Sungkyunkwan University

Displaying 1-31 of 31 results

  • White Papers // Aug 2012

    Security-Effective Local-Lighted Authentication Mechanism in Nemo-Based Fast Proxy Mobile IPV6 Networks

    Owing to the rapid development of wireless network technology, Internet is getting more mobile and the smart phone, a mobile device is becoming ubiquitous telecommunication environment such as web browsing, Internet telephone, visual telephony, other multi-media, etc. MNN (Mobile Network Node: like vehicle, train, airplane, ship, etc.) also accesses to...

    Provided By Sungkyunkwan University

  • White Papers // Jul 2012

    An Energy Efficient Hole Detour Scheme Using Probability Based on Virtual Position in WSNs

    Holes are generated due to limited precision of deployment, and thus bypassing holes is one important issue of Wireless Sensor Networks (WSNs). In existing routing schemes using an optimal path, intermediate nodes in the path may deplete their energy quickly, which results in expansion of holes. The Ant Colony Optimization...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2012

    Routing Algorithms for Balanced Energy Consumption in Ad Hoc Networks

    In Mobile Ad-hoc NETwork (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the MANET. In order to facilitate communication within the network, a routing protocol is used to discover routes between...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2011

    Group-Based Memory Deduplication for Virtualized Clouds

    In virtualized clouds, machine memory is known as a resource that primarily limits consolidation level due to the expensive cost of hardware extension and power consumption. To address this limitation, various memory deduplication techniques have been proposed to increase available machine memory by eliminating memory redundancy. Existing memory deduplication techniques,...

    Provided By Sungkyunkwan University

  • White Papers // Jun 2011

    RFID-ACP: RFID-Based Digital Content Identification and Authentication Mechanism in Smart Home Environments

    Over the past decades, the protection system for digital content has been introduced in numerous literatures. It mainly focuses on providing secure communication channel and copy protection. These protection systems usually use well-known cryptograph algorithms which are regarded as the most secure way for protection. Nevertheless, these technologies were circumvented...

    Provided By Sungkyunkwan University

  • White Papers // May 2011

    Interference Management in OFDMA Femtocell Networks: Issues and Approaches

    One of the effective techniques of improving the coverage and enhancing the capacity and data rate in cellular wireless networks is to reduce the cell size (i.e., cell splitting) and transmission distances. Therefore, the concept of deploying femtocells over macrocell has recently attracted growing interests in academia, industry, and standardization...

    Provided By Sungkyunkwan University

  • White Papers // Apr 2011

    Secure Data Deletion for USB Flash Memory

    People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2011

    Secure and Efficient Code Encryption Scheme Based on Indexed Table

    Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important...

    Provided By Sungkyunkwan University

  • White Papers // Jan 2011

    FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields

    Though the implementation of the Tate pairing is commonly believed to be computationally more intensive than other cryptographic operations, such as ECC point multiplication, there has been a substantial progress in speeding up the Tate pairing computations. Because of their inherent parallelism, the existing Tate pairing algorithms are very suitable...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2010

    Establishment of Improved Business Security Systems

    Many of recent security systems are used in linkage with previously defined security systems. In particular, access control functions are used in all security systems. Network access control systems have now become the basics of security systems. In this paper, an improved business security system using network access control will...

    Provided By Sungkyunkwan University

  • White Papers // Sep 2010

    Secure and Efficient Protocol for Vehicular Ad Hoc Network With Privacy Preservation

    Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, the authors present a secure yet efficient protocol for a VANET that satisfies these...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2010

    An Efficient Key Management Scheme for Secure SCADA Communication

    A SCADA (Supervisory Control And Data Acquisition) system is an industrial control and monitoring system for national infrastructures. The SCADA systems were used in a closed environment without considering about security functionality in the past. As communication technology develops, they try to connect the SCADA systems to an open network....

