University of Electronic Science and Technology

Displaying 1-16 of 16 results

  • White Papers // Jun 2013

    A Novel Certificateless Deniable Authentication Protocol

    Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol. It allows the appointed receiver to identify the source of a given message, but not to prove the identity of the sender to a third party even if the appointed receiver is willing to reveal...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2013

    Profit-Aware DVFS Enabled Resource Management of IaaS Cloud

    Power consumption of IaaS Cloud is growing at a rapid pace during the last decade. This leads to high operational and maintenance cost, and also reducing the profit margin of IaaS Cloud providers. Apparently profit margin depends on operational cost and revenue earned to comply with the Service Level Agreement...

    Provided By University of Electronic Science and Technology

  • White Papers // Jan 2013

    Privacy-enhanced Designated Confirmer Signature without Random Oracles

    As an extension of digital signature, Designated Confirmer Signature (DCS) efficiently realizes the privacy protection of the signer. In a DCS scheme, the validity of the signature must be confirmed by the signer or a semi-trusted third party, called confirmer. Since the DCS signature is generated by encrypting a standard...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2012

    Query-Biased Preview Over Outsourced and Encrypted Data

    For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2012

    Optimal Provisioning for Elastic Service Oriented Virtual Network Request in Cloud Computing

    In the cloud computing paradigm users access applications/services hosted and run on virtual machines in interconnected datacenters. Applications from the same user may need to interact and change data or information, thus, the authors may abstract the applications/services request from same user as a Virtual Network (VN). To improve performance...

    Provided By University of Electronic Science and Technology

  • White Papers // Jun 2012

    An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext

    Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, the authors propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In their construction, the access policy can be expressed as any...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Interference Coordination in CoMP With Transmission Scheduling and Game Theoretical Power Reallocation

    In LTE-A (3GPP LTE-Advance) systems, CoMP (Cooperative Multi-Point) is adopted to enhance the performance of edge users. To maximize the edge user throughput, it is very crucial to properly determine the set of simultaneously served users in the same PRB (Physical Resource Block) and cooperating BSs (Base Stations) for each...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Joint Optimal Sensing and Power Allocation for Cooperative Relay in Cognitive Radio Networks

    In this paper, the authors investigate the joint optimization of sensing and power allocation for cooperative relay in Cognitive Radio Networks (CRNs). Specifically, in the sensing time slot, the source Secondary User (SU) and the relay SUs individually sense the channel, and then the relay SUs send their sensing results...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Encoded Packet-Assisted Reliable Transmission for Unicast Sessions in Wireless Networks

    In this paper, the authors propose an encoded packet-assisted retransmission, namely EAR, approach that use Opportunistic Network Coding (ONC) to improve the bandwidth efficiency for unicast sections in wireless networks. In existing ONC schemes, network coding opportunity are not always fully exploited due to the lack of understanding of the...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    An Improved Pilot-Assisted SNR Estimation for MBSFN Downlink Transmission

    Signal-to-Noise Ratio (SNR) is a crucial parameter for adaptive transmission in Orthogonal Frequency Division Multiplexing (OFDM) systems. For the OFDM-based Multicast/ Broadcast over Single Frequency Network (MBSFN) system, the downlink transmission channels is quite frequency selective, which is a great challenge for SNR estimation in user terminals with simple implementation....

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2012

    A Joint Resource Allocation Scheme for OFDMA-Based Wireless Networks With Carrier Aggregation

    The mixture of users with different Carrier Aggregation (CA) capabilities presents new challenges to optimize the performance of the next generation wireless networks. This paper focuses on the joint resources allocation for OFDMA-based multi-carrier system. Distinguished from many existing methods, the authors' approach deploys the joint dynamic spectrum resources assignment...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2012

    Triple-Star: A Coding Scheme with Optimal Encoding Complexity for Tolerating Triple Disk Failures in RAID

    Low encoding/decoding complexity is essential for practical storage systems. This paper presents a new Maximum Distance Separable (MDS) array codes, called Triple-Star, for tolerating triple disk failures in Redundant Arrays of Inexpensive Disks (RAID) architecture. Triple-Star is an extension of the double-erasure-correcting Rotary-code and a modification of the generalized triple-erasure-correcting...

