Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Two Adaptive Matching Learning Algorithms for Independent Component Analysis

    Independent component analysis (ICA) has been applied in many fields of signal processing and many ICA learning algorithms have been proposed from different perspectives. However, there is still a lack of a de...

    **wen Ma, Fei Ge, Dengpan Gao in Computational Intelligence and Security (2005)

  2. No Access

    Chapter and Conference Paper

    Threshold Cryptography in Mobile Ad Hoc Networks

    The area of Threshold Cryptography investigates the design and analysis of protocols that distribute, in wired networks, cryptographic actions usually performed by a single party into multi-party variants, whe...

    Giovanni Di Crescenzo, Gonzalo Arce, Renwei Ge in Security in Communication Networks (2005)

  3. No Access

    Chapter and Conference Paper

    Approximate Message Authentication and Biometric Entity Authentication

    Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way...

    G. Di Crescenzo, R. Graveman, R. Ge, G. Arce in Financial Cryptography and Data Security (2005)

  4. Chapter and Conference Paper

    An Anonymous Authentication Scheme for Identification Card

    This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...

    He Ge in Information and Communications Security (2006)

  5. Chapter and Conference Paper

    A Direct Anonymous Attestation Scheme for Embedded Devices

    Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...

    He Ge, Stephen R. Tate in Public Key Cryptography – PKC 2007 (2007)

  6. No Access

    Chapter and Conference Paper

    Louis, Lester and Pierre: Three Protocols for Location Privacy

    Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider or the person’s friends, only if this re...

    Ge Zhong, Ian Goldberg, Urs Hengartner in Privacy Enhancing Technologies (2007)

  7. No Access

    Chapter and Conference Paper

    Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network

    Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-triv...

    Meng Ge, Kwok-Yan Lam in Advances in Information Security and Assurance (2009)

  8. No Access

    Chapter and Conference Paper

    A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle

    The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...

    Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang in Cryptology and Network Security (2009)

  9. Chapter and Conference Paper

    Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining

    Privacy-preserving data mining (PPDM) primarily addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper, we explore the problem of privacy-preserving distributed ass...

    **n-**g Ge, Jian-Ming Zhu in Information and Communications Security (2009)

  10. No Access

    Chapter and Conference Paper

    A Robust Damage Assessment Model for Corrupted Database Systems

    An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database sy...

    Ge Fu, Hong Zhu, Yingjiu Li in Information Systems Security (2009)

  11. Chapter and Conference Paper

    SIP Proxies: New Reflectors in the Internet

    To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechan...

    Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi in Communications and Multimedia Security (2010)

  12. Chapter and Conference Paper

    Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

    Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonym...

    Ge Zhang, Simone Fischer-Hübner in Communications and Multimedia Security (2010)

  13. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  14. No Access

    Chapter and Conference Paper

    Research on Dynamic Connectivity of Urban Road Network

    Connectivity of road network is an index to evaluate the rationality of urban road network planning. In the past, it was defined as the ratio of the number of edges to the number of nodes from static perspecti...

    Bing Su, Yanmei Shen, Changfei Ge in Information and Automation (2011)

  15. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  16. No Access

    Chapter and Conference Paper

    Timing Attacks on PIN Input in VoIP Networks (Short Paper)

    To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...

    Ge Zhang, Simone Fischer-Hübner in Detection of Intrusions and Malware, and V… (2011)

  17. No Access

    Chapter and Conference Paper

    An Improved New Event Detection Model

    New Event Detection (NED) aims to recognize the first story for a new event that had not been discussed before. The traditional event detection model basically adopts incremental TF-IDF weights for the terms, ...

    Hong**ang Diao, Ge Xu, Jian **ao in Information and Automation (2011)

  18. No Access

    Chapter and Conference Paper

    Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes

    Spam over Internet Telephony (SPIT) is a threat to the use of Voice of IP (VoIP) systems. One kind of SPIT can make unsolicited bulk calls to victims’ voice mailboxes and then send them a prepared audio messag...

    Ge Zhang, Simone Fischer-Hübner in Information Security (2011)

  19. No Access

    Chapter and Conference Paper

    Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts

    In PKC 2010, Herranz et al. proposed the first ciphertext policy attribute-based encryption (CP-ABE) scheme with constant size ciphertexts for threshold predicates. However, their scheme was only secure against c...

    Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma in Information Security and Privacy (2012)

  20. No Access

    Chapter and Conference Paper

    TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

    Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...

    Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang in Trust and Trustworthy Computing (2013)

previous disabled Page of 4