Wuhan Institute of Technology Network and Information Center

Displaying 1-37 of 37 results

  • White Papers // Apr 2014

    Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems

    With the increasing popularity of cloud-based data services, data owners are highly motivated to store their huge amount of (potentially sensitive) personal data files on remote servers in encrypted form. Clients later can query over the encrypted database to retrieve files of interest while preventing database servers from learning private...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2013

    Deep Attacks of a Certificateless Signature Scheme

    Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in identity-based cryptography. Recently, the researcher proposed a certificateless signature scheme and proved that their scheme is existentially unforgeable against adaptive chosen message...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Oct 2013

    Polynomial Selection for Number Field Sieve in Geometric View

    Polynomial selection is the first important step in number field sieve. A good polynomial not only can produce more relations in the sieving step, but also can reduce the matrix size. In this paper, the authors propose to use geometric view in the polynomial selection. In geometric view, the coefficients'...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2013

    Protection Model of Security Systems Based on Neyman-Person Criterion

    In this paper, security systems deployed over an area are regarded abstractly as a diagram of security network. They propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2013

    Protection Intensity Evaluation for a Security System Based on Entropy Theory

    The protection effectiveness is an important metric to judge whether a security system is good or not. In this paper, a security system deployed in a guard field is regarded abstractly as a security network. A quantitative protection effectiveness evaluation method based on entropy theory is introduced. The authors propose...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2013

    An Efficient Certificateless Designated Verifier Signature Scheme

    To solve the key escrow problem in identity-based cryptosystem, Al-Riyami et al. introduced the CertificateLess Public Key Cryptography (CL-PKC). As an important cryptographic primitive, CertificateLess Designated Verifier Signature (CLDVS) scheme was studied widely. Following Al-Riyami et al. work, many certificateless Designated Verifier Signature (DVS) schemes using bilinear pairings have been...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jun 2013

    A CCRA based Mass Customization Development for Cloud Services

    With the incredible popularity of cloud computing, the adoption of Mass Customization (MC) is significant for building a cloud computing system that could provide services provisioning in a manner of multi-tenancy. Because of lack of a standard architecture that supports MC development for cloud services, the existing metadata or model...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // May 2013

    The State-of-the-Art in Web-Scale Semantic Information Processing for Cloud Computing

    Based on integrated infrastructure of resource sharing and computing in distributed environment, cloud computing involves the provision of dynamically scalable and provides virtualized resources as services over the Internet. These applications also bring a large scale heterogeneous and distributed information which poses a great challenge in terms of the semantic...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Mar 2013

    Taxation-based Neighbor Selection for Layered Peer-to-Peer Streaming

    Peer-To-Peer (P2P) streaming is being considered as the most promising approach to deliver real-time video to large scale users over the Internet. Neighbor selection is one of the key components to construct overlay topology for P2P streaming systems. Currently the majority of QoS aware neighbor selection approaches assume that the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2013

    Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

    Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their significance in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2013

    Handoff Management Enhancement Using Soft Computing Techniques

    In 4G cellular system, due to the mobility, proper handoff or handover management is critical to ensure seamless migration from one cell to another cell. Besides of maintaining the connection quality during a handover process, any advanced handover algorithms which can minimize required resources for the connection are critical. When...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2013

    Formal Analysis of Information Card Federated Identity-Management Protocol

    Information Card (InfoCard) is a user-centric identity management meta-system. It has been accepted as a standard of OASIS Identity Meta-system Interoperability Technical Committee. However, there is currently a lack of security analysis to InfoCard protocol, especially, with formal methods. In this paper, the authors accommodate such a requirement by analyzing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2013

    Two-Dimension Chaotic-Multivariate Signature System

    A novel hybrid cryptosystem which is resistant to quantum algorithm is developed. The system is combined with multivariate cryptosystem and chaotic system, two systems which are both secure under quantum attacks. The plaintexts are displaced by an affine transformation and encrypted by central map in multivariable cryptosystem. And then, the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    A Dynamic Statistical Model for Geospatial Data Access Laws Based on Cloud Computing

    The strategy of storage and organization can be adjusted utilizing the access and distribution law of the spatial data, which will significantly improve system performance of spatial data services. The access and distribution law of the spatial data based on Hotmap and Zipf-like are statics, and can not reflect its...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    An Optimized Memory Integrity Verification Mechanism Based on Advanced Hot Window Hash Tree