    Provided By University of Electronic Science and Technology

  • White Papers // Jan 2011

    Resource Allocation for QoS-Aware OFDMA Cellular Networks With Cooperative Relaying

    This paper proposes a QoS-aware resource allocation scheme, called as Cooperative Resource Allocation scheme (CoRA), for relay-based OFDMA systems with both QoS and Best-Effort (BE) users. Using CoRA, cooperative transmission between the Base-Station (BS) and the Relay-Station (RS) is employed to fulfill the requirements of QoS users. Moreover, resource scheduling...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2009

    An Interference Suppression Scheme for MIMO-OSTBC System

    Multiple Input Multiple Output (MIMO) technique is considered as a cost-effective and promising technique for the next generation wireless system. Orthogonal Space-Time Block Codes (OSTBC) scheme is one of the most important coding schemes for MIMO system. The performance of an MIMO system using OSTBC (MIMO-OSTBC), however, degrades significantly in...

    Provided By University of Electronic Science and Technology

  • White Papers // Aug 2009

    Study on MIMO Schemes for 3G-LTE Downlink

    The combination of MIMO and OFDM becomes a key standardization work for the downlink channel in 3G Long-Term Evolution (3G-LTE). This paper studies one of the core techniques of 3G-LTE downlink: the coding and decoding schemes in a time-variable multipath environment. It discusses the MIMO schemes for 3G-LTE downlink, the...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2009

    An Anonymous Sealed-bid Electronic Auction Based on Ring Signature

    Privacy and anonymity have become two factors of increasing importance in auction protocol. This paper provides an efficient sealed-bid electronic auction protocol based on the technique of ring signature and verifiable technique of encryption key chain. The peculiar characteristics of the authors' protocol are non-repudiation of bidders but preserving their...

    Provided By University of Electronic Science and Technology

  • White Papers // Jan 2011

    Resource Allocation for QoS-Aware OFDMA Cellular Networks With Cooperative Relaying

    This paper proposes a QoS-aware resource allocation scheme, called as Cooperative Resource Allocation scheme (CoRA), for relay-based OFDMA systems with both QoS and Best-Effort (BE) users. Using CoRA, cooperative transmission between the Base-Station (BS) and the Relay-Station (RS) is employed to fulfill the requirements of QoS users. Moreover, resource scheduling...

    Provided By University of Electronic Science and Technology

  • White Papers // Aug 2009

    Study on MIMO Schemes for 3G-LTE Downlink

    The combination of MIMO and OFDM becomes a key standardization work for the downlink channel in 3G Long-Term Evolution (3G-LTE). This paper studies one of the core techniques of 3G-LTE downlink: the coding and decoding schemes in a time-variable multipath environment. It discusses the MIMO schemes for 3G-LTE downlink, the...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2009

    An Interference Suppression Scheme for MIMO-OSTBC System

    Multiple Input Multiple Output (MIMO) technique is considered as a cost-effective and promising technique for the next generation wireless system. Orthogonal Space-Time Block Codes (OSTBC) scheme is one of the most important coding schemes for MIMO system. The performance of an MIMO system using OSTBC (MIMO-OSTBC), however, degrades significantly in...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2012

    Optimal Provisioning for Elastic Service Oriented Virtual Network Request in Cloud Computing

    In the cloud computing paradigm users access applications/services hosted and run on virtual machines in interconnected datacenters. Applications from the same user may need to interact and change data or information, thus, the authors may abstract the applications/services request from same user as a Virtual Network (VN). To improve performance...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2012

    Triple-Star: A Coding Scheme with Optimal Encoding Complexity for Tolerating Triple Disk Failures in RAID

    Low encoding/decoding complexity is essential for practical storage systems. This paper presents a new Maximum Distance Separable (MDS) array codes, called Triple-Star, for tolerating triple disk failures in Redundant Arrays of Inexpensive Disks (RAID) architecture. Triple-Star is an extension of the double-erasure-correcting Rotary-code and a modification of the generalized triple-erasure-correcting...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2013

