University of Waterloo

Displaying 1-40 of 158 results

  • White Papers // Apr 2015

    The Random Oracle Model: A Twenty-Year Retrospective

    It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one decade since the authors first discussed the controversy that had arisen concerning its use. In this paper, they argue that there is no evidence that the need for the random oracle...

    Provided By University of Waterloo

  • White Papers // Sep 2014

    Efficient Implementations of A Quantum-Resistant Key-Exchange Protocol on Embedded Systems

    Presence of quantum computers is a real threat against the security of currently used public key cryptographic algorithms such as RSA and Elliptic curve cryptography. Isogeny computation on elliptic curves is believed to be difficult even on a quantum computer and hence isogeny-based protocols represent one of the few truly...

    Provided By University of Waterloo

  • White Papers // Apr 2014

    Vulnerability Analysis and Countermeasures for WiFi-based Location Services and Applications

    Wireless LANs, or Wi-Fi, are very common in any household or business today. Their wireless nature allows mobility and convenience for the user and that opens up a lot of new possibilities in mobile devices such as smartphones and tablets. One application that makes use of wireless LANs is positioning,...

    Provided By University of Waterloo

  • White Papers // Mar 2014

    A Physical Layer DSB Enc Scheme for RFID Systems

    Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless technology primarily used for identifying and tracking of objects, goods and humans. RFID is not only limited to identification and tracking applications. This proliferating wireless technology has been deployed in numerous securities sensitive applications such as access control, e-passports, contactless...

    Provided By University of Waterloo

  • White Papers // Jan 2014

    New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis

    The WG stream ciphers are based on the WG (Welch-Gong) transformation and possess proved randomness properties. In this paper, the authors propose nine new hardware designs for the two classes of WG (29, 11) and WG-16. For each class, they design and implement three versions of standard, pipelined and serial....

    Provided By University of Waterloo

  • White Papers // Aug 2013

    Loxin - A Universal Solution to Password-Free Login

    As the easiest and cheapest way of authenticating an end user, password based approach has been consistently chosen by implementers of every new computer or mobile device based web service. Unfortunately, the explosive growth of web applications has made it impossible for users to manage dozens of passwords for accessing...

    Provided By University of Waterloo

  • White Papers // Jul 2013

    Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic

    The Welch-Gong (WG) stream cipher family was designed based on the WG transformation and is able to generate key streams with mathematically proven randomness properties such as long period, balance, ideal tuple distribution, ideal two-level autocorrelation and high and exact linear complexity. In this paper, the authors present a compact...

    Provided By University of Waterloo

  • White Papers // Mar 2013

    Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds

    Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Additionally, cloud-based data is increasingly being accessed by resource-constrained...

    Provided By University of Waterloo

  • White Papers // Feb 2013

    Outsourced Private Information Retrieval with Pricing and Access Control

    In this paper, the authors propose a scheme for outsourcing Private Information Retrieval (PIR) to untrusted servers while protecting the privacy of the database owner as well as that of the database clients. They observe that by layering PIR on top of an Oblivious RAM (ORAM) data layout, they provide...

    Provided By University of Waterloo

  • White Papers // Dec 2012

    Evaluating Private Information Retrieval on the Cloud

    The goal of Private Information Retrieval (PIR) is for a client to query a database in such a way that no one, including the database operator, can determine any information about the desired database record. Many PIR schemes have been developed, but are generally not deemed fast enough for client...

    Provided By University of Waterloo

  • White Papers // Nov 2012

    Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications

    Pseudorandom number generators play an important role to provide security and privacy on Radio Frequency IDentification (RFID) tags. In particular, the EPC Class 1 Generation 2 (EPC C1 Gen2) standard uses a pseudorandom number generator in the tag identification protocol. In this paper, the authors first present a pseudorandom number...

    Provided By University of Waterloo

  • White Papers // Nov 2012

    A New Double Point Multiplication Method and its Implementation on Binary Elliptic Curves with Endomorphisms

    Efficient and high-performance implementation of point multiplication is crucial for elliptic curve cryptosystems. In this paper, the authors present a new double point multiplication algorithm based on differential addition chains. They use their scheme to implement single point multiplication on binary elliptic curves with efficiently computable endomorphisms. Their proposed scheme...