    Provided By Sungkyunkwan University

  • White Papers // Aug 2010

    Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol

    Password-based authentication schemes are commonly used in various systems to authenticate users. However, they have limitations. First, a server stores every user password. Second, a transferred password could be stolen by sniffing or tapping. Therefore, many researchers have proposed secure password-based schemes. In 2000, Sandirigama et al. proposed the Simple...

    Provided By Sungkyunkwan University

  • White Papers // Apr 2010

    A Randomized Controlled Trial of SMS Text Messaging Versus Postal Reminder to Improve Attendance After Lipid Lowering Therapy in Primary Care

    This study was designed to evaluate the effect and cost-effectiveness of different reminder methods in improving attendance rate in a primary care setting. The authors tested two methods - postal reminders and SMS reminders - against a control. Significantly more SMS text messaging group patients refilled their prescriptions by their...

    Provided By Sungkyunkwan University

  • White Papers // Mar 2010

    Adoption Issues for Cloud Computing

    Cloud computing allows users to use only a Web browser to receive computing services via the Internet. Users only need to pay for the services they actually use. It appears that a wide adoption of cloud computing in the foreseeable future is inevitable, and its adoption will bring about a...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs

    In Public Wireless LANs (PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, the authors point out that...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Security Analysis on the Online Office and Proposal of the Evaluation Criteria

    The online office is one of the web applications. One can easily use the online office through a web browser with internet connected PC. The online office has the advantage of using environment regardless of location or time. When users want to use the online office, they access the online...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Security Weaknesses of Dynamic ID-Based Remote User Authentication Protocol

    Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed an ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Weaknesses and Improvements of a One-Time Password Authentication Scheme

    Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Fuzzy -Based TTL (Time to Live) Determination for Improving the Energy Efficiency of the WODEM for Wormhole Attack in WSN

    One of the typical attacks in Wireless Sensor Networks (WSN) is setting up the wrong route with using a wormhole. The wormhole attack, which is accomplished by selectively relaying packets between adversaries, can ruin the routing and communication of the network without compromising any legitimate nodes. To overcome this threat,...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Intrusion Detection Scheme Against Sinkhole Attacks in Directed Diffusion Based Sensor Networks

    Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Interleaved Hop-by-Hop Authentication Using Fuzzy Logic to Defend Against of False Report Injection by Replaying an Attack

    The wireless sensor node, being a micro electronic device, can only be equipped with a limited power source (< 0.5 Ahm 1.2 V). In some application scenarios (which is like military area), replenishment of power resources might be impossible. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime....

    Provided By Sungkyunkwan University

  • White Papers // Jul 2009

    Advances In Reforming Universal Health Insurance: Lessons From South Korea

    This paper is an updated, follow-up version of the authors' previous work by accommodating time series analysis. They investigated the trends in health care finance that was recently affected by three, i.e., integration, separation, and financial reforms. Using the OECD Health Data 2008, they compared the performance outcomes of OECD...

    Provided By Sungkyunkwan University

  • White Papers // Jul 2009

    System Framework and Its Application in Mobile RFID Service Network

    Mobile RFID (Radio Frequency Identification) is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. UHF Mobile RFID technology is...

    Provided By Sungkyunkwan University

  • White Papers // Jun 2009

    The Performance Analysis of CSS-Based Communication Systems in the Jamming Environment

    Due to its capability to resist jamming signals, Chirp Spread Spectrum (CSS) technique has attracted much attention in the area of wireless communications. However, there has been little rigorous analysis for the performance of the CSS communication system in jamming environments. In this paper, the authors present analytic results on...

    Provided By Sungkyunkwan University

  • White Papers // May 2009

    Heterogeneous Attachment Strategies Optimize the Topology of Dynamic Wireless Networks

    In optimizing the topology of wireless networks built of a dynamic set of spatially embedded agents, there are many trade-offs to be dealt with. The network should preferably be as small (in the sense that the average, or maximal, pathlength is short) as possible, it should be robust to failures,...

