the primary network improves while the sensing time increases. However, the longer the sensing time, the lower the throughput the CR network can achieve. In...

    Provided By National Tsing Hua University

  • White Papers // Feb 2012

    Efficient Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS

    In a Universal Mobile Telecommunications System (UMTS), a User Equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the...

    Provided By National Tsing Hua University

  • White Papers // Jan 2012

    A New Data Hiding Scheme Based on DNA Sequence

    A new DNA sequence-based data-hiding scheme is presented in this paper. The authors establish an injective mapping between one complementary rule and two secret bits in a message. Based on this mapping mechanism, the proposed scheme can effectively hide two secret bits in a message by replacing one character. This...

    Provided By National Tsing Hua University

  • White Papers // May 2011

    A Monitoring System Based on Nagios for Data Grid Environments

    The amount of digital data in today's society is already enormous and it will continue to grow exponentially. Therefore, it is necessary to devise new ways to preserve and manage the data effectively and efficiently. SRB (Storage Resource Broker), and its extension iRODS (the integrated Rule-Oriented Data System), are data...

    Provided By National Tsing Hua University

  • White Papers // May 2011

    A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    User authentication is a crucial service in Wireless Sensor Networks (WSNs) that are becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication...

    Provided By National Tsing Hua University

  • White Papers // Apr 2011

    Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach

    In this paper, the authors propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. The scheme does not use any cryptographic primitives. Instead, they use a line in a plane to represent a tag. The points on the...

    Provided By National Tsing Hua University

  • White Papers // Feb 2011

    Probabilistic SINR Constrained Robust Transmit Beamforming: A Bernstein-Type Inequality Based Conservative Approach

    Recently, robust transmit beamforming has drawn considerable attention because it can provide guaranteed receiver performance in the presence of channel state information (CSI) errors. Assuming complex Gaussian distributed CSI errors, this paper investigates the robust beamforming design problem that minimizes the transmission power subject to probabilistic signal-to-interference-plus-noise ratio (SINR) constraints....

    Provided By National Tsing Hua University

  • White Papers // Jan 2011

    Comments on Two Multi-Server Authentication Protocols

    Recently, Tsai and Liao et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. But the authors found some security loopholes in each protocol. This paper will show the attacks on their schemes. The authors have analyzed the security of Tsai's...

    Provided By National Tsing Hua University

  • White Papers // Jan 2011

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing

    As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications, such as mental poker game playing and fairly contracts signing, some extra...

    Provided By National Tsing Hua University

  • White Papers // Oct 2010

    A Novel Non-Interactive Deniable Authentication Protocol With Designated Verifier on Elliptic Curve Cryptosystem

    Recently, many Non-Interactive Deniable Authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schemes, the authors found that the signature-based approach can not deny the source of the message and thus can not achieve full deniability; and that, the...

    Provided By National Tsing Hua University

  • White Papers // Sep 2010

    Ramsey Fiscal Policy And Endogenous Growth: A Comment

    Recently, Park (2009, Economic Theory 39, 377 - 398) extended the Barro endogenous growth model (1990) by assuming that tax rate is optimally chosen by the government and labor supply is elastic. Park claimed to have proved the existence of multiple balanced growth paths that exhibit zero growth rate and...

    Provided By National Tsing Hua University

  • White Papers // Aug 2010

    Fault-Tolerant and Reliable Computation in Cloud Computing

    Cloud computing, with its great potentials in low cost and on-demand services, is a promising computing platform for both commercial and non-commercial computation clients. In this work, the authors' investigate the security perspective of scientific computation in cloud computing. The authors' investigate a cloud selection strategy to decompose the matrix...

    Provided By National Tsing Hua University

  • White Papers // Jul 2010

    A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks

    Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the Medium Access Control (MAC) and physical layers when designing a routing protocol. In this paper, the authors focus on a cross-layer framework design that exploits the synergies between network, MAC, and physical...

    Provided By National Tsing Hua University

  • White Papers // Jul 2010

    A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment

    Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a multi-server password authentication protocol which highlights no verification table in the server end could therefore be an alternative. Typically, there are three roles in a multi-server password authentication protocol: clients, servers, and a register center which plays...