    Memory integrity verification is generally used to protect against corruption or unauthorized modification to information and provide a tamper-proof environment. The memory integrity verification efficiency is generally considered as one of the most important factors in practical application. The authors present a high-performance scheme to realize memory integrity verification. Firstly,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    An Optimization Technique for Spatial Compound Joins Based on a Topological Relationship Query and Buffering Analysis in DSDBs with Partitioning Fragmentation

    Spatial Partitioning Fragmentation (SPF) is a popular method to partition data in Distributed Spatial DataBases (DSDBs). The issue of cross-border queries is an inherent problem however with distributed spatial data queries based on partitioning fragmentation given a continuity and strong correlation of geospatial data. In the case of partitioning fragmentation,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2012

    Some Observations to Speed the Polynomial Selection in the Number Field Sieve

    If the yield of a polynomial pair is closely correlated with the coefficients of the polynomial pair, users can select polynomials by checking the coefficients first. This can speed the selection of good polynomials. In this paper, the authors aim to study the correlation between the polynomial coefficients and the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2012

    Joint Power Control and Scheduling for Minimizing Broadcast Delay in Wireless Mesh Networks

    In this paper, the authors address the problem of joint power control and scheduling for minimizing broadcast delay in wireless mesh networks. Given a set of mesh routers and a routing tree rooted from the gateway node, their task is to assign power for each relay node and compute an...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Oct 2012

    Research on the Association Rules of Marketing Resources' Demand and Supply in Grid Environment

    In this paper, the authors introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment, finally lists several association rules of marketing resources demand and supply. It provides a reference for enterprises to...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2012

    Managing Social Security Data in the Web 2.0 Era

    Social security data management is an important topic both in application of information management and in social security management. In the Web 2.0 era, more and more human information and healthcare information is released to the Internet through various approaches. This abundance makes managing social security data go beyond managing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2012

    Business Process Re-engineering in the SMEs: Critical Success Factors Perspective of an Emerging Economy

    Developed information technologies and new production technologies make the business environment complex also. Because of these phenomena, the market domination has been shifted from the producer to the customers. Keeping customer happy is the best defense against competition. During the age of globalization, change has become a general phenomenon of...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // May 2012

    Differential Power Analysis on ZUC Algorithm

    Stream cipher ZUC plays a crucial role in the next generation of mobile communication as it has already been included by the 3GPP LTE-Advanced, which is a candidate standard for the 4G network. Through a long-time evaluation program, ZUC algorithm is thought to be robust enough to resist many existing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2012

    Research and Analysis on Cognitive Radio Network Security

    Spectrum is a one of scarce resources in the present spectrum management framework. With the rapid development of wireless communication technology, it appears increasingly prominent how to use the spectrum resources effectively. This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Mar 2012

    Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy

    In this paper, the authors propose a quantitative risk assessment for security systems which have multiple protected assets and a risk-based benefit-cost analysis for decision makers. The proposed methodology consists of five phases: identification of assets, security unit and intrusion path, security unit effectiveness estimation, intrusion path effectiveness estimation, security...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2012

    An Approach to Design and Optimization of WLAN Patch Antennas for Wi-Fi Applications

    Micro strip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. In this paper, an attempt has been made to investigate new micro strip antenna structure for Wi-fi systems. The aim of this work is...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2011

    Trustworthy Assurance of Service Interoperation in Cloud Environment

    Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining Quality...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jun 2011

    An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding

    Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not applied well to P2P systems. More efficient scheme based on attacker identification...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2011

    GPRN: A Hierarchical Framework for Aspect-Oriented Requirement Modeling

    One of the most important characteristics in aspect-oriented requirement modeling is effectively dealing with crosscutting concerns. This paper presents a hierarchical GPRN framework for aspect-oriented requirement modeling. The framework breaks requirements into three layers including goal layer, process layer and requirement net layer. Goal layer defines crosscutting concerns from goals,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    Capacity Analysis of OFDM/FBMC Based Cognitive Radio Networks With Estimated CSI

    In this paper, the authors focus on the channel capacity analysis of a Cognitive Radio (CR) network using two types of multicarrier communications: conventional Orthogonal Frequency Division Multiplexing (OFDM) with Cyclic Prefix (CP) and Filter Bank based Multi-Carrier (FBMC) modulations. They use a resource allocation algorithm in which subcarrier assignment...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    TGP: Mining Top-K Frequent Closed Graph Pattern without Minimum Support