    Provided By University of Waterloo

  • White Papers // Oct 2012

    WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

    Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards and wireless sensor nodes. In this paper, the authors present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and...

    Provided By University of Waterloo

  • White Papers // Oct 2012

    New Implementations of the WG Stream Cipher

    In this paper, the authors present two new hardware designs of theWG-128 cipher, one for the Multiple Output Welch-Gong version (MOWG), and the other for the single output version Welch-Gong (WG), based on type-II Optimal Normal Basis (ONB) representation. The proposed MOWG design uses signal reuse techniques to reduce hardware...

    Provided By University of Waterloo

  • White Papers // Aug 2012

    A Framework for Ubiquitous IP Communications in Vehicle to Grid Networks

    The electrical grid is a critical infrastructure that is slowly moving towards a more reliable and efficient supply system: the Smart Grid. As part of this migration process, a new group of energy-aware and emission-free technologies are being developed. Electric vehicles are a promising technology that belongs to that group....

    Provided By University of Waterloo

  • White Papers // Aug 2012

    Decentralized Inverter Control in Microgrids Based on Power Sharing Information Through Wireless Communications

    For the future smart grid, decentralized inverter control is essential in Distributed Generation (DG) micro-grids where a powerful central controller is unavailable for cost and reliability concerns. However, decentralized inverter control suffers from limited system stability mainly because of the lack of communications among different inverters. In this paper, the...

    Provided By University of Waterloo

  • White Papers // Jun 2012

    Sequential Multiplier with Sub-linear Gate Complexity

    Multiplication over finite fields is used in both symmetric and asymmetric key cryptosystems and has been a subject of study, especially for its improved implementation, among many researchers as evidenced in their publications. In this paper, the authors present a new sequential multiplier for extended binary finite fields. Like its...

    Provided By University of Waterloo

  • White Papers // Jun 2012

    Enable Pervasive Healthcare Through Continuous Remote Health Monitoring

    In this paper, the authors introduce a novel Remote Health Monitoring (RHM) system to enable high-quality pervasive healthcare services to users with low delivery delay and reduced costs. They define the RHM architecture and summarize the design considerations. They then present a promising commercialized solution, ViiCare, with system infrastructures and...

    Provided By University of Waterloo

  • White Papers // Apr 2012

    Implementing Pairings at the 192-Bit Security Level

    The authors implement asymmetric pairings derived from Kachisa-Schaefer-Scott (KSS), Barreto-Naehrig (BN), and Barreto-Lynn-Scott (BLS) elliptic curves at the 192-bit security level. Somewhat surprisingly, they find pairings derived from BLS curves with embedding degree 12 to be the fastest for their serial as well as their parallel implementations. The serial implementations...

    Provided By University of Waterloo

  • White Papers // Apr 2012

    FIFO Queueing Policies for Packets With Heterogeneous Processing

    The authors consider the problem of managing a bounded size First-In-First-Out (FIFO) queue buffer, where each incoming unit-sized packet requires several rounds of processing before it can be transmitted out. Their objective is to maximize the total number of successfully transmitted packets. They consider both push-out (when the policy is...

    Provided By University of Waterloo

  • White Papers // Mar 2012

    Cross-Band Interference Reduction Trade-Offs in SISO and MISO OFDM-Based Cognitive Radios

    Cognitive radio is a promising approach for efficient utilization of radio spectrum. Due to its high spectral efficiency and flexibility, OFDM is considered as a good signaling scheme for cognitive radios. In this paper, the authors investigate the problem of cross-band interference minimization in OFDM-based cognitive systems. Cross-band interference is...

    Provided By University of Waterloo

  • White Papers // Mar 2012

    Multiagent Coordination in Microgrids Via Wireless Networks

    The future smart grid is expected to be an integration of intelligent microgrids featured by localized electricity generation, storage, and consumption. Wireless communication is a promising means to facilitate pervasive microgrid monitoring and control at a high flexibility and low deployment cost. In order to avoid a single point of...

    Provided By University of Waterloo

  • White Papers // Mar 2012

    SUCCESS: A Secure User-Centric and Social-Aware Reputation Based Incentive Scheme for DTNs

    Delay/Disruption Tolerant Networks (DTNs) are self-organized wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. However, this assumption would be easily violated due to the selfish nodes which are unwilling to...

