Shanghai UEAC Exhibition Services Co., Ltd.

Displaying 1-9 of 9 results

  • White Papers // Nov 2013

    Fully Anonymous Identity-Based Broadcast Encryption Without Random Oracles

    In a Broadcast Encryption (BE) scheme, a broadcaster can encrypt a message for a set S of users who are listening to a broadcast channel. Most Identity-Based Broadcast Encryption (IBBE) schemes are not anonymous, which means the attacker can obtain the identities of all receivers from the ciphertext. Currently, anonymous...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Oct 2013

    CRDA: A Workload-Aware and Virtual Machine Independent Scheduling Strategy for the Cloud Computing Environment

    Virtualization-based cloud computing platforms allow multiple Virtual Machines (VMs) running on the same physical machine. Efficient allocation of limited underlying resources has been a key issue. This paper presents an efficient CPU Resources Dynamic Allocation scheme (CRDA). CRDA uses the allocated credits and consumed credits to diagnose the CPU resources...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Aug 2013

    Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

    In 2007, in this paper the researchers proposed an adaptive Oblivious Transfer (OT) in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other. In this paper, the authors show that the scheme has a drawback that the sender can only serve a...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jul 2013

    Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications

    What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators cannot detect the eavesdropping. The general choice is to disrupt the communication at low cost, say, measuring the transferred quantum signals in the well-known BB84...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Feb 2013

    BSPCloud: A Hybrid Distributed-memory and Shared-memory Programming Model

    Programming models for cloud computing has been a research focus recently. Current programming models for cloud computing mainly focus on improving the efficiency of the cloud computing platforms but little has been done on the performance predictability of models. This paper presents a cloud computing programming model, called BSPCloud. The...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Sep 2012

    Joint User Grouping and Linear Virtual Beamforming: Complexity, Algorithms and Approximation Bounds

    In a wireless system, by pooling distributed users to form a virtual multi-antenna system for joint transmission, the overall quality of the communication can be greatly improved. To reduce excessive overhead associated with large-scale user cooperation, the number of participating users must be well controlled. In this paper, the authors...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jun 2012

    DSP Re-Encryption Based Access Control Enforcement Management Mechanism in DaaS

    With the popular use of service-oriented technologies, Database as a Service (DaaS) paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However, access control management by the Database Service Provider (DSP) in this paradigm is challenged because the DSP may...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jul 2011

    Grid-Based Data Stream Clustering for Intrusion Detection

    As a kind of stream data mining method, stream clustering has great potentiality in areas such as network traffic analysis, intrusion detection, etc. This paper proposes a novel grid-based clustering algorithm for stream data, which has both advantages of grid mapping and DBSCAN algorithm. The algorithm adopts the two-phase model...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Aug 2006

    Analysis of One Popular Group Signature Scheme

    In this paper, the authors show that ACJT group signature scheme is insecure. The attack introduced in the paper will be helpful for researching group signature schemes in the future. Incidently, the fair E-cash system directly based on ACJT fails. But it seems that the attack does not apply to...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Sep 2012

    Joint User Grouping and Linear Virtual Beamforming: Complexity, Algorithms and Approximation Bounds

    In a wireless system, by pooling distributed users to form a virtual multi-antenna system for joint transmission, the overall quality of the communication can be greatly improved. To reduce excessive overhead associated with large-scale user cooperation, the number of participating users must be well controlled. In this paper, the authors...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Feb 2013

    BSPCloud: A Hybrid Distributed-memory and Shared-memory Programming Model

    Programming models for cloud computing has been a research focus recently. Current programming models for cloud computing mainly focus on improving the efficiency of the cloud computing platforms but little has been done on the performance predictability of models. This paper presents a cloud computing programming model, called BSPCloud. The...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jul 2011

    Grid-Based Data Stream Clustering for Intrusion Detection

    As a kind of stream data mining method, stream clustering has great potentiality in areas such as network traffic analysis, intrusion detection, etc. This paper proposes a novel grid-based clustering algorithm for stream data, which has both advantages of grid mapping and DBSCAN algorithm. The algorithm adopts the two-phase model...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jun 2012

    DSP Re-Encryption Based Access Control Enforcement Management Mechanism in DaaS

    With the popular use of service-oriented technologies, Database as a Service (DaaS) paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However, access control management by the Database Service Provider (DSP) in this paradigm is challenged because the DSP may...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Aug 2006

    Analysis of One Popular Group Signature Scheme

    In this paper, the authors show that ACJT group signature scheme is insecure. The attack introduced in the paper will be helpful for researching group signature schemes in the future. Incidently, the fair E-cash system directly based on ACJT fails. But it seems that the attack does not apply to...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Oct 2013

    CRDA: A Workload-Aware and Virtual Machine Independent Scheduling Strategy for the Cloud Computing Environment

    Virtualization-based cloud computing platforms allow multiple Virtual Machines (VMs) running on the same physical machine. Efficient allocation of limited underlying resources has been a key issue. This paper presents an efficient CPU Resources Dynamic Allocation scheme (CRDA). CRDA uses the allocated credits and consumed credits to diagnose the CPU resources...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Aug 2013

    Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

    In 2007, in this paper the researchers proposed an adaptive Oblivious Transfer (OT) in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other. In this paper, the authors show that the scheme has a drawback that the sender can only serve a...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Jul 2013

    Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications

    What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators cannot detect the eavesdropping. The general choice is to disrupt the communication at low cost, say, measuring the transferred quantum signals in the well-known BB84...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.

  • White Papers // Nov 2013

    Fully Anonymous Identity-Based Broadcast Encryption Without Random Oracles

    In a Broadcast Encryption (BE) scheme, a broadcaster can encrypt a message for a set S of users who are listening to a broadcast channel. Most Identity-Based Broadcast Encryption (IBBE) schemes are not anonymous, which means the attacker can obtain the identities of all receivers from the ciphertext. Currently, anonymous...

    Provided By Shanghai UEAC Exhibition Services Co., Ltd.