Xider Games

Displaying 1-38 of 38 results

  • White Papers // Nov 2013

    A Secure Obfuscator for Encrypted Blind Signature Functionality

    In this paper the authors introduce a new obfuscation called obfuscation of encrypted blind signature. Informally, Alice is signer and Bob is user. Bob needs Alice to sign a message, but bob does not want Alice to know what the message is. Furthermore, Bob doesn't want anyone to know the...

    Provided By Xider Games

  • White Papers // Sep 2013

    A Key-Policy Attribute-Based Broadcast Encryption

    According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously an \"Unbounded\", Key-Policy Attribute-Based Broadcast Encryption scheme (KP-ABBE) was proposed by combining with waters dual system encryption, attribute-based encryption and broadcast encryption system. Based on the standard...

    Provided By Xider Games

  • White Papers // Jul 2013

    Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128

    CLEFIA is a 128-bit block cipher supporting key lengths of 128, 192 and 256 bits. The authors' paper introduces a new chosen text attack, impossible differential-linear attack, on iterated cryptosystems. The attack is efficient for 16-round CLEFIA with whitening keys. In the paper, they construct a 13-round impossible differential-linear distinguisher....

    Provided By Xider Games

  • White Papers // Jul 2013

    A Survey on the Use of Graphical Passwords in Security

    Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. In this paper, the authors focus on the security aspects of existing graphical password schemes, which not only give a simple introduction of attack methods but...

    Provided By Xider Games

  • White Papers // Jun 2013

    Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data

    In the Ciphertext-Policy Attribute Based Encryption (CP-ABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the...

    Provided By Xider Games

  • White Papers // May 2013

    Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted...

    Provided By Xider Games

  • White Papers // Mar 2013

    Outsourcing Decryption of Multi-Authority ABE Ciphertexts

    The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, the authors improve Chase's scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore,...

    Provided By Xider Games

  • White Papers // Mar 2013

    Robust Two-factor Authentication and Key Agreement Preserving User Privacy

    In this paper, the authors first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets; it not only eliminates the redundancies, conflicts and ambiguities of the old ones, but also provides more desired security properties....

    Provided By Xider Games

  • White Papers // Mar 2013

    Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer

    To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, the authors present Osiris system which is a tool to capture behaviors of executable files in Windows system. It collects API calls invoked not only by main process of the analysis file, but also API...

    Provided By Xider Games

  • White Papers // Mar 2013

    Multicast Capacity in MANET with Infrastructure Support

    The authors study the multicast capacity under a network model featuring both node's mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this paper, they jointly consider the impact of the above three...

    Provided By Xider Games

  • White Papers // Feb 2013

    Homomorphic Subspace MAC Scheme for Secure Network Coding

    Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This paper presents a novel homomorphic subspace Message Authentication Code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is...

    Provided By Xider Games

  • White Papers // Jan 2013

    Optimal Multicast Capacity and Delay Tradeoffs in MANETs

    In this paper, the authors give a global perspective of multicast capacity and delay analysis in Mobile Ad hoc NETworks (MANETs). Specifically, they consider four node mobility models: two-dimensional i.i.d. mobility, two-dimensional hybrid random walk, one-dimensional i.i.d. mobility, and one-dimensional hybrid random walk. Two mobility time-scales are investigated in this...

    Provided By Xider Games

  • White Papers // Jan 2013

    Public Auditing for Shared Data with Efficient User Revocation in the Cloud

    With data services in the cloud, users can easily modify and share data as a group. To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data. Different blocks are signed by different users due to data modifications performed by different...

    Provided By Xider Games

  • White Papers // Jan 2013

    Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks

    In this paper, the authors consider secure transmission protocol for flexible load-balance control in two-hop relay wireless networks without the information of both eavesdropper channels and locations. The available secure transmission protocols via relay cooperation in physical layer secrecy framework cannot provide a flexible load-balance control, which may significantly limit...

    Provided By Xider Games

  • White Papers // Jan 2013

    An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are considered as the most promising terminal networks in future wireless communications and characterized by flexibility, fast and easy deployment, which make them an interesting technology for various applications. Group communication is one of the main concerns in MANETs. To provide the secure group communication in...

