zhengzhihang

Displaying 1-20 of 20 results

  • White Papers // Jan 2014

    Security Analysis of RFID Based Devices in Educative Environments

    Educative environments such as public and private academic institutions are established with latest Information Communication Technology (ICT) which includes RFID based devices. Innovation of academic infrastructure using latest ICT with maximum security is a future development in most of academic applications. Regarding the RFID based devices involved in educative environments;...

    Provided By zhengzhihang

  • White Papers // Oct 2013

    Trust and Reputation Analysis in Fading Wireless Sensor Network Channel

    In this paper, the authors introduce a trust model and a reputation system for wireless sensor nodes in fading multi paths channel. The proposed model establishes the continuous version of the beta reputation system applied to binary events. In doing so, they introduce a theoretically sound Bayesian probabilistic approach for...

    Provided By zhengzhihang

  • White Papers // Sep 2013

    An Enhanced Opass with Modified Elliptic Curve Cryptography-Based User Authentication Scheme for Grid Computing

    User authentication to an open server or a system based on username and password is familiar to access the control. Entering the username and password in an untruthful computer is impulse to avert from involuntary exposure through phishing, keyloggers and cross-site password reuse. Since users habitually select weak passwords and...

    Provided By zhengzhihang

  • White Papers // Aug 2013

    Quantum Public-Key Cryptosystem Using Non-Orthogonal States

    In this paper, the authors provide a quantum public-key cryptosystem using non-orthogonal states. A user Alice uses a set of particles which are in non-orthogonal quantum states as the public key kept by a Key Management Center (KMC) while she keeps the states of the particles secret as the private...

    Provided By zhengzhihang

  • White Papers // Jul 2013

    Presenting an Approach for Establishing Information Security Project Management Based on PMBOK Standard

    Management of information technology projects is one of the most novel management in current world. In this kind of management, the main endeavor has three fundamental principles: collecting and storing of information processing and organizing of information transferring and presenting of information. By growing extension of technology in the world,...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Security Overview of Wireless Sensor Network

    There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and secure routing, have not able to protect the WSN, effectively but a new Intrusion Detection...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Design and Performance Analysis of Scalable and Efficient Group Key Management Scheme [SEGKMS] for Group Communication in Multicast Networks

    Scalable and Efficient Group Key Management Scheme (SEGKMS) is a key management system for multicast networks that results in security of the data exchanges. It is cost efficient with respect to the distribution of the keys between network elements. It is a systematic approach for the key management in a...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Secure Connection in Mobile IPv6

    The MIPv6 protocol allows a Mobile Node (MN) to maintain its network connection during attachment transfers. For Mobile IPv6 to run properly it is important to keep Binding Update (BU) messages protected. The BU message contains sensitive data. It consists of a Mobile Node's Home Address (MN's HoA) and Care-of...

    Provided By zhengzhihang

  • White Papers // May 2013

    An Approach To Secure Leach Using TESLA Based Certificate

    Wireless Sensor Network (WSN) has a group of sensors, which communicate by hop-by-hop communication for applications like surveillances, military and tracking. The WSN has low computational power and energy. So, the algorithms designed for WSN should be such that, they extend the lifetime, use less computations with maximum coverage. Low...

    Provided By zhengzhihang

  • White Papers // Apr 2013

    Risk Assessment of Information Security Management Systems in Large Corporations

    In this paper, the authors studied about the risks involved in Information Security Management Systems (ISMS) in large corporations. Data was collected by a researcher made questionnaire. The reliability of this questionnaire was examined by the researcher measured at 0.86. The validity of questionnaire was confirmed by experts in this...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    Performance Analysis of Current Parallel Programming Models for Many-core Systems

    Recent developments in microprocessor design show a clear trend towards multi-core and many-core architectures. Nowadays, processors consisting of dozens of general-purpose cores are already available in the market, and with the rapid development of semiconductor technology and increasing computing demand, it will be very common to have a processor consisting...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    Anonymous Trust Routing for Ad Hoc Networks - A Meta Heuristic Approach

