Wuhan University

Displaying 1-40 of 43 results

  • White Papers // Jun 2012

    Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

    Recently, Chien et al. proposed a Gateway-oriented Password-based Authenticated Key Exchange (GPAKE) protocol, through which a client and a gateway could generate a session key for future communication with the help of an authentication server. The authors also described that their scheme is provably secure in a formal model. However,...

    Provided By Wuhan University

  • White Papers // Mar 2012

    The Transmission Multicast and the Control of QoS for IPv 6 Using the Infrastructure MPLS

    Recently there has been several literatures about congestion control in an Unicast/Multicast environment and also some authors tried to be exhaustive as they discussed about managing Quality of Service (QoS) under DiffServ and IntServ. Although Multi-Protocol label Switching (MPLS)Traffic and routing control, and as well as IPv6 control QoS were...

    Provided By Wuhan University

  • White Papers // Jan 2012

    FM Stereo Receiver Based on Software-Defined Radio

    The paper proposes the FM stereo receiver based on Software-defined Radio by FPGA devices, according to the theories of multi-rate digital signal processing and switching means FM stereo decoding. Through the extraction and half-band filter to achieve down-sampling, the digital phase-locked loop extracted pilot signals and achieve the stereo decoding...

    Provided By Wuhan University

  • White Papers // Jan 2012

    An Approach to Extract SMV Model From C Programs

    This paper proposes an approach to extract control flow and data information from C programs and then translate them into SMV (Symbolic Model Verifier) model. First the C source programs are translated to AST (Abstract Syntax Tree); Then CFG (Control Flow Graph) is extracted from the AST; At last, the...

    Provided By Wuhan University

  • White Papers // Nov 2011

    Study on QoS Based Distributed Bandwidth Allocation in Information Convergence Network

    By utilizing the Pseudo Wire (PW) and Tunnel structure in PTN (Packet Transport Network) architecture, distributed bandwidth resource allocation scheme is investigated in order to support different levels of Quality of Service (QoS) in information convergence network. The network bandwidth provider and users are formulated in a Stackelberg Game model....

    Provided By Wuhan University

  • White Papers // Oct 2011

    A Panoramic Video Distributed System Used in LAN

    In real-time monitoring process, resolution must be set against field vision. There are two problems in the real-time monitoring procedures, such as: the field vision is too small to capture the target completely, a larger field vision with low resolution, especially in the distributed computing environment. In order to solve...

    Provided By Wuhan University

  • White Papers // Oct 2011

    The Security Assessment Method of Wireless Sensor Network With Interval Grey Linguistic Variables

    In this paper, the authors investigate the Multiple Attribute Decision Making (MADM) problems for evaluating the security of Wireless Sensor Network (WSN) with interval grey linguistic variables. They utilize the Interval Grey Linguistic Weighted Geometric (IGLWG) operator to aggregate the interval grey linguistic variables corresponding to each alternative and get...

    Provided By Wuhan University

  • White Papers // Jun 2011

    Weaknesses in an ECC-Based AKA Protocol for Wireless Mobile Communications

    With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing authenticated key agreement protocols are not suitable for wireless mobile communication. Quite recently,...

    Provided By Wuhan University

  • White Papers // Jun 2011

    Cryptanalysis of a Key Agreement Protocol Based on Chaotic Hash

    With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.'s [X. Guo, J. Zhang, Secure group key agreement protocol based on chaotic Hash, Information Sciences 180 (2010) 4069 - 4074] proposed a secure key agreement protocol...

    Provided By Wuhan University

  • White Papers // May 2011

    An Efficient Certificateless Authenticated Key Agreement Protocol Without Bilinear Pairings

    Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Many certificateless authenticated key agreement protocols using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than...

    Provided By Wuhan University

  • White Papers // Apr 2011

    An efficient certificateless short signature scheme from pairings

    To avoid the inherent key escrow problem in ID-based public key cryptosystem, Al-Riyami and Paterson introduced a new approach called certificateless public key cryptography. Recently, several short certificateless signature schemes are presented to improve the performance. In this paper, the authors propose an efficient short certificateless signature scheme which is...

