Xidian University

Displaying 1-21 of 21 results

  • White Papers // Apr 2012

    Knox: Privacy-Preserving Auditing for Shared Data With Large Groups in the Cloud

    With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. It remains elusive, however, to design an efficient mechanism to audit the integrity of such shared data, while still preserving identity privacy. In this...

    Provided By Xidian University

  • White Papers // Feb 2012

    Analyzing Requirements of Customer for WLAN using Novel Two-stage Method

    In order to analyze the requirement of customer for WLAN, the authors propose a novel two-stage analysis method: in the first stage, all data points are clustered to several communities by affinity propagation algorithm, and in the second stage, calculating the priority of the central point in community. According to...

    Provided By Xidian University

  • White Papers // Nov 2011

    A Proxy Re-Encryption Based Sharing Model for DRM

    Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals of various sharing schemes are to solve the portability problem instead of rational content sharing between...

    Provided By Xidian University

  • White Papers // Oct 2011

    Max-flow Capacity for Multi-Hop Mobile Wireless Networks

    In this paper, the mobility of multi-hop wireless networks is considered as a key factor influencing max-flow capacity, and a new unified analytical expression of the maximum flow capacity of a mobile wireless network is derived under mobility models. The simulation results under different mobility models, including random waypoint, random...

    Provided By Xidian University

  • White Papers // Sep 2011

    Interference Suppression for Global Positioning System Using Self-Coherent MUSIC

    In this paper, a two stage GPS anti-jamming processor based on subspace and self-coherent property of the C/A code is proposed. Firstly, the array received signals are projected onto the interference orthogonal subspace to suppress interferences. Then Direction Of Arrival (DOA) of GPS signal is obtained by self-coherent MUSIC and...

    Provided By Xidian University

  • White Papers // Aug 2011

    Load Balanced Rendezvous Data Collection in Wireless Sensor Networks

    The authors study the rendezvous data collection problem for the mobile sink in wireless sensor networks. They introduce to jointly optimize trajectory planning for the mobile sink and workload balancing for the network. By doing so, the mobile sink is able to efficiently collect network-wide data within a given delay...

    Provided By Xidian University

  • White Papers // Aug 2011

    A Fast Seamless Handoff Scheme Between IEEE 802.11 and EPS Networks Using Optimized Proxy Mobile IPv6

    Evolved Packet System (EPS) presents the EPS evolution of the 3G/UMTS standard introduced by the 3rd Generation Partnership Project (3GPP) standard committee. Inter-working issues between EPS and IEEE 802.11 networks will become a new challenging problem. In this paper, the authors propose a fast seamless handoff scheme using a optimized...

    Provided By Xidian University

  • White Papers // May 2011

    Low Power Asynchronous Wrapper for Network on Chips With Dynamic Frequency Scaling and Power Cut Off

    Large power consumptions and frequency non-tunable are two shortcomings existing in conventional asynchronous wrapper of network on chips. This paper proposes a low power variable frequency asynchronous wrapper. Through detecting the full/empty state of virtual channels, the wrapper can adjust the working speed of the stoppable clock module, so as...

    Provided By Xidian University

  • White Papers // Apr 2011

    A Game Approach for Cell Selection and Resource Allocation in Heterogeneous Wireless Networks

    Cell Selection and Resource Allocation (CS-RA) are processes of determining cell and radio resource which provide service to Mobile Station (MS). Optimizing these processes is an important step towards maximizing the utilization of current and future networks. In this paper, the authors investigate the problem of CS-RA in heterogeneous wireless...

    Provided By Xidian University

  • White Papers // Mar 2011

    A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale Wireless Sensor Networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. "Large-scale" means mainly large area or high density of a network. Accordingly the routing...

    Provided By Xidian University

  • White Papers // Feb 2011

    Sparsity-Based Image Denoising Via Dictionary Learning and Structural Clustering

    Where does the sparsity in image signals come from? Local and nonlocal image models have supplied complementary views toward the regularity in natural images - the former attempts to construct or learn a dictionary of basis functions that promotes the sparsity; while the latter connects the sparsity with the self-similarity...

    Provided By Xidian University

  • White Papers // Feb 2011

    The Face Recognition Method of the Two-Direction Variation of 2DPCA

    This paper first discusses the relationship of Principal Component Analysis (PCA) and 2-Dimensional PCA (2DPCA). For 2DPCA eliminating some covariance information which can be useful for recognition and needing more coefficient for image presentation. The face recognition method of the Two-Direction Variation of 2DPCA (TDV2DPCA) is proposed, which makes use...

    Provided By Xidian University

  • White Papers // Oct 2010

    Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher Under 192 Key Bits

    The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in 2005. In 2008, Demirci and Selcuk gave a meet-in-the-middle attack on 7-round AES under 192...

    Provided By Xidian University

  • White Papers // Oct 2010

    An Improvement of GAF for Lifetime Elongation in Wireless Sensor Networks

    The introduction of GAF into field of WSN has help save sensor's energy to a large extent in some cases. Nevertheless, the traditional GAF still cannot reach the optimum energy usage since it select cluster heads completely randomly, not considering the best position of cluster head and energy distribution. In...