    Provided By University of Waterloo

  • White Papers // Mar 2012

    Probabilistic Generation of Good Span n Sequences from Nonlinear Feedback Shift Registers

    A binary span n sequence generated by an n-stage NonLinear Feedback Shift Register (NLFSR) is a sequence with the randomness properties: period 2n-1, balanced and ideal n-tuple distribution. It is possible that it also has high linear span. For providing security in constrained environments such as RFID tags and sensor...

    Provided By University of Waterloo

  • White Papers // Mar 2012

    Solving Discrete Logarithms in Smooth-Order Groups with CUDA

    In this paper, the authors chronicles their experiences using CUDA to implement a parallelized variant of Pollard's rho algorithm to solve discrete logarithms in groups with cryptographically large moduli but smooth order using commodity GPUs. They first discuss some key design constraints imposed by modern GPU architectures and the CUDA...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Optimally Robust Private Information Retrieval

    The authors give a protocol for multi-server information-theoretic private information retrieval which achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client to successfully complete queries and identify server misbehavior in the presence of the maximum possible number of malicious servers. They have implemented their...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2

    This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with simple key schedules and having block sizes smaller than key lengths. The authors have successfully applied this multidimensional approach to the...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    A Secure Payment Scheme With Low Communication and Processing Overhead for Multihop Wireless Networks

    The authors propose RACE, a report-based payment scheme for multi-hop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the Accounting Center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Enabling Pervasive Healthcare With Privacy Preservation in Smart Community

    Smart community is an emerging Internet of Things application. It supports a variety of high-value automated services such as pervasive healthcare through a multi-hop community network of smart homes in a local residential region. In this paper, the authors study privacy preserving data communication between patients and an online healthcare...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks

    In this paper, the authors propose a distributed Prediction-based Secure and Reliable routing framework (PSR) for emerging Wireless Body Area Networks (WBANs). It can be integrated with a specific routing protocol to improve the latter's reliability and prevent data injection attacks during data communication. In PSR, using past link quality...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    PReFilter: An Efficient Privacy-Preserving Relay Filtering Scheme for Delay Tolerant Networks

    Without direct path, information delivery in sparse Delay Tolerant Networks (DTNs) typically relies on intermittent relays, making the transmission not only unreliable but also time consuming. To make the matter even worse, the source nodes may transmit some encrypted "Junk" information, similar as the spam emails in current mail systems,...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Location Privacy Preservation in Collaborative Spectrum Sensing

    Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, the authors consider a converse question: could space diversity be exploited by a malicious entity, e.g., an external attacker or an untrusted Fusion Center (FC),...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Cost-Effective Barrier Coverage by Mobile Sensor Networks

    Barrier coverage problem in emerging mobile sensor networks has been an interesting research issue. Existing solutions to this problem aim to decide one-time movement for individual sensors to construct as many barriers as possible, which may not work well when there are no sufficient sensors to form a single barrier....

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Cooperative Cognitive Radio Networking Using Quadrature Signaling

    A quadrature signaling based two-phase cooperation framework for cooperative cognitive radio networking is proposed. By leveraging the degrees of freedom provided by orthogonal modulation, secondary users are able to relay the traffic of primary users and transmit their own in the same time slot without interference. To evaluate the cooperation...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Intermodeling, Queries, and Kleisli Categories

    Specification and maintenance of relationships between models are vital for MDE. The authors show that a wide class of such relationships can be specified in a compact and precise manner, if inter-model mappings are allowed to link derived model elements computed by corresponding queries. Composition of such mappings is not...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Soft Reconstruction of Speech in the Presence of Noise and Packet Loss

    Exploiting the residual redundancy in a source coder output stream during the decoding process has been proven to be a bandwidth efficient way to combat the noisy channel degradations. In this paper, the authors consider soft reconstruction of speech spectrum, in GSM Adaptive Multi-Rate and IS-641 vocoders, transmitted over a...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Spectral-Efficient Differential Space-Time Coding Using Non-Full-Diverse Constellations

    In this paper, a method is proposed to construct spectral-efficient unitary space-time codes for high-rate differential communications over multiple-antenna channels. Unlike most of the known methods which are designed to maximize the diversity product (the minimum determinant distance), the authors' objective is to increase the spectral efficiency. The simulation results...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    On the Limitations of the Naive Lattice Decoding