    Provided By Xider Games

  • White Papers // Dec 2012

    Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks

    This paper considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous paper on this problem mainly explained infinite networks and their asymptotic behavior and scaling law results, this papers focuses on...

    Provided By Xider Games

  • White Papers // Nov 2012

    Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks

    This paper considers the secure and reliable information transmission in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While the previous paper on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network...

    Provided By Xider Games

  • White Papers // Nov 2012

    Multicast Scaling Law in Multi-Channel Multi-Radio Wireless Networks

    This paper addresses the issue of multicast scaling performance in multi channel multi. The authors try to give a comprehensive picture of multicast scaling by investigating both the static and mobile networks, with the metrics being capacity and delay. Radio (MC-MR) networks. Previous literature has indicated that unicast capacity is...

    Provided By Xider Games

  • White Papers // Oct 2012

    A New Efficient Verifiable Fuzzy Keyword Search Scheme

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted...

    Provided By Xider Games

  • White Papers // Oct 2012

    A Real-Time Streaming Media Transmission Protocol for Multi-Hop Wireless Networks

    Time delay as well as error accumulation makes transmission of high-quality streaming media over multi-hop wireless networks more challenging. Since conventional TCP/IP based protocol drops and retransmits the whole packet once error(s) occur above Physical Layer, which leads to long time delay and low efficiency in transmission, a new protocol...

    Provided By Xider Games

  • White Papers // Sep 2012

    An Attack on a Fully Homomorphic Encryption Scheme

    Fully-Homomorphic-Encryption (FHE) is a novel technique applied to cloud-computation. It is for such procedure. The user needs to obtain the output of ring-operations in plaintext space, but wants to compute nothing but only decryption. The sever implements "Homomorphic operations in ciphertext space" of these operations in plaintext space. In this...

    Provided By Xider Games

  • White Papers // Jul 2012

    A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data

    As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently,...

    Provided By Xider Games

  • White Papers // May 2012

    On the Performance of Cognitive Relay Networks With Cooperative Spectrum Sensing

    In this paper, with multiple relays available for cooperative sensing and data transmission, the authors investigate the performance of Primary User (PU) and Secondary User (SU) in the hybrid interweave and underlay cognitive relay networks. For the cooperative sensing phase, all the relays independently sense the spectrum with energy detection,...

    Provided By Xider Games

  • White Papers // May 2012

    Wireless Adaptive Network Coding Strategy in Multiple-Access Relay Channels

    This paper considers a Multiple-Access Relay Channel (MARC) with two sources, one relay and one destination, where the relay decides what it transmits to the destination according to the outage condition of source-relay links. The outage probability and the approximate Bit Error Rate (BER) are derived, which are shown to...

    Provided By Xider Games

  • White Papers // May 2012

    A New Trapdoor-Indistinguishable Public Key Encryption with Keyword Search

    The Public key Encryption with Keyword Search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver and the server. Baek et...

    Provided By Xider Games

  • White Papers // Mar 2012

    A Novel Decomposed Transceiver Design for Multiuser MIMO Relay Downlink Systems

    A novel decomposed transceiver design scheme is developed for multiuser non-regenerative MIMO relay downlink systems. With a decomposed relay structure, the whole system can be decomposed into a point-to-point and a point-to-multipoint system, thus the transceiver design can be individually preceded for the first and second hop. In the first...

    Provided By Xider Games

  • White Papers // Mar 2012

    Cross Ambiguity Function Based Integer Frequency Offset Estimation for OFDM Systems

    Using only one training symbol, a novel Cross Ambiguity Function (CAF) based Integer Frequency Offset (IFO) estimator for OFDM systems is proposed. From the energy distribution characteristics of the ideal CAF, an energy-detection based metric is obtained. By designing a training symbol whose Ambiguity Function (AF) is a valid approximation...