    Provided By Sungkyunkwan University

  • White Papers // Mar 2009

    Toward Stable Clustering in Mobile Ad Hoc Networks

    This paper proposes a novel clustering scheme that aims to address the following concerns: effectiveness and low maintenance. By constructing a multi-hop clustering backbone with small number of cluster-heads, one successfully reduces the overhead of inter-cluster maintenance and backbone changes. Next, one utilizes the cluster stretching mechanism which decreases the...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2009

    Self-Healing Methodology in Ubiquitous Sensor Network

    This work concerns the development of a fault model of sensor for detecting and isolating sensor, actuator, and various faults in USNs (Ubiquitous Sensor Network). USN are developed to create relationships between humans, objects and computers in various fields. A management research of sensor nodes is very important because the...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2008

    NJ+: An Efficient Congestion Control Mechanism for Wireless Networks

    Transmission control protocols have to overcome common problems in wireless networks. TCP employing both packet loss discrimination mechanism and available bandwidth estimation algorithm, known as the good existing solution, shows significant performance enhancement in wireless networks. For instance, TCP New Jersey which exhibits high throughput in wireless networks, intends to...

    Provided By Sungkyunkwan University

  • White Papers // Nov 2008

    A Mobile Agent Platform for Supporting Ad-Hoc Network Environment

    Networks are becoming much more complicated in their support of ubiquitous computing. For example, broadband mobile communications, wireless ad-hoc networks, IPv6, and so on. Technology is moving towards Mobile Ad-hoc NETworks (MANETs), which create temporary networks. The use of mobile devices for composing MANETs is growing, and it is necessary...

    Provided By Sungkyunkwan University

  • White Papers // Oct 2008

    Enhanced Access Control With Semantic Context Hierarchy Tree for Ubiquitous Computing

    In most ubiquitous applications involving ubiquitous hospital, security mechanisms supporting the context of users and systems has becoming a key issue. Access control systems have to make decisions with users' current security-relevant context, such as time, location, user activity, and other environmental information available when the access requests arrive. In...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2010

    An Efficient Key Management Scheme for Secure SCADA Communication

    A SCADA (Supervisory Control And Data Acquisition) system is an industrial control and monitoring system for national infrastructures. The SCADA systems were used in a closed environment without considering about security functionality in the past. As communication technology develops, they try to connect the SCADA systems to an open network....

    Provided By Sungkyunkwan University

  • White Papers // Jun 2009

    The Performance Analysis of CSS-Based Communication Systems in the Jamming Environment

    Due to its capability to resist jamming signals, Chirp Spread Spectrum (CSS) technique has attracted much attention in the area of wireless communications. However, there has been little rigorous analysis for the performance of the CSS communication system in jamming environments. In this paper, the authors present analytic results on...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2010

    Establishment of Improved Business Security Systems

    Many of recent security systems are used in linkage with previously defined security systems. In particular, access control functions are used in all security systems. Network access control systems have now become the basics of security systems. In this paper, an improved business security system using network access control will...

    Provided By Sungkyunkwan University

  • White Papers // Jul 2009

    Advances In Reforming Universal Health Insurance: Lessons From South Korea

    This paper is an updated, follow-up version of the authors' previous work by accommodating time series analysis. They investigated the trends in health care finance that was recently affected by three, i.e., integration, separation, and financial reforms. Using the OECD Health Data 2008, they compared the performance outcomes of OECD...

    Provided By Sungkyunkwan University

  • White Papers // Mar 2010

    Adoption Issues for Cloud Computing

    Cloud computing allows users to use only a Web browser to receive computing services via the Internet. Users only need to pay for the services they actually use. It appears that a wide adoption of cloud computing in the foreseeable future is inevitable, and its adoption will bring about a...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2011

    Group-Based Memory Deduplication for Virtualized Clouds

    In virtualized clouds, machine memory is known as a resource that primarily limits consolidation level due to the expensive cost of hardware extension and power consumption. To address this limitation, various memory deduplication techniques have been proposed to increase available machine memory by eliminating memory redundancy. Existing memory deduplication techniques,...

