Shandong University

Displaying 1-17 of 17 results

  • White Papers // Dec 2011

    Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT

    TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/rotation. TEA and XTEA are Feistel ciphers with 64 rounds designed by Needham and Wheeler, where XTEA is...

    Provided By Shandong University

  • White Papers // Nov 2011

    A New Protocol for Deniable Authentication

    Deniable authentication protocol allows a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. The authors construct a protocol for deniable authentication via extractable hash proof system and proved the unforgeability in a concurrent...

    Provided By Shandong University

  • White Papers // Oct 2011

    Secret Key Awareness Security Public Key Encryption Scheme

    In this paper, firstly, the authors introduce a new security definition called secret key awareness security which is to guarantee anyone generating the public key to know the corresponding secret key. Following, they give a concrete implementing for secret key awareness security. Secondly, they present two applications: one is in...

    Provided By Shandong University

  • White Papers // Aug 2011

    The Application of Cloud Computing in Textile-Order Service

    Cloud computing is rapidly emerging as a technology trend almost every industry that provides or consumes software, hardware, and infrastructure can leverage. The technology and architecture that cloud service and deployment models offer are a key area of research in current for Textile-order Process Management System (TPMS). The adoption of...

    Provided By Shandong University

  • White Papers // Jul 2011

    Mining the Changes of Concurrencies in Checkup Data

    More and more medical insurance institutes employ historical medical data as a guide tool, but it is hardly to understand the trends over the time. In the dynamic environment, understanding changes of the datasets can help health care institutions to grasp the basic trends of concurrencies, establish effective measurement of...

    Provided By Shandong University

  • White Papers // Jun 2011

    Trust Management Model for Mobile Ad Hoc Network Based on Analytic Hierarchy Process and Fuzzy Theory

    Owing to the openness in network topology and the absence of centralized administration in management, Mobile Ad hoc NETwork (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a...

    Provided By Shandong University

  • White Papers // Feb 2011

    A Reputation-Based Trust Aware Web Service Interaction Pattern for Manufacturing Grids

    Integrated service systems such as service oriented Manufacturing Grids have become new promising paradigms for enterprises distributed computing and application integration. In such environments, service providers and consumers come together to participate in service engagements in an autonomous way and thus trust problems arise. A lot of research work has...

    Provided By Shandong University

  • White Papers // Feb 2011

    Multidimensional Dynamic Risk Measure Via Conditional G-Expectation

    This paper studies multidimensional dynamic risk measure induced by conditional g-expectation. A notion of multidimensional g-expectation is proposed to provide a multidimensional version of nonlinear expectations. By a technical result on explicit expressions for the comparison theorem, uniqueness theorem and viability on a rectangle of solutions to multidimensional backward stochastic...

    Provided By Shandong University

  • White Papers // Jan 2011

    A Clustering Algorithm Based on Information Visualization

    This paper studies a clustering algorithm based on information visulization. In this algorithm, through a Non-Linear Programming mapping (NLP), some high-dimensional and complicated feature data is transformed into low-dimensional feature data, such as one, two and three dimensionality. Its main aim is that the geometry image in high-dimensional space is...

    Provided By Shandong University

  • White Papers // Jan 2011

    Meta-Data Driven Data Chunk Based Secure Data Storage for SaaS

    Software-as-a-Service, i.e. SaaS, is an emerging model that allows tenants to outsource computation and storage of their sensitive data to external service providers. Although SaaS model provides many benefits, it introduces new security concerns in data storage. Untrustworthy service providers might violate tenants' data privacy or maliciously delete, modify and...

    Provided By Shandong University

  • White Papers // Aug 2010

    A Trust-Augmented Voting Scheme for Collaborative Privacy Management

    Social networks have sprung up and become a hot issue of current society. In spite of the fact that these networks provide users with a variety of attractive features, much to users' dismay, however, they are likely to expose users' private information (unintentionally). In this paper, the authors propose an...