    Provided By Wuhan University

  • White Papers // Mar 2011

    A Multichannel Edge-Weighted Centroidal Voronoi Tessellation Algorithm for 3D Super-Alloy Image Segmentation

    In material science and engineering, the grain structure inside a super-alloy sample determines its mechanical and physical properties. In this paper, the authors develop a new MultiChannel Edge-Weighted Centroidal Voronoi Tessellation (MCEWCVT) algorithm to automatically segment all the 3D grains from microscopic images of a super-alloy sample. Built upon the...

    Provided By Wuhan University

  • White Papers // Mar 2011

    An Efficient Certificateless Two-Party Authenticated Key Agreement Scheme From Pairings

    Key Agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated Key Agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a Public-Key Infrastructure (PKI) or identity-based cryptography. However, the former suffers from...

    Provided By Wuhan University

  • White Papers // Mar 2011

    Security Analysis of Information Card Federated Identity-Management Protocol

    Information Card (InfoCard), as an OASIS standard, is a federated identity management metasystem based on visual cards. Users can collect information cards issued by various identity providers, such as web portals, governments, or companies, and use these cards to log on various relying parties. InfoCard protocol is as the foundation...

    Provided By Wuhan University

  • White Papers // Mar 2011

    The Research of Unconditionally Secure Authentication Code for Multi-Source Network Coding

    In a network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe polluted. In this paper, the authors proposed...

    Provided By Wuhan University

  • White Papers // Feb 2011

    Efficient and Provably-Secure Certificateless Signature Scheme Without Bilinear Pairings

    Many certificateless signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to improve the performance the authors propose a certificateless signature scheme without bilinear pairings. With...

    Provided By Wuhan University

  • White Papers // Feb 2011

    Identity-Based Digital Signature Scheme Without Bilinear Pairings

    Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, the authors propose...

    Provided By Wuhan University

  • White Papers // Feb 2011

    DPA Leakage Evaluation and Countermeasure Plug-in

    There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could...

    Provided By Wuhan University

  • White Papers // Jan 2011

    Comments of an Efficient and Secure Multiserver Authentication Scheme With Key Agreement

    Recently, Tsaur et al. proposed an authentication scheme for multi-server environments and claimed their scheme could withstand various attacks. In this paper, the authors will point out that Tsaur et al. scheme is not suitable for multi-server environments since the user has to register for every server. Furthermore, they will...

    Provided By Wuhan University

  • White Papers // Nov 2010

    Weakness of Two ID-Based Remote Mutual Authentication With Key Agreement Protocols for Mobile Devices

    With the rapid development of electronic technology, various mobile devices (e.g., Cell phone, PDA, and notebook PC) are produced and people's life is made more convenient. More and more electronic transactions for mobile devices are implemented on Internet or wireless networks. In electronic transactions, remote user authentication in insecure channel...

    Provided By Wuhan University

  • White Papers // Oct 2010

    Geoprocessing in the Microsoft Cloud Computing Platform - Azure

    Geoprocessing functions are important for discovering hidden and useful geospatial information, and are widely used in Earth science modeling and applications. The growth of the Web has resulted in the Web-based sharing of large volumes of distributed geospatial data and computational resources. Processing heterogeneous and distributed data into information requires...

    Provided By Wuhan University

  • White Papers // Oct 2010

    Evolution Cipher Against Differential Power Attack

    Differential Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. The authors propose a novel methodology to implement a secure DPA resistant...

    Provided By Wuhan University

  • White Papers // Aug 2010

    A Practical Model for Displaying Vector Data on Mobile GIS

    In this paper, a practical model is proposed to improve displaying speed and effect of vector data on Mobile GIS. The model is constructed by making some improvements on traditional pyramid model, and a data file format is specially designed for it. Moreover, the vector data preprocessing methods of this...