    Provided By Xider Games

  • White Papers // Mar 2012

    XY-MAC: A Short Preamble MAC With Sharpened Pauses for Wireless Sensor Networks

    Short preamble MAC protocols such as X-MAC use a series of consecutive short preamble packets with pauses between them, which refer to as a strobed preamble. Target receiver can send an ACK packet during those pauses to stop the preamble transmission. Hence, the average length of transmitted preamble is reduced...

    Provided By Xider Games

  • White Papers // Dec 2011

    Achieving Dynamic Privileges in Secure Data Sharing on Cloud Storage

    With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. Many data sharing and access control schemes have been submitted. However, dynamic privileges among the access groups were not considered. In many circumstances, some users may have higher privileges than...

    Provided By Xider Games

  • White Papers // Sep 2011

    Convolutional Network Coding Based on Matrix Power Series Representation

    Network coding was formally introduced by. Later, linear network coding was proved to be able to achieve the optimal data transmission rate in an acyclic multicast network, and an algebraic approach to linear network coding was presented in. Since then, a rich literature on linear network coding has emerged, and...

    Provided By Xider Games

  • White Papers // Jun 2011

    Analysis on Network Coding-Aware Path Bandwidth in Wireless Networks

    Network coding plays an important role in improving capacity in wireless networks. With network coding, a node can transmit to several receivers concurrently. Nevertheless, it is not clear how much bandwidth a path can obtain after applying network coding. In this paper, the authors analyze the maximum bandwidth available on...

    Provided By Xider Games

  • White Papers // Jun 2011

    Analog Network Coding in the Generalized High-SNR Regime

    In a recent paper, Maric et al. analyzed the performance of the Analog Network Coding (ANC) in a layered relay network for the high-SNR regime. They have proved that under the ANC scheme, if each relay transmits the received signals at the upper bound of the power constraint, the transmission...

    Provided By Xider Games

  • White Papers // Jun 2011

    Localized Dimension Growth in Random Network Coding: A Convolutional Approach

    The authors propose an efficient Adaptive Random Convolutional Network Coding (ARCNC) algorithm to address the issue of field size in random network coding. ARCNC operates as a convolutional code, with the coefficients of local encoding kernels chosen randomly over a small finite field. The lengths of local encoding kernels increase...

    Provided By Xider Games

  • White Papers // Jun 2011

    Comparative Study on the Impacts of Institutional and Individual Investor on Security Investment Risk

    Institutional investor is supposed to be more powerful than individual investor from the perspectives of regularity authority and scholar, but the results are mixed. Using the data of listed company in China, the paper presents a comparative study on the impacts of institutional investor and individual investor on investment risk....

    Provided By Xider Games

  • White Papers // Apr 2011

    Multi-User Multi-Stream Generalized Channel Inversion Vector Perturbation

    Vector Perturbation (VP) is a prominent precoding technique attracted a lot of attention in recent years. Until now, however, various extended VP techniques proposed to apply in multiuser precoding are almost restricted to one antenna configuration of each user. The restriction does not meet the development of next generation wireless...

    Provided By Xider Games

  • White Papers // Jul 2010

    An Improvement on a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing

    Password-based authenticated key schemes have a wide range of applications, especially the consumers who have no device capable of securely storing high entropy secret keys. The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem, the authors...

    Provided By Xider Games

  • White Papers // Jan 2009

    An Efficient Verifiably Encrypted Signature Scheme without Random Oracles

    A Verifiably Encrypted Signature (VES) provides a way to encrypt a signature under a designated public key and subsequently prove that the resulting ciphertext indeed contains such a signature. It is often used as a building block to construct optimistic fair exchange protocols over Internet, especially online contract signing, e-payment...

    Provided By Xider Games

  • White Papers // Mar 2007

    Building Business Processes or Assembling Service Components: Reuse Services with BPEL4WS and SCA

    The Service-Oriented Architecture (SOA) has attracted lots of attentions these days. However, SOA is essentially a design methodology that has existed for decades, and doesn't provide enough details about the development, reuse and integration of the services. The Business Process Execution Language for Web Services (BPEL4WS) has offered a formal...

