Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Threshold Cryptography in Mobile Ad Hoc Networks

    The area of Threshold Cryptography investigates the design and analysis of protocols that distribute, in wired networks, cryptographic actions usually performed by a single party into multi-party variants, whe...

    Giovanni Di Crescenzo, Gonzalo Arce, Renwei Ge in Security in Communication Networks (2005)

  2. No Access

    Chapter and Conference Paper

    Approximate Message Authentication and Biometric Entity Authentication

    Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way...

    G. Di Crescenzo, R. Graveman, R. Ge, G. Arce in Financial Cryptography and Data Security (2005)

  3. Chapter and Conference Paper

    An Anonymous Authentication Scheme for Identification Card

    This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...

    He Ge in Information and Communications Security (2006)

  4. Chapter and Conference Paper

    A Direct Anonymous Attestation Scheme for Embedded Devices

    Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...

    He Ge, Stephen R. Tate in Public Key Cryptography – PKC 2007 (2007)

  5. No Access

    Chapter and Conference Paper

    Louis, Lester and Pierre: Three Protocols for Location Privacy

    Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider or the person’s friends, only if this re...

    Ge Zhong, Ian Goldberg, Urs Hengartner in Privacy Enhancing Technologies (2007)

  6. No Access

    Chapter and Conference Paper

    Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network

    Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-triv...

    Meng Ge, Kwok-Yan Lam in Advances in Information Security and Assurance (2009)

  7. No Access

    Chapter and Conference Paper

    A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle

    The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...

    Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang in Cryptology and Network Security (2009)

  8. Chapter and Conference Paper

    Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining

    Privacy-preserving data mining (PPDM) primarily addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper, we explore the problem of privacy-preserving distributed ass...

    **n-**g Ge, Jian-Ming Zhu in Information and Communications Security (2009)

  9. No Access

    Chapter and Conference Paper

    A Robust Damage Assessment Model for Corrupted Database Systems

    An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database sy...

    Ge Fu, Hong Zhu, Yingjiu Li in Information Systems Security (2009)

  10. Chapter and Conference Paper

    SIP Proxies: New Reflectors in the Internet

    To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechan...

    Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi in Communications and Multimedia Security (2010)

  11. Chapter and Conference Paper

    Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

    Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonym...

    Ge Zhang, Simone Fischer-Hübner in Communications and Multimedia Security (2010)

  12. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  13. No Access

    Chapter and Conference Paper

    Research on Dynamic Connectivity of Urban Road Network

    Connectivity of road network is an index to evaluate the rationality of urban road network planning. In the past, it was defined as the ratio of the number of edges to the number of nodes from static perspecti...

    Bing Su, Yanmei Shen, Changfei Ge in Information and Automation (2011)

  14. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  15. No Access

    Chapter and Conference Paper

    Timing Attacks on PIN Input in VoIP Networks (Short Paper)

    To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...

    Ge Zhang, Simone Fischer-Hübner in Detection of Intrusions and Malware, and V… (2011)

  16. No Access

    Chapter and Conference Paper

    An Improved New Event Detection Model

    New Event Detection (NED) aims to recognize the first story for a new event that had not been discussed before. The traditional event detection model basically adopts incremental TF-IDF weights for the terms, ...

    Hong**ang Diao, Ge Xu, Jian **ao in Information and Automation (2011)

  17. No Access

    Chapter and Conference Paper

    TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

    Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...

    Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang in Trust and Trustworthy Computing (2013)

  18. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  19. No Access

    Chapter and Conference Paper

    Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics

    As data transmitted in the smart grid are fine-grained and private, the personal habits and behaviors of inhabitants may be revealed by data mining algorithms. In fact, nonintrusive appliance load monitoring (...

    Baosheng Ge, Wen-Tao Zhu in Cyberspace Safety and Security (2013)

  20. No Access

    Chapter and Conference Paper

    Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform

    Trusted computing technology can establish trust in the local computer platform by a trusted boot, and can further transfer the trust to a remote verifier through a remote attestation mechanism. However, no st...

    Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue in Network and System Security (2013)

previous disabled Page of 2