    Provided By Shandong University

  • White Papers // Aug 2010

    Research on Dynamic Web Services Management Based on QoS

    Web Services is emerging as a promising technology. With the popularity of Web Services technology, people have recognized the importance of Web Services management. How to provide high-quality services for people is a problem to be resolved. QoS (Quality of Service) is an important guideline of Web Services quality and...

    Provided By Shandong University

  • White Papers // Jul 2010

    Lattice-Based Identity-Based Broadcast Encryption Scheme

    Motivated by the lattice basis delegation technique due to, the authors propose an adaptively secure Identity-Based Broadcast Encryption(IBBE) scheme based on the hard worst-case lattice problems. The construction can be generalized to a Hierarchical IBBE (HIBBE) easily. Using the method in, they also modify the basic construction to obtain an...

    Provided By Shandong University

  • White Papers // Nov 2009

    Cryptanalysis of Two Knapsack Public-Key Cryptosystems

    In this paper, the authors cryptanalyze two knapsack cryptosystems. The first one is proposed by Hwang et al, which is based on a new permutation algorithm named Permutation Combination Algorithm. They show that this permutation algorithm is useless to the security of the cryptosystem. Because of the special super increasing...

    Provided By Shandong University

  • White Papers // Oct 2009

    Game-Based Verification of Multi-Party Contract Signing Protocols

    A Multi-Party Contract Signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. The authors analyze the protocols of Mukhamedov and Ryan (MR), and of Mauw, Radomirovi?c and Torabi Dashti (MRT), using the finite-state model checker Mocha. Mocha allows for the specification...

    Provided By Shandong University

  • White Papers // Aug 2009

    Trust-Based On-Demand Multipath Routing in Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, the...

    Provided By Shandong University

  • White Papers // Apr 2009

    Earliest Deadline Scheduling for Continuous Queries Over Data Streams

    Many stream-based applications have real-time performance requirements for continuous queries over time-varying data streams. In order to address this challenge, a real-time continuous query model is presented to process multiple queries with timing constraints. In this model, the execution of one tuple passing through an operator path is modeled as...

    Provided By Shandong University

  • White Papers // Aug 2010

    A Trust-Augmented Voting Scheme for Collaborative Privacy Management

    Social networks have sprung up and become a hot issue of current society. In spite of the fact that these networks provide users with a variety of attractive features, much to users' dismay, however, they are likely to expose users' private information (unintentionally). In this paper, the authors propose an...

    Provided By Shandong University

  • White Papers // Oct 2009

    Game-Based Verification of Multi-Party Contract Signing Protocols

    A Multi-Party Contract Signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. The authors analyze the protocols of Mukhamedov and Ryan (MR), and of Mauw, Radomirovi?c and Torabi Dashti (MRT), using the finite-state model checker Mocha. Mocha allows for the specification...

    Provided By Shandong University

  • White Papers // Jun 2011

    Trust Management Model for Mobile Ad Hoc Network Based on Analytic Hierarchy Process and Fuzzy Theory

    Owing to the openness in network topology and the absence of centralized administration in management, Mobile Ad hoc NETwork (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a...

    Provided By Shandong University

  • White Papers // Feb 2011

    A Reputation-Based Trust Aware Web Service Interaction Pattern for Manufacturing Grids

    Integrated service systems such as service oriented Manufacturing Grids have become new promising paradigms for enterprises distributed computing and application integration. In such environments, service providers and consumers come together to participate in service engagements in an autonomous way and thus trust problems arise. A lot of research work has...

    Provided By Shandong University

  • White Papers // Jan 2011

    A Clustering Algorithm Based on Information Visualization

    This paper studies a clustering algorithm based on information visulization. In this algorithm, through a Non-Linear Programming mapping (NLP), some high-dimensional and complicated feature data is transformed into low-dimensional feature data, such as one, two and three dimensionality. Its main aim is that the geometry image in high-dimensional space is...