    Provided By National Tsing Hua University

  • White Papers // Mar 2010

    Comments on Five Smart Card Based Password Authentication Protocols

    Smart card based password authentication protocols are widely adopted for logging into the remote servers. The protocols can provide mutual authentication between the client and the server over an open network. They make the users able to be authenticated by the remote server using a human-rememberable password and can provide...

    Provided By National Tsing Hua University

  • White Papers // Nov 2009

    Improvements on Two Password-Based Authentication Protocols

    Recently, Liao et al. and H?lbl et al. each proposed a user authentication protocol, respectively. Both claimed that their schemes can withstand various attacks. However, Xiang et al. pointed out Liao et al.'s protocol suffers from three kinds of attacks, the replay attack, the guessing attack, and the Denial-of-Service (DoS)...

    Provided By National Tsing Hua University

  • White Papers // Oct 2009

    New Convolutive-Error-Measure and Minimum Total-Model-Order Determination Algorithm for Equalization in Communications

    Model order determination is a fundamental problem in a wide variety of signal processing and telecommunication applications, such as linear predictive coding of speech signal, image segmentation and diversity-order selection for linear equalization in communication systems. Generally speaking, the criterion for selecting a proper model order is to discover an...

    Provided By National Tsing Hua University

  • White Papers // Oct 2009

    An Efficient Secure Oblivious Transfer

    As traditional oblivious transfer protocols are treated as a cryptographic primitive, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications such as mental poker playing, some necessary mechanism must be executed first to ensure...

    Provided By National Tsing Hua University

  • White Papers // Sep 2009

    Routing With Hexagonal Virtual Coordinates in Wireless Sensor Networks

    Using geographic routing, like GPSR, is efficient for ad hoc and wireless sensor networks, but it requires that nodes be aware of their physical positions. However, if there are holes in the network, routing across them using GPSR will lead to a lot of overloaded nodes on their boundaries. In...

    Provided By National Tsing Hua University

  • White Papers // Jul 2009

    A Secure E-Cash Transfer System based on the Elliptic Curve Discrete Logarithm Problem

    Now-a-days, electronic commerce is becoming more and more popular on the Internet. Many kinds of internet services are therefore developed. Among them, electronic payment system is one of the most important technology. The researchers proposed one and two e-cash payment systems respectively. They claimed that their schemes are secure. However,...

    Provided By National Tsing Hua University

  • White Papers // Jun 2009

    A Sub-Pixel Image Registration Technique With Applications to Defect Detection

    This paper presents a useful sub-pixel image registration method using line segments and a sub-pixel edge detector. In this approach, straight line segments are first extracted from gray images at the pixel level before applying the sub-pixel edge detector. Next, all sub-pixel line edges are mapped onto the orientation-distance parameter...

    Provided By National Tsing Hua University

  • White Papers // Apr 2009

    A Novel Multi-Server Authentication Protocol

    Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, after the analysis, the authors found some security loopholes in each protocol. They will first show the attacks on their schemes and then present ours. After...

    Provided By National Tsing Hua University

  • White Papers // Oct 2008

    Asymptotic Spectral Distribution of Crosscorrelation Matrix in Asynchronous CDMA

    Asymptotic Spectral Distribution (ASD) of the crosscorrelation matrix is investigated for a random spreading short/long-code asynchronous Direct Sequence-Code Division Multiple Access (DS-CDMA) system. The discrete-time decision statistics are obtained as the output samples of a bank of symbol matched filters of all users. The crosscorrelation matrix is studied when the...

    Provided By National Tsing Hua University

  • White Papers // Oct 2008

    Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks

    Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service...

    Provided By National Tsing Hua University

  • White Papers // Aug 2008

    A Real-Time Intrusion Detection System Using Data Mining Technique

    Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. This paper, proposes a system, named Intrusion Detection and Identification System (IDIS), which builds a profile for each user in an intranet to keep...

    Provided By National Tsing Hua University

  • White Papers // Nov 2012

    Linear Precoding and Power Allocation Optimization With Partial CSI Under Per BS Power Constraints for Cooperative MIMO TDD Systems

    In downlink, multicell cooperation is a powerful method to mitigate intercell interference and to increase transmit diversity. The cooperation can especially improve the Bit Error Rate (BER) performance under large scale fading. However, those cooperative Base Stations (BSs) need to share all the Channel State Information (CSI) among all BSs...

    Provided By National Tsing Hua University

  • White Papers // Feb 2012

    Efficient Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS

    In a Universal Mobile Telecommunications System (UMTS), a User Equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the...