    In this paper, a mechanism to address anonymous routing with trust to improve overall ad hoc network security and performance is proposed. Ad hoc networks are vulnerable to denial of services, wormhole attacks and spoofing. End-to-end data security in a network is generally provided by encryption and authentication which increases...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    An Approach to Context Representation, Discovery and Sharing in Mobile Ad-Hoc and Sensor Networks

    The representation, discovery and exchange of context information in a mobile ad-hoc environment is challenging due to the dynamic nature of node movement and interaction. In this paper a new method to exchange context in a Mobile Ad-hoc and Sensor Network (MSN), where the format of context parameters are organized...

    Provided By zhengzhihang

  • White Papers // Dec 2012

    Cryptanalysis of RAKAPOSHI Stream Cipher

    Stream ciphers are symmetric encryption algorithms based on the concept of pseudorandom key-stream generator. Although it seems rather difficult to construct a very fast and secure stream cipher, some efforts to achieve this have recently been deployed. The NESSIE project launched in 1999 by the European Union did not succeed...

    Provided By zhengzhihang

  • White Papers // Oct 2012

    High Security and Privacy in Cloud Computing Paradigm through Single Sign On

    Cloud computing is very emerging technology and have economical computation over the current infrastructure. Cloud computing provides the services on the basis of as you-pay-as-you-go. Privacy and security is still at top level risk in cloud data management environment. Privacy of the data is affected as cloud users have not...

    Provided By zhengzhihang

  • White Papers // Aug 2012

    The Random Beamforming Method for Wireless Physical Layer Security

    At present, wireless physical layer security is a hot topic. The present a Random Beamforming Security (RBS) method in this paper, with which the system secrecy capacity can be positive, even when the quality of main channel is worse than that of wiretap channel. The RBS method utilizes the difference...

    Provided By zhengzhihang

  • White Papers // Jun 2012

    Stochastic Optimization Assisted Joint Channel Estimation and Multi-User Detection for OFDM/SDMA

    Stochastic optimization assisted joint Channel Estimation (CE) and Multi-User Detection (MUD) was conceived and compared in the context of multi-user Multiple-Input Multiple-Output (MIMO) aided Orthogonal Frequency-Division Multiplexing/Space Division Multiple Access (OFDM/SDMA) systems. The development of stochastic optimization algorithms, such as Genetic Algorithms (GA), Repeated Weighted Boosting Search (RWBS), Particle Swarm...

    Provided By zhengzhihang

  • White Papers // Mar 2012

    Minimum Bit Error Rate Beamforming Receiver for Space-Division Multiple-Access Based Quadrature Amplitude Modulation Systems

    The authors considers the beam-forming assisted multiple-antenna receiver for space-division multiple-access based multiuser systems that employ high-throughput Quadrature Amplitude Modulation (QAM) signaling. The Bit Error Ratio (BER) expression as the function of the beam-former's weight vector is derived, and the Minimum BER (MBER) beam-forming receiver is then obtained as the...

    Provided By zhengzhihang

  • White Papers // Jul 2011

    Differential Evolution Algorithm Aided Minimum Symbol Error Rate Multi-user Detection for Multi-user OFDM/SDMA Systems

    A Differential Evolution (DE) algorithm assisted Minimum Symbol Error Ratio (MSER) Multi-User Detection (MUD) scheme is proposed for multi-user Multiple-Input Multiple-Output (MIMO) aided Orthogonal Frequency-Division Multiplexing/Space Division Multiple Access (OFDM/SDMA) systems. Quadrature Amplitude Modulation (QAM) is employed in most wireless standards by virtue of providing a high throughput. The MSER...

    Provided By zhengzhihang

  • White Papers // Apr 2011

    A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

    The security issue of MA (Mobile Agent) is concerned for a long time, Especially for attack from malicious hosts. The paper proposes a new security routing protocol whose highlight is integrating group signature into MA system. It will decrease the probability that malicious hosts cluster to skip one host deliberately,...