    In this paper, the authors propose a new mining task: mining top-k frequent closed graph patterns without minimum support. Most previous frequent graph pattern mining works require the specification of a minimum support threshold to perform the mining. However it is difficult for users to set a suitable value sometimes....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    Generalization Step Analysis for Privacy Preserving Data Publishing

    Data publishing generate much attention over the protection of individual privacy. In this paper, the authors show that it is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2010

    Mimir: Term-Distributed Indexing and Search for Secret Documents

    In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, without leaking information about the remaining documents, without imposing large load on the receptionist, and with a balanced load...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2010

    Cloud Computing System Based on Trusted Computing Platform

    Cloud computing provides people a way to share large amount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, the authors analyze...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2010

    ebXML-Based Electronic Business Interoperability Framework and Test Platform

    Electronic Business (e-Business) system is a typical heterogeneous information system, which is concerned with various data types, communication protocols, business processes, and exchanged business contents between these systems. The interoperability assurance between e-Business systems is a key issue for the implementation and application of a seamless e-Business environment around the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2009

    Adaptive Calibration for Fusion-Based Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are typically composed of low-cost sensors that are deeply integrated with physical environments. As a result, the sensing performance of a WSN is inevitably undermined by various physical uncertainties, which include stochastic sensor noises, unpredictable environment changes and dynamics of the monitored phenomenon. Traditional solutions (e.g.,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2009

    Competitive Intelligence Monitoring in the Risk Prevention of SMEs

    Competitive Intelligence plays an increasingly important role in the risk prevention of SMEs, however, there is an obvious phenomenon - the absence of competitive intelligence in the field of Chinese SMEs. In this paper, the author firstly pointed out how many kinds of risks the SMEs were facing, and then...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2009

    Publicly Verifiable Privacy-Preserving Group Decryption

    Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender's side. There are merely few works done to ensure anonymity in a cryptographic sense on the recipient's side in group-oriented communications....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2012

    Some Observations to Speed the Polynomial Selection in the Number Field Sieve

    If the yield of a polynomial pair is closely correlated with the coefficients of the polynomial pair, users can select polynomials by checking the coefficients first. This can speed the selection of good polynomials. In this paper, the authors aim to study the correlation between the polynomial coefficients and the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2012

    An Approach to Design and Optimization of WLAN Patch Antennas for Wi-Fi Applications

    Micro strip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. In this paper, an attempt has been made to investigate new micro strip antenna structure for Wi-fi systems. The aim of this work is...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // May 2012

    Differential Power Analysis on ZUC Algorithm

    Stream cipher ZUC plays a crucial role in the next generation of mobile communication as it has already been included by the 3GPP LTE-Advanced, which is a candidate standard for the 4G network. Through a long-time evaluation program, ZUC algorithm is thought to be robust enough to resist many existing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    An Optimization Technique for Spatial Compound Joins Based on a Topological Relationship Query and Buffering Analysis in DSDBs with Partitioning Fragmentation

    Spatial Partitioning Fragmentation (SPF) is a popular method to partition data in Distributed Spatial DataBases (DSDBs). The issue of cross-border queries is an inherent problem however with distributed spatial data queries based on partitioning fragmentation given a continuity and strong correlation of geospatial data. In the case of partitioning fragmentation,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2012

    Joint Power Control and Scheduling for Minimizing Broadcast Delay in Wireless Mesh Networks

    In this paper, the authors address the problem of joint power control and scheduling for minimizing broadcast delay in wireless mesh networks. Given a set of mesh routers and a routing tree rooted from the gateway node, their task is to assign power for each relay node and compute an...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2013

    Handoff Management Enhancement Using Soft Computing Techniques

    In 4G cellular system, due to the mobility, proper handoff or handover management is critical to ensure seamless migration from one cell to another cell. Besides of maintaining the connection quality during a handover process, any advanced handover algorithms which can minimize required resources for the connection are critical. When...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2013

    Formal Analysis of Information Card Federated Identity-Management Protocol

    Information Card (InfoCard) is a user-centric identity management meta-system. It has been accepted as a standard of OASIS Identity Meta-system Interoperability Technical Committee. However, there is currently a lack of security analysis to InfoCard protocol, especially, with formal methods. In this paper, the authors accommodate such a requirement by analyzing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Mar 2013