    Provided By National Tsing Hua University

  • White Papers // Jan 2012

    A New Data Hiding Scheme Based on DNA Sequence

    A new DNA sequence-based data-hiding scheme is presented in this paper. The authors establish an injective mapping between one complementary rule and two secret bits in a message. Based on this mapping mechanism, the proposed scheme can effectively hide two secret bits in a message by replacing one character. This...

    Provided By National Tsing Hua University

  • White Papers // Oct 2009

    New Convolutive-Error-Measure and Minimum Total-Model-Order Determination Algorithm for Equalization in Communications

    Model order determination is a fundamental problem in a wide variety of signal processing and telecommunication applications, such as linear predictive coding of speech signal, image segmentation and diversity-order selection for linear equalization in communication systems. Generally speaking, the criterion for selecting a proper model order is to discover an...

    Provided By National Tsing Hua University

  • White Papers // Feb 2011

    Probabilistic SINR Constrained Robust Transmit Beamforming: A Bernstein-Type Inequality Based Conservative Approach

    Recently, robust transmit beamforming has drawn considerable attention because it can provide guaranteed receiver performance in the presence of channel state information (CSI) errors. Assuming complex Gaussian distributed CSI errors, this paper investigates the robust beamforming design problem that minimizes the transmission power subject to probabilistic signal-to-interference-plus-noise ratio (SINR) constraints....

    Provided By National Tsing Hua University

  • White Papers // May 2011

    A Monitoring System Based on Nagios for Data Grid Environments

    The amount of digital data in today's society is already enormous and it will continue to grow exponentially. Therefore, it is necessary to devise new ways to preserve and manage the data effectively and efficiently. SRB (Storage Resource Broker), and its extension iRODS (the integrated Rule-Oriented Data System), are data...

    Provided By National Tsing Hua University

  • White Papers // Oct 2012

    Secret Key Generation Over Correlated Wireless Fading Channels Using Vector Quantization

    Vector quantization schemes are proposed to extract secret keys from correlated wireless fading channels. By assuming that the channel between two terminals are reciprocal, its estimates can be used as the common randomness for generating secret keys at the two terminals. Most schemes in the literature assume that channels are...

    Provided By National Tsing Hua University

  • White Papers // Jul 2013

    Control Flow Pattern Recognition for BPMN Process Models

    Business process modeling is the first and the most important task in Business Process Management (BPM). Business process models are implicitly composed of a set of control flow patterns, such as the parallel split, synchronization, exclusive choice, simple merge, etc. Several studies have proposed the concepts and definitions of control...

    Provided By National Tsing Hua University

  • White Papers // Sep 2012

    Are Securities Also Derivatives?

    In this paper, the authors have used the arbitrage theorem (gordan theorem) to show that first, all securities are derivatives for each other, and they are priced by the same risk neutral probability measure. Second, after the firm changes its debt-equity ratio, the equityholders can always combine the new equity...

    Provided By National Tsing Hua University

  • White Papers // May 2011

    A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    User authentication is a crucial service in Wireless Sensor Networks (WSNs) that are becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication...

    Provided By National Tsing Hua University

  • White Papers // May 2013

    Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks

    Two-factor user authentication is an important research issue for providing security and privacy in Hierarchical Wireless Sensor Networks (HWSNs). In 2012, Das, Sharma, Chatterjee and Sing proposed a dynamic password-based user authentication scheme for HWSNs. In this paper, the authors show weaknesses of Das et al.'s scheme such as failing...

    Provided By National Tsing Hua University

  • White Papers // Jul 2009

    A Secure E-Cash Transfer System based on the Elliptic Curve Discrete Logarithm Problem

    Now-a-days, electronic commerce is becoming more and more popular on the Internet. Many kinds of internet services are therefore developed. Among them, electronic payment system is one of the most important technology. The researchers proposed one and two e-cash payment systems respectively. They claimed that their schemes are secure. However,...

    Provided By National Tsing Hua University

  • White Papers // Oct 2013

    QoE-Aware Virtual Machine Placement for Cloud Games

    The authors study and optimization problem to maximize the cloud gaming provider's total profit while achieving just-good-enough Quality-of-Experience (QoE). They conduct measurement studies to derive the QoE and performance models. They formulate and optimally solve the problem. The optimization problem has exponential running time, and they develop an efficient heuristic...