    Provided By zhengzhihang

  • White Papers // Jan 2014

    Security Analysis of RFID Based Devices in Educative Environments

    Educative environments such as public and private academic institutions are established with latest Information Communication Technology (ICT) which includes RFID based devices. Innovation of academic infrastructure using latest ICT with maximum security is a future development in most of academic applications. Regarding the RFID based devices involved in educative environments;...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Security Overview of Wireless Sensor Network

    There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and secure routing, have not able to protect the WSN, effectively but a new Intrusion Detection...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Design and Performance Analysis of Scalable and Efficient Group Key Management Scheme [SEGKMS] for Group Communication in Multicast Networks

    Scalable and Efficient Group Key Management Scheme (SEGKMS) is a key management system for multicast networks that results in security of the data exchanges. It is cost efficient with respect to the distribution of the keys between network elements. It is a systematic approach for the key management in a...

    Provided By zhengzhihang

  • White Papers // Jun 2013

    Secure Connection in Mobile IPv6

    The MIPv6 protocol allows a Mobile Node (MN) to maintain its network connection during attachment transfers. For Mobile IPv6 to run properly it is important to keep Binding Update (BU) messages protected. The BU message contains sensitive data. It consists of a Mobile Node's Home Address (MN's HoA) and Care-of...

    Provided By zhengzhihang

  • White Papers // Oct 2013

    Trust and Reputation Analysis in Fading Wireless Sensor Network Channel

    In this paper, the authors introduce a trust model and a reputation system for wireless sensor nodes in fading multi paths channel. The proposed model establishes the continuous version of the beta reputation system applied to binary events. In doing so, they introduce a theoretically sound Bayesian probabilistic approach for...

    Provided By zhengzhihang

  • White Papers // Jul 2013

    Presenting an Approach for Establishing Information Security Project Management Based on PMBOK Standard

    Management of information technology projects is one of the most novel management in current world. In this kind of management, the main endeavor has three fundamental principles: collecting and storing of information processing and organizing of information transferring and presenting of information. By growing extension of technology in the world,...

    Provided By zhengzhihang

  • White Papers // Sep 2013

    An Enhanced Opass with Modified Elliptic Curve Cryptography-Based User Authentication Scheme for Grid Computing

    User authentication to an open server or a system based on username and password is familiar to access the control. Entering the username and password in an untruthful computer is impulse to avert from involuntary exposure through phishing, keyloggers and cross-site password reuse. Since users habitually select weak passwords and...

    Provided By zhengzhihang

  • White Papers // Oct 2012

    High Security and Privacy in Cloud Computing Paradigm through Single Sign On

    Cloud computing is very emerging technology and have economical computation over the current infrastructure. Cloud computing provides the services on the basis of as you-pay-as-you-go. Privacy and security is still at top level risk in cloud data management environment. Privacy of the data is affected as cloud users have not...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    Anonymous Trust Routing for Ad Hoc Networks - A Meta Heuristic Approach

    In this paper, a mechanism to address anonymous routing with trust to improve overall ad hoc network security and performance is proposed. Ad hoc networks are vulnerable to denial of services, wormhole attacks and spoofing. End-to-end data security in a network is generally provided by encryption and authentication which increases...

    Provided By zhengzhihang

  • White Papers // Apr 2013

    Risk Assessment of Information Security Management Systems in Large Corporations

    In this paper, the authors studied about the risks involved in Information Security Management Systems (ISMS) in large corporations. Data was collected by a researcher made questionnaire. The reliability of this questionnaire was examined by the researcher measured at 0.86. The validity of questionnaire was confirmed by experts in this...

    Provided By zhengzhihang

  • White Papers // May 2013

    An Approach To Secure Leach Using TESLA Based Certificate

    Wireless Sensor Network (WSN) has a group of sensors, which communicate by hop-by-hop communication for applications like surveillances, military and tracking. The WSN has low computational power and energy. So, the algorithms designed for WSN should be such that, they extend the lifetime, use less computations with maximum coverage. Low...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    Performance Analysis of Current Parallel Programming Models for Many-core Systems

    Recent developments in microprocessor design show a clear trend towards multi-core and many-core architectures. Nowadays, processors consisting of dozens of general-purpose cores are already available in the market, and with the rapid development of semiconductor technology and increasing computing demand, it will be very common to have a processor consisting...