    Provided By Xidian University

  • White Papers // Oct 2010

    A USIM-Based Uniform Access Authentication Framework in Mobile Communication

    With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are...

    Provided By Xidian University

  • White Papers // Oct 2010

    Efficient and Identity-Based Signcryption With Provably-Secure

    The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. The authors present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Their...

    Provided By Xidian University

  • White Papers // Jul 2010

    Overview of Routing in Dynamic Wireless Sensor Networks

    Dynamic Wireless Sensor Networks (DWSN) break out the limit that both nodes and sinks are static in traditional wireless sensor networks, thereby prolong network lifetime. DWSN is very practical and gradually become a key issue in the study of wireless sensor networks. In this paper, research background, classification standards, main...

    Provided By Xidian University

  • White Papers // Jun 2010

    A Power Control Algorithm Based on Non-Cooperative Game for Wireless CDMA Sensor Networks

    How to improve energy efficiency of WSNs (Wireless Sensor Network) is an important problem on the design of WSNs, for the demand of Multi-Services, a non-cooperative game power control model is proposed based on the WSNs model of CDMA, the existence and uniqueness of Nash Equilibrium in the game are...

    Provided By Xidian University

  • White Papers // May 2010

    A Novel Data Communication Approach in Wireless Sensor Networks

    The authors propose a novel clustered routing approach with the separation of path findings from data transfer in wireless sensor networks. The proposed protocol differs the traditional clustered routing in the following aspects: global communication adopts multi-hop mode, cluster heads are only responsible for path findings, and data are transmitted...

    Provided By Xidian University

  • White Papers // Apr 2010

    Efficient Secure Multicast Route Using Genetic Algorithms for Wireless Sensor and Actor Networks

    Multicast routing is very important for Wireless Sensor and Actor Networks (WSANs), where the decisions or control information from actors will be delivered to sensors over each link of the WSANs only once. In the multicast route each copy should be securely send to the authenticated destinations. The relay nodes...

    Provided By Xidian University

  • White Papers // Apr 2010

    Efficient Security Transmission Protocol With Identity-Based Encryption in Wireless Mesh Networks

    The wireless mesh network is a new networking technology, but the security information transmission of Mesh Points (MPs) is still a discussion for the requirements of convenience, flexibility and self-organization the current model of wireless mesh networks. So an efficient security solution of wireless mesh network is proposed, which consists...

    Provided By Xidian University

  • White Papers // Jul 2010

    Overview of Routing in Dynamic Wireless Sensor Networks

    Dynamic Wireless Sensor Networks (DWSN) break out the limit that both nodes and sinks are static in traditional wireless sensor networks, thereby prolong network lifetime. DWSN is very practical and gradually become a key issue in the study of wireless sensor networks. In this paper, research background, classification standards, main...

    Provided By Xidian University

  • White Papers // Oct 2010

    An Improvement of GAF for Lifetime Elongation in Wireless Sensor Networks

    The introduction of GAF into field of WSN has help save sensor's energy to a large extent in some cases. Nevertheless, the traditional GAF still cannot reach the optimum energy usage since it select cluster heads completely randomly, not considering the best position of cluster head and energy distribution. In...

    Provided By Xidian University

  • White Papers // Apr 2012

    Knox: Privacy-Preserving Auditing for Shared Data With Large Groups in the Cloud

    With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. It remains elusive, however, to design an efficient mechanism to audit the integrity of such shared data, while still preserving identity privacy. In this...

    Provided By Xidian University

  • White Papers // May 2011

    Low Power Asynchronous Wrapper for Network on Chips With Dynamic Frequency Scaling and Power Cut Off

    Large power consumptions and frequency non-tunable are two shortcomings existing in conventional asynchronous wrapper of network on chips. This paper proposes a low power variable frequency asynchronous wrapper. Through detecting the full/empty state of virtual channels, the wrapper can adjust the working speed of the stoppable clock module, so as...

    Provided By Xidian University

  • White Papers // Feb 2011

    The Face Recognition Method of the Two-Direction Variation of 2DPCA

    This paper first discusses the relationship of Principal Component Analysis (PCA) and 2-Dimensional PCA (2DPCA). For 2DPCA eliminating some covariance information which can be useful for recognition and needing more coefficient for image presentation. The face recognition method of the Two-Direction Variation of 2DPCA (TDV2DPCA) is proposed, which makes use...

    Provided By Xidian University

  • White Papers // Mar 2011

    A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale Wireless Sensor Networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. "Large-scale" means mainly large area or high density of a network. Accordingly the routing...

    Provided By Xidian University

  • White Papers // Apr 2011

    A Game Approach for Cell Selection and Resource Allocation in Heterogeneous Wireless Networks

    Cell Selection and Resource Allocation (CS-RA) are processes of determining cell and radio resource which provide service to Mobile Station (MS). Optimizing these processes is an important step towards maximizing the utilization of current and future networks. In this paper, the authors investigate the problem of CS-RA in heterogeneous wireless...

