Tianjin University of Technology

Displaying 1-11 of 11 results

  • White Papers // Mar 2012

    Monitoring Network Through SNMP-Based System

    SNMP-based system for monitoring network is equipped with network management, monitoring system and statistic analysis of the network in it. It not only contains the function like network information capture that normal network devices have, but also has the ability to extend such applications as CPU usage rate, traffic flow...

    Provided By Tianjin University of Technology

  • White Papers // Feb 2012

    The Improvements of KeyNote Trust Management System

    KeyNote trust management system has been applied to access control field, especially in the Distributed Access Control System (DACS). However, KeyNote is just a prototype system and it has many inadequacies in implement system. In this paper, the authors mainly improve the KeyNote trust management in four aspects. First, in...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Pointer Analysis Based Vulnerability Detection for Browser Extension

    As security issue caused by browser extensions is getting serious increasingly, this paper proposes a pointer analysis based approach to detect vulnerabilities from browser extensions. The authors convert extensions' source code into facts in Datalog, and define several rules to describe vulnerabilities' characteristic. By querying on the facts using these...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    An error in "On a new formal proof model for RFID location privacy"

    In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirovic evaluated five formal RFID privacy models. One main result is that Ha et al.'s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.'s RFID privacy model. However,...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Privacy Preserving Traffic Speed Estimation Via Mobile Probe

    As an important composition of trust computing, privacy preserving is a prerequisite of modern information technology. Although security behavior requires confidentiality for trust computing, privacy information is typically difficult to be hidden in traffic analysis systems based on mobile probe data. This paper focused on a traffic speed estimation method...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Research and Application on a Wireless GPS Data Collection and Display System

    The main purpose of this paper is to build a system that can complete the whole process from collecting GPS data, transmitting through GSM network, processing GPS data, to displaying position in maps. Also, two further applications relied on this system is proposed in this paper. There are two modules...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Auto-Selection of Security Functional Components Based on Common Criteria

    With the development of software engineering, security problems have become more and more serious through all phases in software development life circle. This paper proposes an automatic method of selecting security functional components by mapping threats and components. Firstly, the authors extract the information of threats from the published documents...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Security Modeling Based on CSP for Network Protocol

    The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper, the authors proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network...

    Provided By Tianjin University of Technology

  • White Papers // Sep 2010

    Self-Cancellation of Sample Frequency Offset in OFDM Systems in the Presence of Carrier Frequency Offset

    A self-cancellation scheme is proposed to cope with the Sample Frequency Offset (SFO) problem in OFDM systems in the presence of a Carrier Frequency Offset (CFO). Making use of the symmetry between the phase shifts caused by SFO and the subcarrier index, the authors put the same constellation symbol on...

    Provided By Tianjin University of Technology

  • White Papers // May 2010

    Synchronization for Cascaded Distributed MIMO Communications

    In this paper, the authors propose a general synchronization scheme and a common model for both frequency and time offsets in the cascaded distributed MIMO communications. By cascaded, they mean that cluster A transmits to cluster B, and cluster B transmits to cluster C, and so on, yet there is...

    Provided By Tianjin University of Technology

  • White Papers // Jun 2009

    Virtual Scene Based on VRML and Java

    VRML (The Virtual Reality Modeling Language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This paper...

    Provided By Tianjin University of Technology

  • White Papers // Jun 2009

    Virtual Scene Based on VRML and Java

    VRML (The Virtual Reality Modeling Language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This paper...

    Provided By Tianjin University of Technology

  • White Papers // May 2010

    Synchronization for Cascaded Distributed MIMO Communications

    In this paper, the authors propose a general synchronization scheme and a common model for both frequency and time offsets in the cascaded distributed MIMO communications. By cascaded, they mean that cluster A transmits to cluster B, and cluster B transmits to cluster C, and so on, yet there is...

    Provided By Tianjin University of Technology

  • White Papers // Sep 2010

    Self-Cancellation of Sample Frequency Offset in OFDM Systems in the Presence of Carrier Frequency Offset

    A self-cancellation scheme is proposed to cope with the Sample Frequency Offset (SFO) problem in OFDM systems in the presence of a Carrier Frequency Offset (CFO). Making use of the symmetry between the phase shifts caused by SFO and the subcarrier index, the authors put the same constellation symbol on...

    Provided By Tianjin University of Technology

  • White Papers // Feb 2012

    The Improvements of KeyNote Trust Management System

    KeyNote trust management system has been applied to access control field, especially in the Distributed Access Control System (DACS). However, KeyNote is just a prototype system and it has many inadequacies in implement system. In this paper, the authors mainly improve the KeyNote trust management in four aspects. First, in...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Privacy Preserving Traffic Speed Estimation Via Mobile Probe

    As an important composition of trust computing, privacy preserving is a prerequisite of modern information technology. Although security behavior requires confidentiality for trust computing, privacy information is typically difficult to be hidden in traffic analysis systems based on mobile probe data. This paper focused on a traffic speed estimation method...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Research and Application on a Wireless GPS Data Collection and Display System

    The main purpose of this paper is to build a system that can complete the whole process from collecting GPS data, transmitting through GSM network, processing GPS data, to displaying position in maps. Also, two further applications relied on this system is proposed in this paper. There are two modules...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Auto-Selection of Security Functional Components Based on Common Criteria

    With the development of software engineering, security problems have become more and more serious through all phases in software development life circle. This paper proposes an automatic method of selecting security functional components by mapping threats and components. Firstly, the authors extract the information of threats from the published documents...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Pointer Analysis Based Vulnerability Detection for Browser Extension

    As security issue caused by browser extensions is getting serious increasingly, this paper proposes a pointer analysis based approach to detect vulnerabilities from browser extensions. The authors convert extensions' source code into facts in Datalog, and define several rules to describe vulnerabilities' characteristic. By querying on the facts using these...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    Security Modeling Based on CSP for Network Protocol

    The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper, the authors proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network...

    Provided By Tianjin University of Technology

  • White Papers // Jan 2012

    An error in "On a new formal proof model for RFID location privacy"

    In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirovic evaluated five formal RFID privacy models. One main result is that Ha et al.'s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.'s RFID privacy model. However,...

    Provided By Tianjin University of Technology

  • White Papers // Mar 2012

    Monitoring Network Through SNMP-Based System

    SNMP-based system for monitoring network is equipped with network management, monitoring system and statistic analysis of the network in it. It not only contains the function like network information capture that normal network devices have, but also has the ability to extend such applications as CPU usage rate, traffic flow...

    Provided By Tianjin University of Technology