South China University of Technology

Displaying 1-11 of 11 results

  • White Papers // Dec 2011

    Routing-Cost and Ant Routing Algorithm in Wireless Sensor Networks

    Due to the hardware characteristic of sensor nodes, energy consumption and balance are major problems in routing algorithm in Wireless Sensor Networks (WSNs). The networks should choose a route which not only has fewer hop count, but also makes the round of the nodes with less residual energy. In this...

    Provided By South China University of Technology

  • White Papers // May 2011

    A Simple and Efficient New Group Key Management Approach Based on Linear Geometry

    A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in the group corresponds to a vector in the vector space and the GC computes a central vector,...

    Provided By South China University of Technology

  • White Papers // May 2011

    Ubiquitous One-Time Password Service Using the Generic Authentication Architecture

    The Generic Authentication Architecture (GAA) is a standardised extension to the mobile authentication infrastructure that enables the provision of security services, such as key establishment, to network applications. In this paper the authors first show how Trusted Computing can be extended in a GAA-like framework to offer new security services....

    Provided By South China University of Technology

  • White Papers // May 2011

    Topology Control and Routing in Mobile Ad Hoc

    Cognitive Radio (CR) technology will have significant impacts on upper layer performance in Mobile Ad hoc NETworks (MANETs). In this paper, the authors study topology Control and Routing in CR-MANETs. They propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is...

    Provided By South China University of Technology

  • White Papers // Apr 2011

    Wireless Home Gateway: Software-Defined Radio Architechture and Applications

    Nowadays, wireless network in digital home is popular in academic and industrial areas. Digital home provides lots of convenience for the people daily life. This paper introduces an applicable method of designing a wireless home gateway based on Software-Defined Radio to realize a household appliances control system. The home gateway...

    Provided By South China University of Technology

  • White Papers // Apr 2011

    High-speed Hardware Implementation of Rainbow Signatures on FPGAs

    The authors propose a new efficient hardware implementation of Rain-bow signature scheme. They enhance the implementation in three directions. First, they develop a new parallel hardware design for the Gaussian elimination to solve a n x n linear system with only n clock cycles. Second, a novel multiplier was designed...

    Provided By South China University of Technology

  • White Papers // Mar 2011

    A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2"n)

    A parallel hardware architecture for the solution of linear equation systems implemented over finite fields is presented in this paper. This proposed hardware architecture could be efficiently employed in the Multivariate Public Key Cryptosystems for hardware implementation. A hardware-paralleled variant of the Gaussian elimination is adopted and is expressed as...

    Provided By South China University of Technology

  • White Papers // Mar 2011

    A Novel Group Signature Scheme Based on MPKC

    Group signature allows a group member to sign messages anonymously on the behalf of a group. In the case of a dispute, the designated group manager can open the signature to reveal the identity of its originator. As far as the authors know, most of the group signatures are based...

    Provided By South China University of Technology

  • White Papers // Feb 2011

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    Most SSL/TLS-based electronic commerce (e-commerce) applications (including Internet banking) are vulnerable to man in the middle attacks. Such attacks arise since users are often unable to authenticate a server effectively, and because user authentication methods are typically decoupled from SSL/TLS session establishment. Cryptographically binding the two authentication procedures together, a...

    Provided By South China University of Technology

  • White Papers // Nov 2010

    Ubiquitous One-Time Password Service Using Generic Authentication Architecture

    In this paper the authors exploit GAA to build a scheme that converts a simple static password authentication mechanism into a One-Time Password (OTP) system. The scheme employs a GAA-enabled user de-vice with a display and an input capability (e.g. a 3G mobile phone) and a GAA-aware server. Most importantly,...

    Provided By South China University of Technology

  • White Papers // Jul 2010

    Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing

    With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There are a number of tools and techniques for Web application testing, but few of these have addressed the procedure to gather user session data accessed...

    Provided By South China University of Technology

  • White Papers // Apr 2011

    High-speed Hardware Implementation of Rainbow Signatures on FPGAs

    The authors propose a new efficient hardware implementation of Rain-bow signature scheme. They enhance the implementation in three directions. First, they develop a new parallel hardware design for the Gaussian elimination to solve a n x n linear system with only n clock cycles. Second, a novel multiplier was designed...

    Provided By South China University of Technology

  • White Papers // Mar 2011

    A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2"n)

    A parallel hardware architecture for the solution of linear equation systems implemented over finite fields is presented in this paper. This proposed hardware architecture could be efficiently employed in the Multivariate Public Key Cryptosystems for hardware implementation. A hardware-paralleled variant of the Gaussian elimination is adopted and is expressed as...

    Provided By South China University of Technology

  • White Papers // Mar 2011

    A Novel Group Signature Scheme Based on MPKC

    Group signature allows a group member to sign messages anonymously on the behalf of a group. In the case of a dispute, the designated group manager can open the signature to reveal the identity of its originator. As far as the authors know, most of the group signatures are based...

    Provided By South China University of Technology

  • White Papers // Feb 2011

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    Most SSL/TLS-based electronic commerce (e-commerce) applications (including Internet banking) are vulnerable to man in the middle attacks. Such attacks arise since users are often unable to authenticate a server effectively, and because user authentication methods are typically decoupled from SSL/TLS session establishment. Cryptographically binding the two authentication procedures together, a...

    Provided By South China University of Technology

  • White Papers // Nov 2010

    Ubiquitous One-Time Password Service Using Generic Authentication Architecture

    In this paper the authors exploit GAA to build a scheme that converts a simple static password authentication mechanism into a One-Time Password (OTP) system. The scheme employs a GAA-enabled user de-vice with a display and an input capability (e.g. a 3G mobile phone) and a GAA-aware server. Most importantly,...

    Provided By South China University of Technology

  • White Papers // May 2011

    Ubiquitous One-Time Password Service Using the Generic Authentication Architecture

    The Generic Authentication Architecture (GAA) is a standardised extension to the mobile authentication infrastructure that enables the provision of security services, such as key establishment, to network applications. In this paper the authors first show how Trusted Computing can be extended in a GAA-like framework to offer new security services....

    Provided By South China University of Technology

  • White Papers // May 2011

    A Simple and Efficient New Group Key Management Approach Based on Linear Geometry

    A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in the group corresponds to a vector in the vector space and the GC computes a central vector,...

    Provided By South China University of Technology

  • White Papers // May 2011

    Topology Control and Routing in Mobile Ad Hoc

    Cognitive Radio (CR) technology will have significant impacts on upper layer performance in Mobile Ad hoc NETworks (MANETs). In this paper, the authors study topology Control and Routing in CR-MANETs. They propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is...

    Provided By South China University of Technology

  • White Papers // Apr 2011

    Wireless Home Gateway: Software-Defined Radio Architechture and Applications

    Nowadays, wireless network in digital home is popular in academic and industrial areas. Digital home provides lots of convenience for the people daily life. This paper introduces an applicable method of designing a wireless home gateway based on Software-Defined Radio to realize a household appliances control system. The home gateway...

    Provided By South China University of Technology

  • White Papers // Dec 2011

    Routing-Cost and Ant Routing Algorithm in Wireless Sensor Networks

    Due to the hardware characteristic of sensor nodes, energy consumption and balance are major problems in routing algorithm in Wireless Sensor Networks (WSNs). The networks should choose a route which not only has fewer hop count, but also makes the round of the nodes with less residual energy. In this...

    Provided By South China University of Technology

  • White Papers // Jul 2010

    Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing

    With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There are a number of tools and techniques for Web application testing, but few of these have addressed the procedure to gather user session data accessed...

    Provided By South China University of Technology