    Provided By Wuhan University

  • White Papers // Aug 2010

    Technology and Challenges of M-Commerce

    Mobile commerce or m-commerce is defined as any direct or indirect transaction with a potential monetary value conducted via wireless telecommunication networks. Using mobile services, users can send/receive emails, download music/graphics/animations, shop for goods and services, play interactive online games, trade stocks, book tickets, find friends, conduct financial and banking...

    Provided By Wuhan University

  • White Papers // Aug 2010

    Study Urban Extension Spatial Differentiation Based on Multi-Temporal Satellite Remote Sensing Images

    Taking Yiwu city for example, dividing the urban region into 4 spatial units that is northeast, northwest, southeast and southwest. Using multi-temporal satellite remote sensing Images and geography information system, the space clustering and historical shape for the city land use expanding from 1970 to 2004 were studied in this...

    Provided By Wuhan University

  • White Papers // Jul 2010

    Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization

    Parameter (or variable) of automotive embedded networked control system is named as signal. In order to improve system performance and provide more remaining bandwidth for system extension, it is necessary to minimize the bandwidth consumption of frames transmitting the datum of signals. In this paper, the signal framing problem and...

    Provided By Wuhan University

  • White Papers // Jun 2010

    A QoS Multicast Routing in Wireless Mesh Networks

    Wireless Mesh Network (WMN) has recently emerged as a promising technology for next-generation wireless network. In WMNs, many important applications, such as audio/video conferencing, require the support of multi-cast communication with Quality-of-Service (QoS) guarantee. In this paper, the authors investigate the issues of QoS multi-cast routing in wireless mesh networks....

    Provided By Wuhan University

  • White Papers // May 2010

    Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme

    The security of a password authentication scheme using smart cards proposed by Khan et al. is analyzed. Four kinds of attacks are presented in different scenarios. The analyses show that the scheme is insecure for practical application. User authentication is the essential security mechanism for remote login systems in which...

    Provided By Wuhan University

  • White Papers // May 2010

    On Security of a Remote User Authentication Scheme Without Using Smart Cards

    The security of a password authentication scheme using smart cards proposed by Rhee et al. is analyzed. A kind of impersonation attack is presented. The analyses show that the scheme is insecure for practical application. In order to eliminate the security vulnerability, an efficient countermeasure is proposed. User authentication is...

    Provided By Wuhan University

  • White Papers // May 2010

    Hash-Based Multivariate Public Key Cryptosystems

    Many efficient attacks have appeared in recent years, which have led to serious blow for the traditional multivariate public key cryptosystems. For example, the signature scheme SFLASH was broken by Dubois et al. at CRYPTO'07, and the Square signature (or encryption) scheme by Billet et al. at ASIACRYPTO'09. Most multivariate...

    Provided By Wuhan University

  • White Papers // May 2010

    Cryptanalysis of an Exquisite Mutual Authentication Scheme With Key Agreement Using Smart Card

    The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card, Informatica, Vol. 33, No. 2, 2009, 125-132.] is analyzed. Five kinds...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Particle Filtering and Its Application for Multipath Mitigation With GNSS Receivers

    This paper investigates the application of multipath mitigation algorithms in the context of Global Navigation Satellite Systems receivers. The authors resort to particle filtering to track the evolving parameters of either the line-of-sight signal and its multipath replicas. The considered architecture consists of a multicorrelation scheme, focused on the tracking...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Identity-Based Authenticated Asymmetric Group Key Agreement Protocol

    In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Cryptanalysis of a DoS-Resistant ID-Based Password Authentication Scheme Using Smart Cards

    Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Very recently, Hwang et al. proposed a DoS-resistant ID-based password authentication scheme using smart cards. In the current work, the authors are concerned...

    Provided By Wuhan University

  • White Papers // Feb 2010

    A Multimedia Application: Spatial Perceptual Entropy of Multichannel Audio Signals

    Usually multimedia data have to be compressed before transmitting, and higher compression rate, or equivalently lower bitrate, relieves the load of communication channels but impacts negatively the quality. The authors investigate the bitrate lower bound for perceptually lossless compression of a major type of multimedia - multichannel audio signals. This...