    Provided By Sungkyunkwan University

  • White Papers // Sep 2010

    Secure and Efficient Protocol for Vehicular Ad Hoc Network With Privacy Preservation

    Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, the authors present a secure yet efficient protocol for a VANET that satisfies these...

    Provided By Sungkyunkwan University

  • White Papers // May 2011

    Interference Management in OFDMA Femtocell Networks: Issues and Approaches

    One of the effective techniques of improving the coverage and enhancing the capacity and data rate in cellular wireless networks is to reduce the cell size (i.e., cell splitting) and transmission distances. Therefore, the concept of deploying femtocells over macrocell has recently attracted growing interests in academia, industry, and standardization...

    Provided By Sungkyunkwan University

  • White Papers // Apr 2011

    Secure Data Deletion for USB Flash Memory

    People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2011

    Secure and Efficient Code Encryption Scheme Based on Indexed Table

    Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2010

    Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol

    Password-based authentication schemes are commonly used in various systems to authenticate users. However, they have limitations. First, a server stores every user password. Second, a transferred password could be stolen by sniffing or tapping. Therefore, many researchers have proposed secure password-based schemes. In 2000, Sandirigama et al. proposed the Simple...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Weaknesses and Improvements of a One-Time Password Authentication Scheme

    Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of...

    Provided By Sungkyunkwan University

  • White Papers // Jun 2011

    RFID-ACP: RFID-Based Digital Content Identification and Authentication Mechanism in Smart Home Environments

    Over the past decades, the protection system for digital content has been introduced in numerous literatures. It mainly focuses on providing secure communication channel and copy protection. These protection systems usually use well-known cryptograph algorithms which are regarded as the most secure way for protection. Nevertheless, these technologies were circumvented...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2012

    Routing Algorithms for Balanced Energy Consumption in Ad Hoc Networks

    In Mobile Ad-hoc NETwork (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the MANET. In order to facilitate communication within the network, a routing protocol is used to discover routes between...

    Provided By Sungkyunkwan University

  • White Papers // Jul 2012

    An Energy Efficient Hole Detour Scheme Using Probability Based on Virtual Position in WSNs

    Holes are generated due to limited precision of deployment, and thus bypassing holes is one important issue of Wireless Sensor Networks (WSNs). In existing routing schemes using an optimal path, intermediate nodes in the path may deplete their energy quickly, which results in expansion of holes. The Ant Colony Optimization...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2012

    Security-Effective Local-Lighted Authentication Mechanism in Nemo-Based Fast Proxy Mobile IPV6 Networks

    Owing to the rapid development of wireless network technology, Internet is getting more mobile and the smart phone, a mobile device is becoming ubiquitous telecommunication environment such as web browsing, Internet telephone, visual telephony, other multi-media, etc. MNN (Mobile Network Node: like vehicle, train, airplane, ship, etc.) also accesses to...

    Provided By Sungkyunkwan University

  • White Papers // Nov 2008

    A Mobile Agent Platform for Supporting Ad-Hoc Network Environment

    Networks are becoming much more complicated in their support of ubiquitous computing. For example, broadband mobile communications, wireless ad-hoc networks, IPv6, and so on. Technology is moving towards Mobile Ad-hoc NETworks (MANETs), which create temporary networks. The use of mobile devices for composing MANETs is growing, and it is necessary...

    Provided By Sungkyunkwan University

  • White Papers // Jul 2009

    System Framework and Its Application in Mobile RFID Service Network

    Mobile RFID (Radio Frequency Identification) is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. UHF Mobile RFID technology is...

