Xian Jiaotong University

Displaying 1-4 of 4 results

  • White Papers // Sep 2011

    Auditory Cryptography (k, n) Threshold Watermarking Algorithm

    In this paper, auditory cryptography (k, n) threshold watermarking algorithm is proposed. By binary halftone pretreatment, one-dimensional meaningful audio watermarking is pretreated to high-fidelity binary audio. The binary audio is encrypted to n cryptographic audios and embedded in scrambled host audio signal hierarchically. Less than k of the cryptographic audios...

    Provided By Xian Jiaotong University

  • White Papers // Jan 2011

    Queuing Schedule for Location Based on Wireless Ad-hoc Networks With D-Cover Algorithm

    A rudimentary problem in wireless sensor networks is localization - the determination of the geographical locations of sensors. Most existing localization algorithms were designed to work well either in networks of static sensors or networks in which all sensors are mobile. The authors think over the problem of estimating the...

    Provided By Xian Jiaotong University

  • White Papers // Nov 2010

    Provable Password-Authenticated Key Exchange Protocol Against Imposter Attack on Ad Hoc Networks

    In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the Public Key Infrastructure (PKI). In this paper, the authors first discover that there exist some weaknesses in EKE protocol...

    Provided By Xian Jiaotong University

  • White Papers // May 2010

    A Spectrally Efficient Distributed Coded Cooperation Based on Opportunistic Relaying

    This paper presents a spectrally efficient distributed coded cooperation based on opportunistic relaying for multi-relay. The proposed scheme chooses the best relay to participate in the cooperation depending on the instantaneous channel information. The authors adopt distributed Rate-compatible punctured convolutional code. The relay operates on DF mode. After the single...

    Provided By Xian Jiaotong University

  • White Papers // May 2010

    A Spectrally Efficient Distributed Coded Cooperation Based on Opportunistic Relaying

    This paper presents a spectrally efficient distributed coded cooperation based on opportunistic relaying for multi-relay. The proposed scheme chooses the best relay to participate in the cooperation depending on the instantaneous channel information. The authors adopt distributed Rate-compatible punctured convolutional code. The relay operates on DF mode. After the single...

    Provided By Xian Jiaotong University

  • White Papers // Jan 2011

    Queuing Schedule for Location Based on Wireless Ad-hoc Networks With D-Cover Algorithm

    A rudimentary problem in wireless sensor networks is localization - the determination of the geographical locations of sensors. Most existing localization algorithms were designed to work well either in networks of static sensors or networks in which all sensors are mobile. The authors think over the problem of estimating the...

    Provided By Xian Jiaotong University

  • White Papers // Sep 2011

    Auditory Cryptography (k, n) Threshold Watermarking Algorithm

    In this paper, auditory cryptography (k, n) threshold watermarking algorithm is proposed. By binary halftone pretreatment, one-dimensional meaningful audio watermarking is pretreated to high-fidelity binary audio. The binary audio is encrypted to n cryptographic audios and embedded in scrambled host audio signal hierarchically. Less than k of the cryptographic audios...

    Provided By Xian Jiaotong University

  • White Papers // Nov 2010

    Provable Password-Authenticated Key Exchange Protocol Against Imposter Attack on Ad Hoc Networks

    In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the Public Key Infrastructure (PKI). In this paper, the authors first discover that there exist some weaknesses in EKE protocol...

    Provided By Xian Jiaotong University