    In this paper, the inherent drawbacks of the naive lattice decoding for MIMO fading systems is investigated. The authors show that using the naive lattice decoding for MIMO systems has considerable deficiencies in terms of the rate-diversity trade-off. Unlike the case of maximum-likelihood decoding, in this case, even the perfect...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction

    A new viewpoint for adopting the lattice reduction in communication over MIMO broadcast channels is introduced. Lattice basis reduction helps one to reduce the average transmitted energy by modifying the region which includes the constellation points. Also, the outage probability for both cases of fixed-rate users and fixed sum-rate is...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    LLL Reduction Achieves the Receive Diversity in MIMO Decoding

    Diversity order is an important measure for the performance of communication systems over MIMO fading channels. In this paper, the authors prove that in MIMO multiple access systems (or MIMO point-to-point systems with V-BLAST transmission), lattice-reduction-aided decoding achieves the maximum receive diversity (which is equal to the number of receive...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    Using Sphinx to Improve Onion Routing Circuit Construction

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. The authors significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing,...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 Based Processors

    Elliptic Curve Cryptography (ECC), discovered independently by Miller and Koblitz in mid 80's, has gained widespread acceptance in recent years, taking over a central role in public-key cryptography that was previously exclusive to the classic RSA. This technological shift is partially explained by ECC's reduced key length requirement to achieve...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel

    In this paper, the authors consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. First they assumed that the channels are degraded and the wire-tapper...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures

    An error decodable secret-sharing scheme is a secret-sharing scheme with the additional property that the secret can be recovered from the set of all shares, even after a coalition of participants corrupts the shares they possess. In this paper the authors consider schemes that can tolerate corruption by sets of...

    Provided By University of Waterloo

  • White Papers // Nov 2010

    Omnidirectional Relay in Wireless Networks

    For wireless networks with multiple sources, an omnidirectional relay scheme is developed, where each node can simultaneously relay different messages in different directions. This is accomplished by the decode-and-forward relay strategy, with each relay binning the multiple messages to be transmitted, in the same spirit of network coding. Specially for...

    Provided By University of Waterloo

  • White Papers // Nov 2010

    Exact, Efficient and Information-Theoretically Secure Voting With an Arbitrary Number of Cheaters

    The authors present three voting protocols with unconditional privacy and correctness, without assuming any bound on the number of corrupt participants. All protocols have polynomial complexity and require private channels and a simultaneous broadcast channel. Unlike previously proposed protocols in this model, the protocols that they present deterministically output the...

    Provided By University of Waterloo

  • White Papers // Dec 2010

    A Practical Platform for Cube-Attack-Like Cryptanalyses

    Cube Attack was announced by Dinur and Shamir in 2008, and published at Eurocrypt'09. Cube Attack was first designed to search linear expressions of the secret keys in stream ciphers. In Cube Attack, a cipher can be treated as a black box and expressed in Boolean functions. By manipulating the...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography

    An Identity-Based Encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a Private-Key Generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Unconditionally Secure Signature Schemes Revisited

    Unconditionally Secure Signature (USS) schemes provide the ability to electronically sign documents without the reliance on computational assumptions needed in traditional digital signatures. Unlike digital signatures, USS schemes require both different signing and different verification algorithms for each user in the system. Thus, any viable security definition for a USS...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Short One-Time Signatures

    The authors present a new one-time signature scheme having short signatures. The new scheme is also the first one-time signature scheme that supports aggregation, batch verification, and which admits efficient proofs of knowledge. It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Dealer-Free Dynamic Secret Sharing Schemes With Unconditional Security

    This paper proposes dealer-free dynamic secret sharing constructions where different parameters of the scheme can be changed after the initialization. In practice, the ability of the adversary might be enhanced over time, for instance, by compromising more players. A possible solution to this problem is to increase the threshold and/or...

    Provided By University of Waterloo

  • White Papers // Apr 2011

    Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance

    The authors present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. They say a system provides over-the-shoulder coercion-resistance if a voter can undetectably avoid complying with an adversary...

    Provided By University of Waterloo

  • White Papers // May 2010

    Efficient Techniques for High-Speed Elliptic Curve Cryptography

    In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report new speed records on modern x86-64 based processors. The different implementations include elliptic curves using Jacobian coordinates, extended Twisted Ed-wards coordinates and the...