    Provided By Xider Games

  • White Papers // May 2012

    On the Performance of Cognitive Relay Networks With Cooperative Spectrum Sensing

    In this paper, with multiple relays available for cooperative sensing and data transmission, the authors investigate the performance of Primary User (PU) and Secondary User (SU) in the hybrid interweave and underlay cognitive relay networks. For the cooperative sensing phase, all the relays independently sense the spectrum with energy detection,...

    Provided By Xider Games

  • White Papers // May 2012

    Wireless Adaptive Network Coding Strategy in Multiple-Access Relay Channels

    This paper considers a Multiple-Access Relay Channel (MARC) with two sources, one relay and one destination, where the relay decides what it transmits to the destination according to the outage condition of source-relay links. The outage probability and the approximate Bit Error Rate (BER) are derived, which are shown to...

    Provided By Xider Games

  • White Papers // Mar 2012

    A Novel Decomposed Transceiver Design for Multiuser MIMO Relay Downlink Systems

    A novel decomposed transceiver design scheme is developed for multiuser non-regenerative MIMO relay downlink systems. With a decomposed relay structure, the whole system can be decomposed into a point-to-point and a point-to-multipoint system, thus the transceiver design can be individually preceded for the first and second hop. In the first...

    Provided By Xider Games

  • White Papers // Mar 2012

    Cross Ambiguity Function Based Integer Frequency Offset Estimation for OFDM Systems

    Using only one training symbol, a novel Cross Ambiguity Function (CAF) based Integer Frequency Offset (IFO) estimator for OFDM systems is proposed. From the energy distribution characteristics of the ideal CAF, an energy-detection based metric is obtained. By designing a training symbol whose Ambiguity Function (AF) is a valid approximation...

    Provided By Xider Games

  • White Papers // Mar 2012

    XY-MAC: A Short Preamble MAC With Sharpened Pauses for Wireless Sensor Networks

    Short preamble MAC protocols such as X-MAC use a series of consecutive short preamble packets with pauses between them, which refer to as a strobed preamble. Target receiver can send an ACK packet during those pauses to stop the preamble transmission. Hence, the average length of transmitted preamble is reduced...

    Provided By Xider Games

  • White Papers // Nov 2012

    Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks

    This paper considers the secure and reliable information transmission in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While the previous paper on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network...

    Provided By Xider Games

  • White Papers // Dec 2012

    Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks

    This paper considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous paper on this problem mainly explained infinite networks and their asymptotic behavior and scaling law results, this papers focuses on...

    Provided By Xider Games

  • White Papers // Sep 2012

    An Attack on a Fully Homomorphic Encryption Scheme

    Fully-Homomorphic-Encryption (FHE) is a novel technique applied to cloud-computation. It is for such procedure. The user needs to obtain the output of ring-operations in plaintext space, but wants to compute nothing but only decryption. The sever implements "Homomorphic operations in ciphertext space" of these operations in plaintext space. In this...

    Provided By Xider Games

  • White Papers // Oct 2012

    A New Efficient Verifiable Fuzzy Keyword Search Scheme

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted...

    Provided By Xider Games

  • White Papers // Jan 2013

    Public Auditing for Shared Data with Efficient User Revocation in the Cloud

    With data services in the cloud, users can easily modify and share data as a group. To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data. Different blocks are signed by different users due to data modifications performed by different...

    Provided By Xider Games

  • White Papers // Feb 2013

    Homomorphic Subspace MAC Scheme for Secure Network Coding

    Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This paper presents a novel homomorphic subspace Message Authentication Code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is...

    Provided By Xider Games

  • White Papers // May 2012

    A New Trapdoor-Indistinguishable Public Key Encryption with Keyword Search

    The Public key Encryption with Keyword Search (PEKS) provides a way for users to search data which are encrypted under the users' public key on a storage system. However, the original schemes are based on the unrealistic assumption of a secure channel between the receiver and the server. Baek et...

    Provided By Xider Games

  • White Papers // Jul 2012

    A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data

    As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently,...

