|
ROLE
Author only
BOOKMARK & SHARE
|
|
1
May 2017
Information Sciences: an International Journal: Volume 387 Issue C, May 2017
Publisher: Elsevier Science Inc.
With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the Internet users. The cloud users can create, store, access and update the remote outsourced databases just as they are using the database system locally. However, unlike storing ...
Keywords:
Public authentication, Outsourced database, Homomorphic verifiable tags
2
March 2017
IEEE Transactions on Information Forensics and Security: Volume 12 Issue 3, March 2017
Publisher: IEEE Press
Cross-client data deduplication has been widely used to eliminate redundant storage overhead in cloud storage system. Recently, Abadi et al. introduced the primitive of MLE2 with nice security properties for secure and efficient data deduplication. However, besides the computationally expensive non-interactive zero-knowledge proofs, their fully randomized scheme (R-MLE2) requires the ...
3
January 2017
IEEE Transactions on Mobile Computing: Volume 16 Issue 1, January 2017
Publisher: IEEE Educational Activities Department
There have been some rapid advances on the design of full duplex (FD) transceivers in recent years. Although the benefits of FD have been studied for single-hop wireless communications, its potential on throughput performance in a multi-hop wireless network remains unclear. As for multi-hop networks, a fundamental problem is to ...
4
October 2016
TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16, Downloads (12 Months): 155, Downloads (Overall): 155
Full text available:
PDF
Augmented reality is poised to become a dominant computing paradigm over the next decade. With promises of three-dimensional graphics and interactive interfaces, augmented reality experiences will rival the very best science fiction novels. This breakthrough also brings in unique challenges on how users can authenticate one another to share rich ...
Keywords:
device pairing, usability, wireless localization, augmented reality, usable security
5
October 2016
IEEE Journal on Selected Areas in Communications: Volume 34 Issue 10, October 2016
Publisher: IEEE Press
Cooperation has become an essential element in spectrum sharing between the primary and secondary networks. A new trend in cooperation is to allow the primary and secondary networks to cooperate on the node level for data forwarding. This new paradigm allows to pool network resources from both the primary and ...
6
October 2016
IEEE Transactions on Computers: Volume 65 Issue 10, October 2016
Publisher: IEEE Computer Society
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and update a record by assigning a new value. Also, any attempt by the server to tamper with the data ...
7
September 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 9, September 2016
Publisher: IEEE Press
The transparent coexistence (TC) paradigm allows simultaneous activation of the secondary users with the primary users as long as their interference to the primary users can be properly canceled. This paradigm has the potential to offer much more efficient spectrum sharing than the traditional interweave paradigm. In this paper, we ...
8
August 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 8, August 2016
Publisher: IEEE Press
This paper studies the coexistence of heterogeneous multi-hop networks, which use different physical-layer technologies. We propose a new paradigm, called cooperative interference mitigation (CIM), which exploits recent advancement in interference cancellation (IC), such as technology-independent multiple output. CIM makes it possible for disparate networks to cooperatively mitigate the interference to/from ...
9
August 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 8, August 2016
Publisher: IEEE Press
The classical approach to interference management in wireless medium access is based on avoidance. Recently, there is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. This was made possible by a number of advances at the physical layer. In particular, the so-called successive interference ...
10
July 2016
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 12, Downloads (12 Months): 125, Downloads (Overall): 125
Full text available:
PDF
Physical layer security for wireless communication is broadly considered as a promising approach to protect data confidentiality against eavesdroppers. However, despite its ample theoretical foundation, the transition to practical implementations of physical-layer security still lacks success. A close inspection of proven vulnerable physical-layer security designs reveals that the flaws are ...
Keywords:
cryptanalysis, ciphertext-only attack, information-theoretic security analysis, orthogonal blinding, physical-layer security
11
July 2016
Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy - Volume 9722
Publisher: Springer-Verlag New York, Inc.
Cross-user data deduplication will greatly reduce the storage cost of storage service provider. Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption MLE and introduced the primitive of MLE2 with nice security properties. However, their fully randomized scheme R-MLE2 requires the inefficient equality-testing algorithm to identify ...
Keywords:
Deduplication, Convergent encryption, Interactive protocol, Message-locked encryption
12
July 2016
IEEE Network: The Magazine of Global Internetworking: Volume 30 Issue 4, July 2016
Publisher: IEEE Press
The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, ...
13
July 2016
IEEE Transactions on Information Forensics and Security: Volume 11 Issue 7, July 2016
Publisher: IEEE Press
Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when the targets are communicating, which can be readily implemented using software-defined radios. In this paper, we explore the use of the multi-input multi-output (MIMO) technology to achieve jamming resilient orthogonal ...
14
February 2016
International Journal of Information Security: Volume 15 Issue 1, February 2016
Publisher: Springer-Verlag
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this ...
Keywords:
Stronger proof, Weaker assumption, Pseudorandom generator, IND-CPA encryption scheme, Secure multi-party computation
15
February 2016
IEEE Transactions on Mobile Computing: Volume 15 Issue 2, February 2016
Publisher: IEEE Educational Activities Department
Recently, a new MIMO degree-of-freedom (DoF) model was proposed to allocate DoF resources for spatial multiplexing (SM) and interference cancellation (IC) in a multi-hop network. Although this DoF model promises many benefits, it hinges upon a global node ordering to keep track of IC responsibilities among all the nodes. An ...
16
January 2016
IEEE Transactions on Mobile Computing: Volume 15 Issue 1, January 2016
Publisher: IEEE Educational Activities Department
Interference alignment (IA) is a powerful technique to handle interference in wireless networks. Since its inception, IA has become a central research theme in the wireless communications community. Due to its intrinsic nature of being a physical layer technique, IA has been mainly studied for point-to-point or single-hop scenario. There ...
17
April 2015
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 81 Issue C, April 2015
Publisher: Elsevier North-Holland, Inc.
Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in ...
Keywords:
Graphical model, DDoS mitigation, Software-Defined Networking
18
April 2015
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 81 Issue C, April 2015
Publisher: Elsevier North-Holland, Inc.
Direct Anonymous Attestation (DAA) is a complex cryptographic protocol for remote attestation and provides both signer authentication and privacy. It was adopted by the Trusted Computing Group (TCG) as a technical standard. However, the DAA scheme in TCG specifications is designed for the single trusted domain attestation, and cannot be ...
Keywords:
Delegation, Cross trusted domain, DAA, Trusted computing, Remote attestation
19
April 2015
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8, Downloads (12 Months): 92, Downloads (Overall): 298
Full text available:
PDF
With the growing complexity of computing systems, memory based forensic techniques are becoming instrumental in digital investigations. Digital forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. Meanwhile, attackers have developed numerous anti-forensic mechanisms to defeat existing memory forensic techniques by manipulation of system ...
Keywords:
memory acquisition, system security, digital forensics, rootkits
20
April 2015
IEEE/ACM Transactions on Networking (TON): Volume 23 Issue 2, April 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10, Downloads (12 Months): 79, Downloads (Overall): 163
Full text available:
PDF
Wireless energy transfer based on magnetic resonant coupling is a promising technology to replenish energy to a wireless sensor network (WSN). However, charging sensor nodes one at a time poses a serious scalability problem. Recent advances in magnetic resonant coupling show that multiple nodes can be charged at the same ...
Keywords:
wireless energy transfer, Optimization, scalability, wireless sensor network
|
|