    Provided By Shandong University

  • White Papers // Jan 2011

    Meta-Data Driven Data Chunk Based Secure Data Storage for SaaS

    Software-as-a-Service, i.e. SaaS, is an emerging model that allows tenants to outsource computation and storage of their sensitive data to external service providers. Although SaaS model provides many benefits, it introduces new security concerns in data storage. Untrustworthy service providers might violate tenants' data privacy or maliciously delete, modify and...

    Provided By Shandong University

  • White Papers // Jul 2011

    Mining the Changes of Concurrencies in Checkup Data

    More and more medical insurance institutes employ historical medical data as a guide tool, but it is hardly to understand the trends over the time. In the dynamic environment, understanding changes of the datasets can help health care institutions to grasp the basic trends of concurrencies, establish effective measurement of...

    Provided By Shandong University

  • White Papers // Aug 2011

    The Application of Cloud Computing in Textile-Order Service

    Cloud computing is rapidly emerging as a technology trend almost every industry that provides or consumes software, hardware, and infrastructure can leverage. The technology and architecture that cloud service and deployment models offer are a key area of research in current for Textile-order Process Management System (TPMS). The adoption of...

    Provided By Shandong University

  • White Papers // Nov 2011

    A New Protocol for Deniable Authentication

    Deniable authentication protocol allows a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. The authors construct a protocol for deniable authentication via extractable hash proof system and proved the unforgeability in a concurrent...

    Provided By Shandong University

  • White Papers // Aug 2010

    Research on Dynamic Web Services Management Based on QoS

    Web Services is emerging as a promising technology. With the popularity of Web Services technology, people have recognized the importance of Web Services management. How to provide high-quality services for people is a problem to be resolved. QoS (Quality of Service) is an important guideline of Web Services quality and...

    Provided By Shandong University

  • White Papers // Dec 2011

    Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT

    TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/rotation. TEA and XTEA are Feistel ciphers with 64 rounds designed by Needham and Wheeler, where XTEA is...

    Provided By Shandong University

  • White Papers // Oct 2011

    Secret Key Awareness Security Public Key Encryption Scheme

    In this paper, firstly, the authors introduce a new security definition called secret key awareness security which is to guarantee anyone generating the public key to know the corresponding secret key. Following, they give a concrete implementing for secret key awareness security. Secondly, they present two applications: one is in...

    Provided By Shandong University

  • White Papers // Aug 2009

    Trust-Based On-Demand Multipath Routing in Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, the...

    Provided By Shandong University

  • White Papers // Apr 2009

    Earliest Deadline Scheduling for Continuous Queries Over Data Streams

    Many stream-based applications have real-time performance requirements for continuous queries over time-varying data streams. In order to address this challenge, a real-time continuous query model is presented to process multiple queries with timing constraints. In this model, the execution of one tuple passing through an operator path is modeled as...

    Provided By Shandong University

  • White Papers // Jul 2010

    Lattice-Based Identity-Based Broadcast Encryption Scheme

    Motivated by the lattice basis delegation technique due to, the authors propose an adaptively secure Identity-Based Broadcast Encryption(IBBE) scheme based on the hard worst-case lattice problems. The construction can be generalized to a Hierarchical IBBE (HIBBE) easily. Using the method in, they also modify the basic construction to obtain an...

    Provided By Shandong University

  • White Papers // Nov 2009

    Cryptanalysis of Two Knapsack Public-Key Cryptosystems

    In this paper, the authors cryptanalyze two knapsack cryptosystems. The first one is proposed by Hwang et al, which is based on a new permutation algorithm named Permutation Combination Algorithm. They show that this permutation algorithm is useless to the security of the cryptosystem. Because of the special super increasing...

    Provided By Shandong University

  • White Papers // Feb 2011

    Multidimensional Dynamic Risk Measure Via Conditional G-Expectation

    This paper studies multidimensional dynamic risk measure induced by conditional g-expectation. A notion of multidimensional g-expectation is proposed to provide a multidimensional version of nonlinear expectations. By a technical result on explicit expressions for the comparison theorem, uniqueness theorem and viability on a rectangle of solutions to multidimensional backward stochastic...

    Provided By Shandong University