    Provided By Xider Games

  • White Papers // Jan 2013

    Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks

    In this paper, the authors consider secure transmission protocol for flexible load-balance control in two-hop relay wireless networks without the information of both eavesdropper channels and locations. The available secure transmission protocols via relay cooperation in physical layer secrecy framework cannot provide a flexible load-balance control, which may significantly limit...

    Provided By Xider Games

  • White Papers // Apr 2011

    Multi-User Multi-Stream Generalized Channel Inversion Vector Perturbation

    Vector Perturbation (VP) is a prominent precoding technique attracted a lot of attention in recent years. Until now, however, various extended VP techniques proposed to apply in multiuser precoding are almost restricted to one antenna configuration of each user. The restriction does not meet the development of next generation wireless...

    Provided By Xider Games

  • White Papers // Jun 2011

    Localized Dimension Growth in Random Network Coding: A Convolutional Approach

    The authors propose an efficient Adaptive Random Convolutional Network Coding (ARCNC) algorithm to address the issue of field size in random network coding. ARCNC operates as a convolutional code, with the coefficients of local encoding kernels chosen randomly over a small finite field. The lengths of local encoding kernels increase...

    Provided By Xider Games

  • White Papers // Sep 2011

    Convolutional Network Coding Based on Matrix Power Series Representation

    Network coding was formally introduced by. Later, linear network coding was proved to be able to achieve the optimal data transmission rate in an acyclic multicast network, and an algebraic approach to linear network coding was presented in. Since then, a rich literature on linear network coding has emerged, and...

    Provided By Xider Games

  • White Papers // Jun 2011

    Analysis on Network Coding-Aware Path Bandwidth in Wireless Networks

    Network coding plays an important role in improving capacity in wireless networks. With network coding, a node can transmit to several receivers concurrently. Nevertheless, it is not clear how much bandwidth a path can obtain after applying network coding. In this paper, the authors analyze the maximum bandwidth available on...

    Provided By Xider Games

  • White Papers // Jan 2013

    Optimal Multicast Capacity and Delay Tradeoffs in MANETs

    In this paper, the authors give a global perspective of multicast capacity and delay analysis in Mobile Ad hoc NETworks (MANETs). Specifically, they consider four node mobility models: two-dimensional i.i.d. mobility, two-dimensional hybrid random walk, one-dimensional i.i.d. mobility, and one-dimensional hybrid random walk. Two mobility time-scales are investigated in this...

    Provided By Xider Games

  • White Papers // Mar 2013

    Multicast Capacity in MANET with Infrastructure Support

    The authors study the multicast capacity under a network model featuring both node's mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this paper, they jointly consider the impact of the above three...

    Provided By Xider Games

  • White Papers // Nov 2012

    Multicast Scaling Law in Multi-Channel Multi-Radio Wireless Networks

    This paper addresses the issue of multicast scaling performance in multi channel multi. The authors try to give a comprehensive picture of multicast scaling by investigating both the static and mobile networks, with the metrics being capacity and delay. Radio (MC-MR) networks. Previous literature has indicated that unicast capacity is...

    Provided By Xider Games

  • White Papers // Jun 2011

    Analog Network Coding in the Generalized High-SNR Regime

    In a recent paper, Maric et al. analyzed the performance of the Analog Network Coding (ANC) in a layered relay network for the high-SNR regime. They have proved that under the ANC scheme, if each relay transmits the received signals at the upper bound of the power constraint, the transmission...

    Provided By Xider Games

  • White Papers // Oct 2012

    A Real-Time Streaming Media Transmission Protocol for Multi-Hop Wireless Networks

    Time delay as well as error accumulation makes transmission of high-quality streaming media over multi-hop wireless networks more challenging. Since conventional TCP/IP based protocol drops and retransmits the whole packet once error(s) occur above Physical Layer, which leads to long time delay and low efficiency in transmission, a new protocol...

    Provided By Xider Games

  • White Papers // Jul 2013

    Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128

    CLEFIA is a 128-bit block cipher supporting key lengths of 128, 192 and 256 bits. The authors' paper introduces a new chosen text attack, impossible differential-linear attack, on iterated cryptosystems. The attack is efficient for 16-round CLEFIA with whitening keys. In the paper, they construct a 13-round impossible differential-linear distinguisher....