    Provided By zhengzhihang

  • White Papers // Aug 2012

    The Random Beamforming Method for Wireless Physical Layer Security

    At present, wireless physical layer security is a hot topic. The present a Random Beamforming Security (RBS) method in this paper, with which the system secrecy capacity can be positive, even when the quality of main channel is worse than that of wiretap channel. The RBS method utilizes the difference...

    Provided By zhengzhihang

  • White Papers // Mar 2012

    Minimum Bit Error Rate Beamforming Receiver for Space-Division Multiple-Access Based Quadrature Amplitude Modulation Systems

    The authors considers the beam-forming assisted multiple-antenna receiver for space-division multiple-access based multiuser systems that employ high-throughput Quadrature Amplitude Modulation (QAM) signaling. The Bit Error Ratio (BER) expression as the function of the beam-former's weight vector is derived, and the Minimum BER (MBER) beam-forming receiver is then obtained as the...

    Provided By zhengzhihang

  • White Papers // Dec 2012

    Cryptanalysis of RAKAPOSHI Stream Cipher

    Stream ciphers are symmetric encryption algorithms based on the concept of pseudorandom key-stream generator. Although it seems rather difficult to construct a very fast and secure stream cipher, some efforts to achieve this have recently been deployed. The NESSIE project launched in 1999 by the European Union did not succeed...

    Provided By zhengzhihang

  • White Papers // Jun 2012

    Stochastic Optimization Assisted Joint Channel Estimation and Multi-User Detection for OFDM/SDMA

    Stochastic optimization assisted joint Channel Estimation (CE) and Multi-User Detection (MUD) was conceived and compared in the context of multi-user Multiple-Input Multiple-Output (MIMO) aided Orthogonal Frequency-Division Multiplexing/Space Division Multiple Access (OFDM/SDMA) systems. The development of stochastic optimization algorithms, such as Genetic Algorithms (GA), Repeated Weighted Boosting Search (RWBS), Particle Swarm...

    Provided By zhengzhihang

  • White Papers // Jul 2011

    Differential Evolution Algorithm Aided Minimum Symbol Error Rate Multi-user Detection for Multi-user OFDM/SDMA Systems

    A Differential Evolution (DE) algorithm assisted Minimum Symbol Error Ratio (MSER) Multi-User Detection (MUD) scheme is proposed for multi-user Multiple-Input Multiple-Output (MIMO) aided Orthogonal Frequency-Division Multiplexing/Space Division Multiple Access (OFDM/SDMA) systems. Quadrature Amplitude Modulation (QAM) is employed in most wireless standards by virtue of providing a high throughput. The MSER...

    Provided By zhengzhihang

  • White Papers // Mar 2013

    An Approach to Context Representation, Discovery and Sharing in Mobile Ad-Hoc and Sensor Networks

    The representation, discovery and exchange of context information in a mobile ad-hoc environment is challenging due to the dynamic nature of node movement and interaction. In this paper a new method to exchange context in a Mobile Ad-hoc and Sensor Network (MSN), where the format of context parameters are organized...

    Provided By zhengzhihang

  • White Papers // Apr 2011

    A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

    The security issue of MA (Mobile Agent) is concerned for a long time, Especially for attack from malicious hosts. The paper proposes a new security routing protocol whose highlight is integrating group signature into MA system. It will decrease the probability that malicious hosts cluster to skip one host deliberately,...

    Provided By zhengzhihang

  • White Papers // Aug 2013

    Quantum Public-Key Cryptosystem Using Non-Orthogonal States

    In this paper, the authors provide a quantum public-key cryptosystem using non-orthogonal states. A user Alice uses a set of particles which are in non-orthogonal quantum states as the public key kept by a Key Management Center (KMC) while she keeps the states of the particles secret as the private...

    Provided By zhengzhihang