    Provided By University of Waterloo

  • White Papers // Nov 2009

    Mechanism Design for Network Virtualization

    Recently network virtualization has been proposed as a promising approach to thwart the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared infrastructure which itself is controlled by self-interested infrastructure providers. A major challenge in this respect is the VN embedding problem...

    Provided By University of Waterloo

  • White Papers // Apr 2011

    Paging for Multicore Processors

    Paging for multicore processors extends the classical paging problem to a setting in which several processes simultaneously share the cache. Recently, Hassidim studied cache eviction policies for multicores under the traditional competitive analysis metric, showing that LRU is not competitive against an offline policy that has the power of arbitrarily...

    Provided By University of Waterloo

  • White Papers // Apr 2011

    Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference

    Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the network devices themselves. In the presence of antagonistic interference, reliable communication in sensor networks becomes an extremely challenging problem that, in recent years, has attracted...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    SMURFEN: A Knowledge Sharing Intrusion Detection Network

    The problem of Internet intrusions has become a world-wide security concern. To protect computer users from malicious attacks, Intrusion Detection Systems (IDSs) are designed to monitor network traffic and computer activities in order to alert users about suspicious intrusions. Collaboration among IDSs allows users to benefit from the collective knowledge...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Universal Top K Keyword Search Over Relational Databases

    Keyword search is one of the most effective paradigms for information discovery. One of the key advantages of keyword search querying is its simplicity. There is an increasing need for allowing ordinary users to issue keyword queries without any knowledge of the database schema. The retrieval unit of keyword search...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Optimal Speedup on a Low-Degree Multi-Core Parallel Architecture (LoPRAM)

    Modern microprocessor architectures have gradually incorporated support for parallelism. In the past the degree of parallelism was rather small and as such it could be best modeled as a constant speedup over the traditional RAM model, however, as a consequence of continued growth this assumption might no longer hold. For...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Generalizations of Network Design Problems With Degree Bounds

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. This paper extends the scope of the iterative relaxation method in two directions: by handling more complex degree constraints in the minimum spanning tree problem namely laminar crossing spanning tree,...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Notio - A Java API for Developing CG Tools

    Notio is a Java API for constructing conceptual graph tools and systems. Rather than attempting to provide a comprehensive toolset, Notio attempts to address the widely varying needs of the CG community by providing a platform for the development of tools and applications. It is, first and foremost, an API...

    Provided By University of Waterloo

  • White Papers // Feb 2011

    D-MG Tradeoff of DF and AF Relaying Protocols Over Asynchronous PAM Cooperative Networks

    The diversity multiplexing tradeoff of a general two-hop asynchronous cooperative network is examined for various relaying protocols such as Non-orthogonal Selection Decode-and-Forward (NSDF), Orthogonal Selection Decode-and-Forward (OSDF), Non-orthogonal Amplify-and-Forward (NAF), and Orthogonal Amplify-and-Forward (OAF). The transmitter nodes are assumed to send Pulse Amplitude Modulation (PAM) signals asynchronously, in which information...

    Provided By University of Waterloo

  • White Papers // May 2011

    Enabling Network Convergence Through Contextual Session Mobility With IMS

    To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This paper investigates the problem space of supporting Session Mobility (SM) with IMS...

    Provided By University of Waterloo

  • White Papers // Jun 2011

    Grammar Inference for Web Documents

    Presentational XML documents, such as XHTML or Presentation MathML, use XML tags mainly for formatting purposes, while descriptive XML applications, such as a well-structured movie database, use tags to structure data items in a semantically meaningful way. There is little semantic connection between tags in a presentational XML document and...

    Provided By University of Waterloo

  • White Papers // Sep 2010

    Investigation of Targeting-Assistance Techniques for Distant Pointing With Relative Ray Casting

    Pointing at displays from a distance is becoming a common scenario for controlling computers and entertainment systems. Several devices use direct-pointing methods, where the user points a hand-held device at targets on a screen, but these often suffer from accuracy problems. Many techniques have been explored for improving mouse-based pointing,...