    Profit-Aware DVFS Enabled Resource Management of IaaS Cloud

    Power consumption of IaaS Cloud is growing at a rapid pace during the last decade. This leads to high operational and maintenance cost, and also reducing the profit margin of IaaS Cloud providers. Apparently profit margin depends on operational cost and revenue earned to comply with the Service Level Agreement...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Interference Coordination in CoMP With Transmission Scheduling and Game Theoretical Power Reallocation

    In LTE-A (3GPP LTE-Advance) systems, CoMP (Cooperative Multi-Point) is adopted to enhance the performance of edge users. To maximize the edge user throughput, it is very crucial to properly determine the set of simultaneously served users in the same PRB (Physical Resource Block) and cooperating BSs (Base Stations) for each...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Joint Optimal Sensing and Power Allocation for Cooperative Relay in Cognitive Radio Networks

    In this paper, the authors investigate the joint optimization of sensing and power allocation for cooperative relay in Cognitive Radio Networks (CRNs). Specifically, in the sensing time slot, the source Secondary User (SU) and the relay SUs individually sense the channel, and then the relay SUs send their sensing results...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    Encoded Packet-Assisted Reliable Transmission for Unicast Sessions in Wireless Networks

    In this paper, the authors propose an encoded packet-assisted retransmission, namely EAR, approach that use Opportunistic Network Coding (ONC) to improve the bandwidth efficiency for unicast sections in wireless networks. In existing ONC schemes, network coding opportunity are not always fully exploited due to the lack of understanding of the...

    Provided By University of Electronic Science and Technology

  • White Papers // May 2012

    An Improved Pilot-Assisted SNR Estimation for MBSFN Downlink Transmission

    Signal-to-Noise Ratio (SNR) is a crucial parameter for adaptive transmission in Orthogonal Frequency Division Multiplexing (OFDM) systems. For the OFDM-based Multicast/ Broadcast over Single Frequency Network (MBSFN) system, the downlink transmission channels is quite frequency selective, which is a great challenge for SNR estimation in user terminals with simple implementation....

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2012

    A Joint Resource Allocation Scheme for OFDMA-Based Wireless Networks With Carrier Aggregation

    The mixture of users with different Carrier Aggregation (CA) capabilities presents new challenges to optimize the performance of the next generation wireless networks. This paper focuses on the joint resources allocation for OFDMA-based multi-carrier system. Distinguished from many existing methods, the authors' approach deploys the joint dynamic spectrum resources assignment...

    Provided By University of Electronic Science and Technology

  • White Papers // Jun 2012

    An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext

    Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, the authors propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In their construction, the access policy can be expressed as any...

    Provided By University of Electronic Science and Technology

  • White Papers // Jun 2013

    A Novel Certificateless Deniable Authentication Protocol

    Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol. It allows the appointed receiver to identify the source of a given message, but not to prove the identity of the sender to a third party even if the appointed receiver is willing to reveal...

    Provided By University of Electronic Science and Technology

  • White Papers // Mar 2009

    An Anonymous Sealed-bid Electronic Auction Based on Ring Signature

    Privacy and anonymity have become two factors of increasing importance in auction protocol. This paper provides an efficient sealed-bid electronic auction protocol based on the technique of ring signature and verifiable technique of encryption key chain. The peculiar characteristics of the authors' protocol are non-repudiation of bidders but preserving their...

    Provided By University of Electronic Science and Technology

  • White Papers // Jan 2013

    Privacy-enhanced Designated Confirmer Signature without Random Oracles

    As an extension of digital signature, Designated Confirmer Signature (DCS) efficiently realizes the privacy protection of the signer. In a DCS scheme, the validity of the signature must be confirmed by the signer or a semi-trusted third party, called confirmer. Since the DCS signature is generated by encrypting a standard...

    Provided By University of Electronic Science and Technology

  • White Papers // Nov 2012

    Query-Biased Preview Over Outsourced and Encrypted Data

    For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains...

    Provided By University of Electronic Science and Technology