    Provided By Wuhan University

  • White Papers // Jan 2010

    Model Of Unexpected Credit Risk Of Supply Chain Based On Catastrophe Theory

    This paper tries to apply catastrophe theory to the research of unexpected credit risk of the supply chain. Considering the occurrence characteristics of unexpected credit events and with the combination of features of the supply chain itself, it builds a model of unexpected credit risk. And it conducts simulation analysis...

    Provided By Wuhan University

  • White Papers // Jan 2010

    Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

    Recently, Abdalla et al. proposed a new Gateway-oriented Password-based Authenticated Key Exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where each client shares a human-memorable password with a trusted server so that they can resort to the server for authentication when want to establish a shared...

    Provided By Wuhan University

  • White Papers // Oct 2009

    Information & Communication Convergence for the Promotion of Electric Power Enterprise Informationization

    With the start of industrialization and informationization convergence in the country, information & communication industry is converged and transformed in faster speed, which will create favorable conditions to drive rapid growth of electric power informationization. The paper introduces the recent development of information & communication from the perspective of 3G,...

    Provided By Wuhan University

  • White Papers // Oct 2009

    Per-Node Based Optimal Power Control for Multi-Hop Cognitive Radio Networks

    Cognitive Radio Network (CRN) is a promising approach to improve spectrum efficiency for wireless networking. This paper investigates how to perform optimal power control on each node (or per-node based power control) in the network so as to optimize network performance. Per-node based power control is a difficult problem due...

    Provided By Wuhan University

  • White Papers // Sep 2009

    Fuzzy Controller Based QoS Routing Algorithm With a Multiclass Scheme for MANET

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. Due to the dynamic nature of the network topology and restricted resources, Quality of Service (QoS) and multicast routing in MANET are challenging tasks which...

    Provided By Wuhan University

  • White Papers // Mar 2011

    An Efficient Certificateless Two-Party Authenticated Key Agreement Scheme From Pairings

    Key Agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated Key Agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a Public-Key Infrastructure (PKI) or identity-based cryptography. However, the former suffers from...

    Provided By Wuhan University

  • White Papers // Feb 2011

    Identity-Based Digital Signature Scheme Without Bilinear Pairings

    Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, the authors propose...

    Provided By Wuhan University

  • White Papers // Feb 2011

    DPA Leakage Evaluation and Countermeasure Plug-in

    There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could...

    Provided By Wuhan University

  • White Papers // May 2010

    Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme

    The security of a password authentication scheme using smart cards proposed by Khan et al. is analyzed. Four kinds of attacks are presented in different scenarios. The analyses show that the scheme is insecure for practical application. User authentication is the essential security mechanism for remote login systems in which...

    Provided By Wuhan University

  • White Papers // May 2010

    On Security of a Remote User Authentication Scheme Without Using Smart Cards

    The security of a password authentication scheme using smart cards proposed by Rhee et al. is analyzed. A kind of impersonation attack is presented. The analyses show that the scheme is insecure for practical application. In order to eliminate the security vulnerability, an efficient countermeasure is proposed. User authentication is...

    Provided By Wuhan University

  • White Papers // May 2010

    Hash-Based Multivariate Public Key Cryptosystems

    Many efficient attacks have appeared in recent years, which have led to serious blow for the traditional multivariate public key cryptosystems. For example, the signature scheme SFLASH was broken by Dubois et al. at CRYPTO'07, and the Square signature (or encryption) scheme by Billet et al. at ASIACRYPTO'09. Most multivariate...

    Provided By Wuhan University

  • White Papers // May 2010

    Cryptanalysis of an Exquisite Mutual Authentication Scheme With Key Agreement Using Smart Card

    The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card, Informatica, Vol. 33, No. 2, 2009, 125-132.] is analyzed. Five kinds...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Identity-Based Authenticated Asymmetric Group Key Agreement Protocol

    In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was...