    Provided By National Tsing Hua University

  • White Papers // Jan 2014

    Comments on \"EIBAS: An Efficient Identity Broadcast Authentication Scheme in Wireless Sensor Networks\"

    Recently, the researcher proposed an efficient identity-based broadcast authentication scheme based on Tso et al.'s IBS scheme with message recovery to achieve security requirements in wireless sensor networks. They claim that their scheme can achieve security requirements and mitigated Denial-of-Service (DoS) attack by limiting the times of signature verification failures...

    Provided By National Tsing Hua University

  • White Papers // Aug 2008

    A Real-Time Intrusion Detection System Using Data Mining Technique

    Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. This paper, proposes a system, named Intrusion Detection and Identification System (IDIS), which builds a profile for each user in an intranet to keep...

    Provided By National Tsing Hua University

  • White Papers // Oct 2008

    Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks

    Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service...

    Provided By National Tsing Hua University

  • White Papers // Aug 2010

    Fault-Tolerant and Reliable Computation in Cloud Computing

    Cloud computing, with its great potentials in low cost and on-demand services, is a promising computing platform for both commercial and non-commercial computation clients. In this work, the authors' investigate the security perspective of scientific computation in cloud computing. The authors' investigate a cloud selection strategy to decompose the matrix...

    Provided By National Tsing Hua University

  • White Papers // Jan 2011

    Comments on Two Multi-Server Authentication Protocols

    Recently, Tsai and Liao et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. But the authors found some security loopholes in each protocol. This paper will show the attacks on their schemes. The authors have analyzed the security of Tsai's...

    Provided By National Tsing Hua University

  • White Papers // Jul 2010

    A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment

    Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a multi-server password authentication protocol which highlights no verification table in the server end could therefore be an alternative. Typically, there are three roles in a multi-server password authentication protocol: clients, servers, and a register center which plays...

    Provided By National Tsing Hua University

  • White Papers // Mar 2010

    Comments on Five Smart Card Based Password Authentication Protocols

    Smart card based password authentication protocols are widely adopted for logging into the remote servers. The protocols can provide mutual authentication between the client and the server over an open network. They make the users able to be authenticated by the remote server using a human-rememberable password and can provide...

    Provided By National Tsing Hua University

  • White Papers // Oct 2008

    Asymptotic Spectral Distribution of Crosscorrelation Matrix in Asynchronous CDMA

    Asymptotic Spectral Distribution (ASD) of the crosscorrelation matrix is investigated for a random spreading short/long-code asynchronous Direct Sequence-Code Division Multiple Access (DS-CDMA) system. The discrete-time decision statistics are obtained as the output samples of a bank of symbol matched filters of all users. The crosscorrelation matrix is studied when the...

    Provided By National Tsing Hua University

  • White Papers // Apr 2011

    Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach

    In this paper, the authors propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. The scheme does not use any cryptographic primitives. Instead, they use a line in a plane to represent a tag. The points on the...

    Provided By National Tsing Hua University

  • White Papers // Jan 2011

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing

    As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications, such as mental poker game playing and fairly contracts signing, some extra...

    Provided By National Tsing Hua University

  • White Papers // Oct 2010

    A Novel Non-Interactive Deniable Authentication Protocol With Designated Verifier on Elliptic Curve Cryptosystem

    Recently, many Non-Interactive Deniable Authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schemes, the authors found that the signature-based approach can not deny the source of the message and thus can not achieve full deniability; and that, the...

    Provided By National Tsing Hua University

  • White Papers // Nov 2009

    Improvements on Two Password-Based Authentication Protocols

    Recently, Liao et al. and H?lbl et al. each proposed a user authentication protocol, respectively. Both claimed that their schemes can withstand various attacks. However, Xiang et al. pointed out Liao et al.'s protocol suffers from three kinds of attacks, the replay attack, the guessing attack, and the Denial-of-Service (DoS)...

    Provided By National Tsing Hua University

  • White Papers // Oct 2009

    An Efficient Secure Oblivious Transfer

    As traditional oblivious transfer protocols are treated as a cryptographic primitive, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications such as mental poker playing, some necessary mechanism must be executed first to ensure...

    Provided By National Tsing Hua University

  • White Papers // Apr 2009

    A Novel Multi-Server Authentication Protocol

    Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, after the analysis, the authors found some security loopholes in each protocol. They will first show the attacks on their schemes and then present ours. After...