    Provided By University of Waterloo

  • White Papers // Apr 2011

    Improving The Design Of Financial Products In A Multidimensional Black-Scholes Market

    Using various techniques, authors have shown that in one-dimensional markets, complex (path-dependent) contracts are generally not optimal for rational consumers. In this paper the authors generalize these results to a multidimensional Black-Scholes market. In such a market, they discuss optimal contracts for investors who prefer more to less and have...

    Provided By University of Waterloo

  • White Papers // May 2011

    Anonymity and One-Way Authentication in Key Exchange Protocols

    Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Optimizing Energy and Modulation Selection in Multi-Resolution Modulation for Wireless Video Broadcast/Multicast

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Monitoring Burst (M-Burst)- A Novel Framework of Failure Localization in All-Optical Mesh Networks

    Achieving instantaneous and precise failure localization in all-optical Wavelength Division Multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst),...

    Provided By University of Waterloo

  • White Papers // May 2011

    TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    The authors propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    ARBR: Adaptive Reinforcement-Based Routing for DTN

    This paper introduces a novel routing protocol in Delay Tolerant Networks (DTNs), aiming to solve the online distributed routing problem. By manipulating a collaborative reinforcement learning technique, a group of nodes can cooperate with each other and make a forwarding decision for the stored messages based on a cost function...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    MAC-Layer Active Dropping for Real-Time Video Streaming in IEEE 802.16 Networks

    This paper introduces a MAC-layer Active Dropping (AD) scheme for achieving effective resource utilization and maintaining application-level quality of services in real-time video streaming over the emerging wireless broadband access networks based on Time-Division Multiple Access (TDMA). By proactively dropping the MAC-layer Protocol Data Units (MPDUs) of a video frames...

    Provided By University of Waterloo

  • White Papers // May 2011

    Comments on a Sensor Network Key Redistribution Technique of Cichon, Golebiewski and Kutylowski

    Cichon, Golebiewski and Kutylowski proposed a technique for "Key redistribution" in sensor networks. The idea is that long-term keys held by the sensor nodes are used to encrypt temporal keys that a base station then broadcasts to the network. The temporal keys are used as session keys by the nodes...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Forward Focus: Medium Access Control for Ad Hoc Networks

    The wireless medium must be effectively shared in an ad hoc network. The multihop nature of the network demands it, with packets often requiring several transmissions in order to reach their destination. This paper describes a mechanism for improving the IEEE 802.11 MAC specifically for ad hoc networks. The Forward...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Recommendations for Optical Disc Archival Storage

    For a multitude of reasons, printing to paper is still the best option for long term preservation of archival records. However, this is not possible for all records. Audiovisual recordings obviously need to remain in a machine-readable format that can be played using current technology. Many users of digital cameras...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    iMark: An Identity Management Framework for Network Virtualization Environment

    Network virtualization has gained a lot of popularity in the recent years. It has been heralded as a flexible and open ended network for the future. Network Virtualizations allow the existence of multiple Virtual Networks (VNs). These VNs in turn can assume their own individual routing, addressing, naming and transport...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Bluetooth-Enabled In-Home Patient Monitoring System: Early Detection of Alzheimer's Disease

    As the baby boom generation is aging, more and more people are diagnosed with Alzheimer's disease, early detection of which is shown to be vital and necessary for better medical treatments and prolonging life expectancies. This paper proposes a Bluetooth-enabled in-home patient monitoring system, facilitating early detection of Alzheimer's disease....

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Enabling Pervasive Healthcare With Privacy Preservation in Smart Community

    Smart community is an emerging Internet of Things application. It supports a variety of high-value automated services such as pervasive healthcare through a multi-hop community network of smart homes in a local residential region. In this paper, the authors study privacy preserving data communication between patients and an online healthcare...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks

    In this paper, the authors propose a distributed Prediction-based Secure and Reliable routing framework (PSR) for emerging Wireless Body Area Networks (WBANs). It can be integrated with a specific routing protocol to improve the latter's reliability and prevent data injection attacks during data communication. In PSR, using past link quality...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Cost-Effective Barrier Coverage by Mobile Sensor Networks

    Barrier coverage problem in emerging mobile sensor networks has been an interesting research issue. Existing solutions to this problem aim to decide one-time movement for individual sensors to construct as many barriers as possible, which may not work well when there are no sufficient sensors to form a single barrier....

    Provided By University of Waterloo