    Provided By Xidian University

  • White Papers // Oct 2010

    Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher Under 192 Key Bits

    The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in 2005. In 2008, Demirci and Selcuk gave a meet-in-the-middle attack on 7-round AES under 192...

    Provided By Xidian University

  • White Papers // Feb 2011

    Sparsity-Based Image Denoising Via Dictionary Learning and Structural Clustering

    Where does the sparsity in image signals come from? Local and nonlocal image models have supplied complementary views toward the regularity in natural images - the former attempts to construct or learn a dictionary of basis functions that promotes the sparsity; while the latter connects the sparsity with the self-similarity...

    Provided By Xidian University

  • White Papers // Oct 2010

    A USIM-Based Uniform Access Authentication Framework in Mobile Communication

    With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are...

    Provided By Xidian University

  • White Papers // Apr 2010

    Efficient Secure Multicast Route Using Genetic Algorithms for Wireless Sensor and Actor Networks

    Multicast routing is very important for Wireless Sensor and Actor Networks (WSANs), where the decisions or control information from actors will be delivered to sensors over each link of the WSANs only once. In the multicast route each copy should be securely send to the authenticated destinations. The relay nodes...

    Provided By Xidian University

  • White Papers // Apr 2010

    Efficient Security Transmission Protocol With Identity-Based Encryption in Wireless Mesh Networks

    The wireless mesh network is a new networking technology, but the security information transmission of Mesh Points (MPs) is still a discussion for the requirements of convenience, flexibility and self-organization the current model of wireless mesh networks. So an efficient security solution of wireless mesh network is proposed, which consists...

    Provided By Xidian University

  • White Papers // May 2010

    A Novel Data Communication Approach in Wireless Sensor Networks

    The authors propose a novel clustered routing approach with the separation of path findings from data transfer in wireless sensor networks. The proposed protocol differs the traditional clustered routing in the following aspects: global communication adopts multi-hop mode, cluster heads are only responsible for path findings, and data are transmitted...

    Provided By Xidian University

  • White Papers // Jun 2010

    A Power Control Algorithm Based on Non-Cooperative Game for Wireless CDMA Sensor Networks

    How to improve energy efficiency of WSNs (Wireless Sensor Network) is an important problem on the design of WSNs, for the demand of Multi-Services, a non-cooperative game power control model is proposed based on the WSNs model of CDMA, the existence and uniqueness of Nash Equilibrium in the game are...

    Provided By Xidian University

  • White Papers // Aug 2011

    Load Balanced Rendezvous Data Collection in Wireless Sensor Networks

    The authors study the rendezvous data collection problem for the mobile sink in wireless sensor networks. They introduce to jointly optimize trajectory planning for the mobile sink and workload balancing for the network. By doing so, the mobile sink is able to efficiently collect network-wide data within a given delay...

    Provided By Xidian University

  • White Papers // Feb 2012

    Analyzing Requirements of Customer for WLAN using Novel Two-stage Method

    In order to analyze the requirement of customer for WLAN, the authors propose a novel two-stage analysis method: in the first stage, all data points are clustered to several communities by affinity propagation algorithm, and in the second stage, calculating the priority of the central point in community. According to...

    Provided By Xidian University

  • White Papers // Oct 2011

    Max-flow Capacity for Multi-Hop Mobile Wireless Networks

    In this paper, the mobility of multi-hop wireless networks is considered as a key factor influencing max-flow capacity, and a new unified analytical expression of the maximum flow capacity of a mobile wireless network is derived under mobility models. The simulation results under different mobility models, including random waypoint, random...

    Provided By Xidian University

  • White Papers // Oct 2010

    Efficient and Identity-Based Signcryption With Provably-Secure

    The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. The authors present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Their...

    Provided By Xidian University

  • White Papers // Nov 2011

    A Proxy Re-Encryption Based Sharing Model for DRM

    Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals of various sharing schemes are to solve the portability problem instead of rational content sharing between...

    Provided By Xidian University

  • White Papers // Sep 2011

    Interference Suppression for Global Positioning System Using Self-Coherent MUSIC

    In this paper, a two stage GPS anti-jamming processor based on subspace and self-coherent property of the C/A code is proposed. Firstly, the array received signals are projected onto the interference orthogonal subspace to suppress interferences. Then Direction Of Arrival (DOA) of GPS signal is obtained by self-coherent MUSIC and...

    Provided By Xidian University

  • White Papers // Aug 2011

    A Fast Seamless Handoff Scheme Between IEEE 802.11 and EPS Networks Using Optimized Proxy Mobile IPv6

    Evolved Packet System (EPS) presents the EPS evolution of the 3G/UMTS standard introduced by the 3rd Generation Partnership Project (3GPP) standard committee. Inter-working issues between EPS and IEEE 802.11 networks will become a new challenging problem. In this paper, the authors propose a fast seamless handoff scheme using a optimized...

    Provided By Xidian University