North China University of Technology

Displaying 1-5 of 5 results

  • White Papers // May 2013

    FHGM: A Frequency Hopping Game Model with Communication Security Awareness for WSN

    Wireless Sensor Networks (WSNs) are in an open wireless environment which is complex and volatile, and often subject to inadvertent or intentional interference, sensor networks can use frequency hopping technology to get away from the interference. Therefore, how accurate and timely frequency hopping is particularly important issue. To solve that,...

    Provided By North China University of Technology

  • White Papers // Apr 2012

    Comment an Anonymous Multi-Receiver Identity-Based Encryption Scheme

    Anonymous receiver encryption is an important cryptographic primitive. It can protect the privacy of the receiver. In 2010, Fan et al proposed an anonymous multi-receiver ID-based encryption by using Lagrange interpolating polynomial. Recently, Wang et al showed that Fan et al's scheme satisfied anonymity of the receivers. Then the authors...

    Provided By North China University of Technology

  • White Papers // Mar 2012

    Efficient Arithmetic on Hessian Curves Over Fields of Characteristic Three

    This paper presents new explicit formulas for the point doubling, tripling and addition for Hessian curves and their equivalent Weierstrass curves over finite fields of characteristic three. The cost of basic point operations is lower than that of all previously proposed ones. The new doubling, mixed addition and tripling formulas...

    Provided By North China University of Technology

  • White Papers // Sep 2011

    Research of BPEL Modeling Technique Based on Colored Petri Net

    Web services Business Process Execution Language (BPEL) modeling technique based on colored Petri net is proposed in this paper. Introduce a BPEL modeling principle based on colored Petri net, and a method of generating BPEL code from the colored Petri net. CPN Tools is used to build the colored Petri...

    Provided By North China University of Technology

  • White Papers // Feb 2011

    On the Security of A Short ID-Based Group Signature Scheme

    Group signature is an important anonymous technique. Two primitive properties of group signature is anonymity and unforgeability. It allows a group member to sign messages anonymously on behalf of the group such that any one can verify the signature but no one (except group manager) can find out which group...

    Provided By North China University of Technology

  • White Papers // Feb 2011

    On the Security of A Short ID-Based Group Signature Scheme

    Group signature is an important anonymous technique. Two primitive properties of group signature is anonymity and unforgeability. It allows a group member to sign messages anonymously on behalf of the group such that any one can verify the signature but no one (except group manager) can find out which group...

    Provided By North China University of Technology

  • White Papers // Mar 2012

    Efficient Arithmetic on Hessian Curves Over Fields of Characteristic Three

    This paper presents new explicit formulas for the point doubling, tripling and addition for Hessian curves and their equivalent Weierstrass curves over finite fields of characteristic three. The cost of basic point operations is lower than that of all previously proposed ones. The new doubling, mixed addition and tripling formulas...

    Provided By North China University of Technology

  • White Papers // Apr 2012

    Comment an Anonymous Multi-Receiver Identity-Based Encryption Scheme

    Anonymous receiver encryption is an important cryptographic primitive. It can protect the privacy of the receiver. In 2010, Fan et al proposed an anonymous multi-receiver ID-based encryption by using Lagrange interpolating polynomial. Recently, Wang et al showed that Fan et al's scheme satisfied anonymity of the receivers. Then the authors...

    Provided By North China University of Technology

  • White Papers // May 2013

    FHGM: A Frequency Hopping Game Model with Communication Security Awareness for WSN

    Wireless Sensor Networks (WSNs) are in an open wireless environment which is complex and volatile, and often subject to inadvertent or intentional interference, sensor networks can use frequency hopping technology to get away from the interference. Therefore, how accurate and timely frequency hopping is particularly important issue. To solve that,...

    Provided By North China University of Technology

  • White Papers // Sep 2011

    Research of BPEL Modeling Technique Based on Colored Petri Net

    Web services Business Process Execution Language (BPEL) modeling technique based on colored Petri net is proposed in this paper. Introduce a BPEL modeling principle based on colored Petri net, and a method of generating BPEL code from the colored Petri net. CPN Tools is used to build the colored Petri...

    Provided By North China University of Technology