    Provided By Wuhan University

  • White Papers // Feb 2011

    Efficient and Provably-Secure Certificateless Signature Scheme Without Bilinear Pairings

    Many certificateless signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to improve the performance the authors propose a certificateless signature scheme without bilinear pairings. With...

    Provided By Wuhan University

  • White Papers // May 2011

    An Efficient Certificateless Authenticated Key Agreement Protocol Without Bilinear Pairings

    Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Many certificateless authenticated key agreement protocols using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than...

    Provided By Wuhan University

  • White Papers // Jun 2011

    Weaknesses in an ECC-Based AKA Protocol for Wireless Mobile Communications

    With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing authenticated key agreement protocols are not suitable for wireless mobile communication. Quite recently,...

    Provided By Wuhan University

  • White Papers // Jun 2011

    Cryptanalysis of a Key Agreement Protocol Based on Chaotic Hash

    With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.'s [X. Guo, J. Zhang, Secure group key agreement protocol based on chaotic Hash, Information Sciences 180 (2010) 4069 - 4074] proposed a secure key agreement protocol...

    Provided By Wuhan University

  • White Papers // Mar 2011

    A Multichannel Edge-Weighted Centroidal Voronoi Tessellation Algorithm for 3D Super-Alloy Image Segmentation

    In material science and engineering, the grain structure inside a super-alloy sample determines its mechanical and physical properties. In this paper, the authors develop a new MultiChannel Edge-Weighted Centroidal Voronoi Tessellation (MCEWCVT) algorithm to automatically segment all the 3D grains from microscopic images of a super-alloy sample. Built upon the...

    Provided By Wuhan University

  • White Papers // Jan 2009

    AC2-ADL: Architectural Description of Aspect-Oriented Systems

    The traditional Architectural Description Languages ADLs lack the ability to describe the crosscutting concerns and crosscutting interactions in the software architecture, which result in the design of the system difficulty in comprehension, evolution and reuse. This paper proposes a new Aspect-Oriented ADL - AC2-ADL to provide a formal basis for...

    Provided By Wuhan University

  • White Papers // Mar 2011

    The Research of Unconditionally Secure Authentication Code for Multi-Source Network Coding

    In a network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe polluted. In this paper, the authors proposed...

    Provided By Wuhan University

  • White Papers // Jan 2010

    Model Of Unexpected Credit Risk Of Supply Chain Based On Catastrophe Theory

    This paper tries to apply catastrophe theory to the research of unexpected credit risk of the supply chain. Considering the occurrence characteristics of unexpected credit events and with the combination of features of the supply chain itself, it builds a model of unexpected credit risk. And it conducts simulation analysis...

    Provided By Wuhan University

  • White Papers // Aug 2010

    Study Urban Extension Spatial Differentiation Based on Multi-Temporal Satellite Remote Sensing Images

    Taking Yiwu city for example, dividing the urban region into 4 spatial units that is northeast, northwest, southeast and southwest. Using multi-temporal satellite remote sensing Images and geography information system, the space clustering and historical shape for the city land use expanding from 1970 to 2004 were studied in this...

    Provided By Wuhan University

  • White Papers // Aug 2010

    A Practical Model for Displaying Vector Data on Mobile GIS

    In this paper, a practical model is proposed to improve displaying speed and effect of vector data on Mobile GIS. The model is constructed by making some improvements on traditional pyramid model, and a data file format is specially designed for it. Moreover, the vector data preprocessing methods of this...

    Provided By Wuhan University

  • White Papers // Aug 2010

    Technology and Challenges of M-Commerce

    Mobile commerce or m-commerce is defined as any direct or indirect transaction with a potential monetary value conducted via wireless telecommunication networks. Using mobile services, users can send/receive emails, download music/graphics/animations, shop for goods and services, play interactive online games, trade stocks, book tickets, find friends, conduct financial and banking...