    Provided By Sungkyunkwan University

  • White Papers // Mar 2009

    Toward Stable Clustering in Mobile Ad Hoc Networks

    This paper proposes a novel clustering scheme that aims to address the following concerns: effectiveness and low maintenance. By constructing a multi-hop clustering backbone with small number of cluster-heads, one successfully reduces the overhead of inter-cluster maintenance and backbone changes. Next, one utilizes the cluster stretching mechanism which decreases the...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Intrusion Detection Scheme Against Sinkhole Attacks in Directed Diffusion Based Sensor Networks

    Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Fuzzy -Based TTL (Time to Live) Determination for Improving the Energy Efficiency of the WODEM for Wormhole Attack in WSN

    One of the typical attacks in Wireless Sensor Networks (WSN) is setting up the wrong route with using a wormhole. The wormhole attack, which is accomplished by selectively relaying packets between adversaries, can ruin the routing and communication of the network without compromising any legitimate nodes. To overcome this threat,...

    Provided By Sungkyunkwan University

  • White Papers // Aug 2009

    Interleaved Hop-by-Hop Authentication Using Fuzzy Logic to Defend Against of False Report Injection by Replaying an Attack

    The wireless sensor node, being a micro electronic device, can only be equipped with a limited power source (< 0.5 Ahm 1.2 V). In some application scenarios (which is like military area), replenishment of power resources might be impossible. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime....

    Provided By Sungkyunkwan University

  • White Papers // Apr 2010

    A Randomized Controlled Trial of SMS Text Messaging Versus Postal Reminder to Improve Attendance After Lipid Lowering Therapy in Primary Care

    This study was designed to evaluate the effect and cost-effectiveness of different reminder methods in improving attendance rate in a primary care setting. The authors tested two methods - postal reminders and SMS reminders - against a control. Significantly more SMS text messaging group patients refilled their prescriptions by their...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2008

    NJ+: An Efficient Congestion Control Mechanism for Wireless Networks

    Transmission control protocols have to overcome common problems in wireless networks. TCP employing both packet loss discrimination mechanism and available bandwidth estimation algorithm, known as the good existing solution, shows significant performance enhancement in wireless networks. For instance, TCP New Jersey which exhibits high throughput in wireless networks, intends to...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs

    In Public Wireless LANs (PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, the authors point out that...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Security Analysis on the Online Office and Proposal of the Evaluation Criteria

    The online office is one of the web applications. One can easily use the online office through a web browser with internet connected PC. The online office has the advantage of using environment regardless of location or time. When users want to use the online office, they access the online...

    Provided By Sungkyunkwan University

  • White Papers // Feb 2009

    Self-Healing Methodology in Ubiquitous Sensor Network

    This work concerns the development of a fault model of sensor for detecting and isolating sensor, actuator, and various faults in USNs (Ubiquitous Sensor Network). USN are developed to create relationships between humans, objects and computers in various fields. A management research of sensor nodes is very important because the...

    Provided By Sungkyunkwan University

  • White Papers // Dec 2009

    Security Weaknesses of Dynamic ID-Based Remote User Authentication Protocol

    Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed an ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang...

    Provided By Sungkyunkwan University

  • White Papers // May 2009

    Heterogeneous Attachment Strategies Optimize the Topology of Dynamic Wireless Networks

    In optimizing the topology of wireless networks built of a dynamic set of spatially embedded agents, there are many trade-offs to be dealt with. The network should preferably be as small (in the sense that the average, or maximal, pathlength is short) as possible, it should be robust to failures,...

    Provided By Sungkyunkwan University

  • White Papers // Jan 2011

    FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields

    Though the implementation of the Tate pairing is commonly believed to be computationally more intensive than other cryptographic operations, such as ECC point multiplication, there has been a substantial progress in speeding up the Tate pairing computations. Because of their inherent parallelism, the existing Tate pairing algorithms are very suitable...

    Provided By Sungkyunkwan University

  • White Papers // Oct 2008

    Enhanced Access Control With Semantic Context Hierarchy Tree for Ubiquitous Computing

    In most ubiquitous applications involving ubiquitous hospital, security mechanisms supporting the context of users and systems has becoming a key issue. Access control systems have to make decisions with users' current security-relevant context, such as time, location, user activity, and other environmental information available when the access requests arrive. In...

    Provided By Sungkyunkwan University