    Provided By Xider Games

  • White Papers // Jun 2011

    Comparative Study on the Impacts of Institutional and Individual Investor on Security Investment Risk

    Institutional investor is supposed to be more powerful than individual investor from the perspectives of regularity authority and scholar, but the results are mixed. Using the data of listed company in China, the paper presents a comparative study on the impacts of institutional investor and individual investor on investment risk....

    Provided By Xider Games

  • White Papers // Mar 2013

    Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer

    To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, the authors present Osiris system which is a tool to capture behaviors of executable files in Windows system. It collects API calls invoked not only by main process of the analysis file, but also API...

    Provided By Xider Games

  • White Papers // Sep 2013

    A Key-Policy Attribute-Based Broadcast Encryption

    According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously an \"Unbounded\", Key-Policy Attribute-Based Broadcast Encryption scheme (KP-ABBE) was proposed by combining with waters dual system encryption, attribute-based encryption and broadcast encryption system. Based on the standard...

    Provided By Xider Games

  • White Papers // Jan 2013

    An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are considered as the most promising terminal networks in future wireless communications and characterized by flexibility, fast and easy deployment, which make them an interesting technology for various applications. Group communication is one of the main concerns in MANETs. To provide the secure group communication in...

    Provided By Xider Games

  • White Papers // Nov 2013

    A Secure Obfuscator for Encrypted Blind Signature Functionality

    In this paper the authors introduce a new obfuscation called obfuscation of encrypted blind signature. Informally, Alice is signer and Bob is user. Bob needs Alice to sign a message, but bob does not want Alice to know what the message is. Furthermore, Bob doesn't want anyone to know the...

    Provided By Xider Games

  • White Papers // Jan 2009

    An Efficient Verifiably Encrypted Signature Scheme without Random Oracles

    A Verifiably Encrypted Signature (VES) provides a way to encrypt a signature under a designated public key and subsequently prove that the resulting ciphertext indeed contains such a signature. It is often used as a building block to construct optimistic fair exchange protocols over Internet, especially online contract signing, e-payment...

    Provided By Xider Games

  • White Papers // Mar 2013

    Outsourcing Decryption of Multi-Authority ABE Ciphertexts

    The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, the authors improve Chase's scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore,...

    Provided By Xider Games

  • White Papers // Mar 2013

    Robust Two-factor Authentication and Key Agreement Preserving User Privacy

    In this paper, the authors first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets; it not only eliminates the redundancies, conflicts and ambiguities of the old ones, but also provides more desired security properties....

    Provided By Xider Games

  • White Papers // Jun 2013

    Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data

    In the Ciphertext-Policy Attribute Based Encryption (CP-ABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the...

    Provided By Xider Games

  • White Papers // Jul 2010

    An Improvement on a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing

    Password-based authenticated key schemes have a wide range of applications, especially the consumers who have no device capable of securely storing high entropy secret keys. The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem, the authors...

    Provided By Xider Games

  • White Papers // Mar 2007

    Building Business Processes or Assembling Service Components: Reuse Services with BPEL4WS and SCA

    The Service-Oriented Architecture (SOA) has attracted lots of attentions these days. However, SOA is essentially a design methodology that has existed for decades, and doesn't provide enough details about the development, reuse and integration of the services. The Business Process Execution Language for Web Services (BPEL4WS) has offered a formal...

    Provided By Xider Games

  • White Papers // Jul 2013

    A Survey on the Use of Graphical Passwords in Security

    Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. In this paper, the authors focus on the security aspects of existing graphical password schemes, which not only give a simple introduction of attack methods but...

    Provided By Xider Games

  • White Papers // May 2013

    Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted...

    Provided By Xider Games

  • White Papers // Dec 2011

    Achieving Dynamic Privileges in Secure Data Sharing on Cloud Storage

    With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. Many data sharing and access control schemes have been submitted. However, dynamic privileges among the access groups were not considered. In many circumstances, some users may have higher privileges than...

    Provided By Xider Games