    Taxation-based Neighbor Selection for Layered Peer-to-Peer Streaming

    Peer-To-Peer (P2P) streaming is being considered as the most promising approach to deliver real-time video to large scale users over the Internet. Neighbor selection is one of the key components to construct overlay topology for P2P streaming systems. Currently the majority of QoS aware neighbor selection approaches assume that the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jun 2011

    An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding

    Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not applied well to P2P systems. More efficient scheme based on attacker identification...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2011

    GPRN: A Hierarchical Framework for Aspect-Oriented Requirement Modeling

    One of the most important characteristics in aspect-oriented requirement modeling is effectively dealing with crosscutting concerns. This paper presents a hierarchical GPRN framework for aspect-oriented requirement modeling. The framework breaks requirements into three layers including goal layer, process layer and requirement net layer. Goal layer defines crosscutting concerns from goals,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    Generalization Step Analysis for Privacy Preserving Data Publishing

    Data publishing generate much attention over the protection of individual privacy. In this paper, the authors show that it is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    Capacity Analysis of OFDM/FBMC Based Cognitive Radio Networks With Estimated CSI

    In this paper, the authors focus on the channel capacity analysis of a Cognitive Radio (CR) network using two types of multicarrier communications: conventional Orthogonal Frequency Division Multiplexing (OFDM) with Cyclic Prefix (CP) and Filter Bank based Multi-Carrier (FBMC) modulations. They use a resource allocation algorithm in which subcarrier assignment...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2009

    Adaptive Calibration for Fusion-Based Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are typically composed of low-cost sensors that are deeply integrated with physical environments. As a result, the sensing performance of a WSN is inevitably undermined by various physical uncertainties, which include stochastic sensor noises, unpredictable environment changes and dynamics of the monitored phenomenon. Traditional solutions (e.g.,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    An Optimized Memory Integrity Verification Mechanism Based on Advanced Hot Window Hash Tree

    Memory integrity verification is generally used to protect against corruption or unauthorized modification to information and provide a tamper-proof environment. The memory integrity verification efficiency is generally considered as one of the most important factors in practical application. The authors present a high-performance scheme to realize memory integrity verification. Firstly,...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2013

    Protection Intensity Evaluation for a Security System Based on Entropy Theory

    The protection effectiveness is an important metric to judge whether a security system is good or not. In this paper, a security system deployed in a guard field is regarded abstractly as a security network. A quantitative protection effectiveness evaluation method based on entropy theory is introduced. The authors propose...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jan 2013

    Two-Dimension Chaotic-Multivariate Signature System

    A novel hybrid cryptosystem which is resistant to quantum algorithm is developed. The system is combined with multivariate cryptosystem and chaotic system, two systems which are both secure under quantum attacks. The plaintexts are displaced by an affine transformation and encrypted by central map in multivariable cryptosystem. And then, the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2010

    ebXML-Based Electronic Business Interoperability Framework and Test Platform

    Electronic Business (e-Business) system is a typical heterogeneous information system, which is concerned with various data types, communication protocols, business processes, and exchanged business contents between these systems. The interoperability assurance between e-Business systems is a key issue for the implementation and application of a seamless e-Business environment around the...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2009

    Competitive Intelligence Monitoring in the Risk Prevention of SMEs

    Competitive Intelligence plays an increasingly important role in the risk prevention of SMEs, however, there is an obvious phenomenon - the absence of competitive intelligence in the field of Chinese SMEs. In this paper, the author firstly pointed out how many kinds of risks the SMEs were facing, and then...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Dec 2012

    A Dynamic Statistical Model for Geospatial Data Access Laws Based on Cloud Computing

    The strategy of storage and organization can be adjusted utilizing the access and distribution law of the spatial data, which will significantly improve system performance of spatial data services. The access and distribution law of the spatial data based on Hotmap and Zipf-like are statics, and can not reflect its...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Oct 2013

    Polynomial Selection for Number Field Sieve in Geometric View

    Polynomial selection is the first important step in number field sieve. A good polynomial not only can produce more relations in the sieving step, but also can reduce the matrix size. In this paper, the authors propose to use geometric view in the polynomial selection. In geometric view, the coefficients'...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2011