    Provided By Wuhan University

  • White Papers // Sep 2009

    Fuzzy Controller Based QoS Routing Algorithm With a Multiclass Scheme for MANET

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. Due to the dynamic nature of the network topology and restricted resources, Quality of Service (QoS) and multicast routing in MANET are challenging tasks which...

    Provided By Wuhan University

  • White Papers // Feb 2010

    A Multimedia Application: Spatial Perceptual Entropy of Multichannel Audio Signals

    Usually multimedia data have to be compressed before transmitting, and higher compression rate, or equivalently lower bitrate, relieves the load of communication channels but impacts negatively the quality. The authors investigate the bitrate lower bound for perceptually lossless compression of a major type of multimedia - multichannel audio signals. This...

    Provided By Wuhan University

  • White Papers // Jun 2010

    A QoS Multicast Routing in Wireless Mesh Networks

    Wireless Mesh Network (WMN) has recently emerged as a promising technology for next-generation wireless network. In WMNs, many important applications, such as audio/video conferencing, require the support of multi-cast communication with Quality-of-Service (QoS) guarantee. In this paper, the authors investigate the issues of QoS multi-cast routing in wireless mesh networks....

    Provided By Wuhan University

  • White Papers // Jan 2012

    FM Stereo Receiver Based on Software-Defined Radio

    The paper proposes the FM stereo receiver based on Software-defined Radio by FPGA devices, according to the theories of multi-rate digital signal processing and switching means FM stereo decoding. Through the extraction and half-band filter to achieve down-sampling, the digital phase-locked loop extracted pilot signals and achieve the stereo decoding...

    Provided By Wuhan University

  • White Papers // Jan 2012

    An Approach to Extract SMV Model From C Programs

    This paper proposes an approach to extract control flow and data information from C programs and then translate them into SMV (Symbolic Model Verifier) model. First the C source programs are translated to AST (Abstract Syntax Tree); Then CFG (Control Flow Graph) is extracted from the AST; At last, the...

    Provided By Wuhan University

  • White Papers // Nov 2011

    Study on QoS Based Distributed Bandwidth Allocation in Information Convergence Network

    By utilizing the Pseudo Wire (PW) and Tunnel structure in PTN (Packet Transport Network) architecture, distributed bandwidth resource allocation scheme is investigated in order to support different levels of Quality of Service (QoS) in information convergence network. The network bandwidth provider and users are formulated in a Stackelberg Game model....

    Provided By Wuhan University

  • White Papers // Oct 2011

    A Panoramic Video Distributed System Used in LAN

    In real-time monitoring process, resolution must be set against field vision. There are two problems in the real-time monitoring procedures, such as: the field vision is too small to capture the target completely, a larger field vision with low resolution, especially in the distributed computing environment. In order to solve...

    Provided By Wuhan University

  • White Papers // Oct 2011

    The Security Assessment Method of Wireless Sensor Network With Interval Grey Linguistic Variables

    In this paper, the authors investigate the Multiple Attribute Decision Making (MADM) problems for evaluating the security of Wireless Sensor Network (WSN) with interval grey linguistic variables. They utilize the Interval Grey Linguistic Weighted Geometric (IGLWG) operator to aggregate the interval grey linguistic variables corresponding to each alternative and get...

    Provided By Wuhan University

  • White Papers // Oct 2010

    Evolution Cipher Against Differential Power Attack

    Differential Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. The authors propose a novel methodology to implement a secure DPA resistant...

    Provided By Wuhan University

  • White Papers // Jul 2010

    Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization

    Parameter (or variable) of automotive embedded networked control system is named as signal. In order to improve system performance and provide more remaining bandwidth for system extension, it is necessary to minimize the bandwidth consumption of frames transmitting the datum of signals. In this paper, the signal framing problem and...

    Provided By Wuhan University

  • White Papers // Jan 2011

    Comments of an Efficient and Secure Multiserver Authentication Scheme With Key Agreement

    Recently, Tsaur et al. proposed an authentication scheme for multi-server environments and claimed their scheme could withstand various attacks. In this paper, the authors will point out that Tsaur et al. scheme is not suitable for multi-server environments since the user has to register for every server. Furthermore, they will...