    Provided By National Tsing Hua University

  • White Papers // Jun 2009

    A Sub-Pixel Image Registration Technique With Applications to Defect Detection

    This paper presents a useful sub-pixel image registration method using line segments and a sub-pixel edge detector. In this approach, straight line segments are first extracted from gray images at the pixel level before applying the sub-pixel edge detector. Next, all sub-pixel line edges are mapped onto the orientation-distance parameter...

    Provided By National Tsing Hua University

  • White Papers // Sep 2010

    Ramsey Fiscal Policy And Endogenous Growth: A Comment

    Recently, Park (2009, Economic Theory 39, 377 - 398) extended the Barro endogenous growth model (1990) by assuming that tax rate is optimally chosen by the government and labor supply is elastic. Park claimed to have proved the existence of multiple balanced growth paths that exhibit zero growth rate and...

    Provided By National Tsing Hua University

  • White Papers // Jul 2010

    A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks

    Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the Medium Access Control (MAC) and physical layers when designing a routing protocol. In this paper, the authors focus on a cross-layer framework design that exploits the synergies between network, MAC, and physical...

    Provided By National Tsing Hua University

  • White Papers // Sep 2009

    Routing With Hexagonal Virtual Coordinates in Wireless Sensor Networks

    Using geographic routing, like GPSR, is efficient for ad hoc and wireless sensor networks, but it requires that nodes be aware of their physical positions. However, if there are holes in the network, routing across them using GPSR will lead to a lot of overloaded nodes on their boundaries. In...

    Provided By National Tsing Hua University

  • White Papers // Apr 2012

    Ontology Application to Question Generation in E-Learning Systems in Mobile Industry

    Due to the rapid development of information technologies in recent years, the application of information systems and the spread of networks gradually change the life style of people today. It also allows a new way about education, E-learning, to rise up. In this paper, the authors focus on how to...

    Provided By National Tsing Hua University

  • White Papers // Jul 2012

    Coverage-Extended Cooperative Geographic Routing With Optimal Power Allocation for Wireless Multihop Networks

    Cooperative geographic routing has emerged as an efficient, scalable routing paradigm that exploits the joint merit of cooperative diversity and position-aided localized operation to enhance the network performance. In terms of the hop efficiency, an existing scheme called Relay-Aware Cooperative Routing (RACR) has offered a cross-layer approach based on its...

    Provided By National Tsing Hua University

  • White Papers // May 2012

    TGMD: A Trajectory-Based Group Message Delivery Protocol for Vehicular Ad Hoc Networks

    Infrastructure-To-Vehicle (I2V) group message delivery is a common operation required by a wide variety of Vehicular Ad hoc NETwork (VANET) applications. However, due to the highly dynamic mobility in VANETs, it remains a difficult problem to deliver messages to a group of moving vehicles scattering over the whole network. The...

    Provided By National Tsing Hua University

  • White Papers // May 2012

    Pushing Uplink Goodput of an Asymmetric Access Network Beyond Its Uplink Bandwidth

    Asymmetric access networks with downlink bandwidth 10 - 1000 times higher than uplink bandwidth are common, and upgrading these links may not be economically feasible in many usage scenarios. In this paper, the authors design, implement, and evaluate a parameterized Asymmetric Communication Layer (ACL) protocol that capitalizes the otherwise idling...

    Provided By National Tsing Hua University

  • White Papers // Mar 2012

    Flooding-Assisted Informed Dynamic Scheduling for Rateless Codes

    As part of the tradeoff between error performance, decoding complexity and the overhead of rate-less codes, the combination of Incremental Decoding (ID) and Informed Dynamic Scheduling (IDS), known as IDIDS (Incremental Decoding with Informed Dynamic Scheduling), is an attractive solution in Binary Symmetric Channels (BSC). However, applying IDIDS in the...

    Provided By National Tsing Hua University

  • White Papers // Mar 2012

    Throughput Maximization for Cognitive Radio Networks With Wideband Spectrum Sensing

    Spectrum sensing is an important issue in Cognitive Radio (CR) networks. In a periodic sensing frame structure, the spectrum sensing performance and the protection to the primary network improves while the sensing time increases. However, the longer the sensing time, the lower the throughput the CR network can achieve. In...

    Provided By National Tsing Hua University