    Trustworthy Assurance of Service Interoperation in Cloud Environment

    Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining Quality...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2010

    TGP: Mining Top-K Frequent Closed Graph Pattern without Minimum Support

    In this paper, the authors propose a new mining task: mining top-k frequent closed graph patterns without minimum support. Most previous frequent graph pattern mining works require the specification of a minimum support threshold to perform the mining. However it is difficult for users to set a suitable value sometimes....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Aug 2010

    Mimir: Term-Distributed Indexing and Search for Secret Documents

    In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, without leaking information about the remaining documents, without imposing large load on the receptionist, and with a balanced load...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // May 2013

    The State-of-the-Art in Web-Scale Semantic Information Processing for Cloud Computing

    Based on integrated infrastructure of resource sharing and computing in distributed environment, cloud computing involves the provision of dynamically scalable and provides virtualized resources as services over the Internet. These applications also bring a large scale heterogeneous and distributed information which poses a great challenge in terms of the semantic...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jun 2013

    A CCRA based Mass Customization Development for Cloud Services

    With the incredible popularity of cloud computing, the adoption of Mass Customization (MC) is significant for building a cloud computing system that could provide services provisioning in a manner of multi-tenancy. Because of lack of a standard architecture that supports MC development for cloud services, the existing metadata or model...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2009

    Publicly Verifiable Privacy-Preserving Group Decryption

    Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender's side. There are merely few works done to ensure anonymity in a cryptographic sense on the recipient's side in group-oriented communications....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2013

    An Efficient Certificateless Designated Verifier Signature Scheme

    To solve the key escrow problem in identity-based cryptosystem, Al-Riyami et al. introduced the CertificateLess Public Key Cryptography (CL-PKC). As an important cryptographic primitive, CertificateLess Designated Verifier Signature (CLDVS) scheme was studied widely. Following Al-Riyami et al. work, many certificateless Designated Verifier Signature (DVS) schemes using bilinear pairings have been...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Nov 2013

    Deep Attacks of a Certificateless Signature Scheme

    Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in identity-based cryptography. Recently, the researcher proposed a certificateless signature scheme and proved that their scheme is existentially unforgeable against adaptive chosen message...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Feb 2013

    Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

    Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their significance in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2012

    Managing Social Security Data in the Web 2.0 Era

    Social security data management is an important topic both in application of information management and in social security management. In the Web 2.0 era, more and more human information and healthcare information is released to the Internet through various approaches. This abundance makes managing social security data go beyond managing...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2012

    Research and Analysis on Cognitive Radio Network Security

    Spectrum is a one of scarce resources in the present spectrum management framework. With the rapid development of wireless communication technology, it appears increasingly prominent how to use the spectrum resources effectively. This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Sep 2013

    Protection Model of Security Systems Based on Neyman-Person Criterion

    In this paper, security systems deployed over an area are regarded abstractly as a diagram of security network. They propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network....

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2010

    Cloud Computing System Based on Trusted Computing Platform

    Cloud computing provides people a way to share large amount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, the authors analyze...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Apr 2014

    Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems

    With the increasing popularity of cloud-based data services, data owners are highly motivated to store their huge amount of (potentially sensitive) personal data files on remote servers in encrypted form. Clients later can query over the encrypted database to retrieve files of interest while preventing database servers from learning private...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Jul 2012

    Business Process Re-engineering in the SMEs: Critical Success Factors Perspective of an Emerging Economy

    Developed information technologies and new production technologies make the business environment complex also. Because of these phenomena, the market domination has been shifted from the producer to the customers. Keeping customer happy is the best defense against competition. During the age of globalization, change has become a general phenomenon of...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Oct 2012

    Research on the Association Rules of Marketing Resources' Demand and Supply in Grid Environment

    In this paper, the authors introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment, finally lists several association rules of marketing resources demand and supply. It provides a reference for enterprises to...

    Provided By Wuhan Institute of Technology Network and Information Center

  • White Papers // Mar 2012

    Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy

    In this paper, the authors propose a quantitative risk assessment for security systems which have multiple protected assets and a risk-based benefit-cost analysis for decision makers. The proposed methodology consists of five phases: identification of assets, security unit and intrusion path, security unit effectiveness estimation, intrusion path effectiveness estimation, security...

    Provided By Wuhan Institute of Technology Network and Information Center