    Provided By Wuhan University

  • White Papers // Oct 2010

    Geoprocessing in the Microsoft Cloud Computing Platform - Azure

    Geoprocessing functions are important for discovering hidden and useful geospatial information, and are widely used in Earth science modeling and applications. The growth of the Web has resulted in the Web-based sharing of large volumes of distributed geospatial data and computational resources. Processing heterogeneous and distributed data into information requires...

    Provided By Wuhan University

  • White Papers // Oct 2009

    Information & Communication Convergence for the Promotion of Electric Power Enterprise Informationization

    With the start of industrialization and informationization convergence in the country, information & communication industry is converged and transformed in faster speed, which will create favorable conditions to drive rapid growth of electric power informationization. The paper introduces the recent development of information & communication from the perspective of 3G,...

    Provided By Wuhan University

  • White Papers // Oct 2009

    Per-Node Based Optimal Power Control for Multi-Hop Cognitive Radio Networks

    Cognitive Radio Network (CRN) is a promising approach to improve spectrum efficiency for wireless networking. This paper investigates how to perform optimal power control on each node (or per-node based power control) in the network so as to optimize network performance. Per-node based power control is a difficult problem due...

    Provided By Wuhan University

  • White Papers // Nov 2010

    Weakness of Two ID-Based Remote Mutual Authentication With Key Agreement Protocols for Mobile Devices

    With the rapid development of electronic technology, various mobile devices (e.g., Cell phone, PDA, and notebook PC) are produced and people's life is made more convenient. More and more electronic transactions for mobile devices are implemented on Internet or wireless networks. In electronic transactions, remote user authentication in insecure channel...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Cryptanalysis of a DoS-Resistant ID-Based Password Authentication Scheme Using Smart Cards

    Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Very recently, Hwang et al. proposed a DoS-resistant ID-based password authentication scheme using smart cards. In the current work, the authors are concerned...

    Provided By Wuhan University

  • White Papers // Mar 2011

    Security Analysis of Information Card Federated Identity-Management Protocol

    Information Card (InfoCard), as an OASIS standard, is a federated identity management metasystem based on visual cards. Users can collect information cards issued by various identity providers, such as web portals, governments, or companies, and use these cards to log on various relying parties. InfoCard protocol is as the foundation...

    Provided By Wuhan University

  • White Papers // Jan 2010

    Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

    Recently, Abdalla et al. proposed a new Gateway-oriented Password-based Authenticated Key Exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where each client shares a human-memorable password with a trusted server so that they can resort to the server for authentication when want to establish a shared...

    Provided By Wuhan University

  • White Papers // Apr 2011

    An efficient certificateless short signature scheme from pairings

    To avoid the inherent key escrow problem in ID-based public key cryptosystem, Al-Riyami and Paterson introduced a new approach called certificateless public key cryptography. Recently, several short certificateless signature schemes are presented to improve the performance. In this paper, the authors propose an efficient short certificateless signature scheme which is...

    Provided By Wuhan University

  • White Papers // Mar 2012

    The Transmission Multicast and the Control of QoS for IPv 6 Using the Infrastructure MPLS

    Recently there has been several literatures about congestion control in an Unicast/Multicast environment and also some authors tried to be exhaustive as they discussed about managing Quality of Service (QoS) under DiffServ and IntServ. Although Multi-Protocol label Switching (MPLS)Traffic and routing control, and as well as IPv6 control QoS were...

    Provided By Wuhan University

  • White Papers // Apr 2010

    Particle Filtering and Its Application for Multipath Mitigation With GNSS Receivers

    This paper investigates the application of multipath mitigation algorithms in the context of Global Navigation Satellite Systems receivers. The authors resort to particle filtering to track the evolving parameters of either the line-of-sight signal and its multipath replicas. The considered architecture consists of a multicorrelation scheme, focused on the tracking...

    Provided By Wuhan University