Skip to main content

previous disabled Page of 5
and
Your search also matched 841 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A unified framework for multicast forwarding

Include preview-only content
  1. Chapter

    An Authentication and Security Protocol for Mobile Computing

    The main contributions of this paper are: (1) to analyze an authentication and key distribution protocol for mobile computing proposed by Beller, Chang and Yacobi in 1993, and reveal two problems associated wi...

    Yuliang Zheng in Mobile Communications (1996)

  2. Chapter

    USD: Scalable Bandwidth Allocation for the Internet

    In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...

    Zheng Wang in High Performance Networking (1998)

  3. Chapter

    A Cut-Off Priority Flow Classification Policy for Data-Driven IP/ATM Switching Systems

    Flow classification is one of the key issues in the design of a data-driven IP/ATM switching system. To classify flows by applications is an effective approach in a real system due to its simplicity in impleme...

    Jun Zheng, Victor O. K. Li Fellow, IEEE in Broadband Communications (2000)

  4. Chapter

    Fair Bandwidth Allocation for Differentiated Services

    In this paper, we present a comparative study of three proposals for differentiated services — the RIO scheme, the two-bit scheme and the User-Share Differentiation (USD) scheme. We simulate the three schemes ...

    Anindya Basu, Zheng Wang in Protocols for High-Speed Networks VI (2000)

  5. Chapter and Conference Paper

    Unconditionally Secure Digital Signature Schemes Admitting Transferability

    A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices ...

    Goichiro Hanaoka, Junji Shikata, Yuliang Zheng in Advances in Cryptology — ASIACRYPT 2000 (2000)

  6. Chapter and Conference Paper

    On Relationships among Avalanche, Nonlinearity, and Correlation Immunity

    We establish, for the first time, an explicit and simple lower bound on the nonlinearity N f of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, Nf≥ 2n-1

    Yuliang Zheng, **an-Mo Zhang in Advances in Cryptology — ASIACRYPT 2000 (2000)

  7. Chapter and Conference Paper

    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite

    Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature...

    Yuliang Zheng in Public Key Cryptography (2001)

  8. Chapter and Conference Paper

    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions

    It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N

    Yuliang Zheng, **an-Mo Zhang in Selected Areas in Cryptography (2001)

  9. Chapter and Conference Paper

    Architecture of Generalized Network Service Anomaly and Fault Thresholds

    In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a novel system architecture that is capable of setting, monitoring and detecting generalized thresholds and soft faults proa...

    Zheng Zhang, Constantine Manikopoulos in Management of Multimedia on the Internet (2001)

  10. Chapter and Conference Paper

    Security Notions for Unconditionally Secure Signature Schemes

    This paper focuses on notions for the security of digital signature schemes whose resistance against forgery is not dependent on unproven computational assumptions. We establish successfully a sound and strong...

    Junji Shikata, Goichiro Hanaoka, Yuliang Zheng in Advances in Cryptology — EUROCRYPT 2002 (2002)

  11. Chapter and Conference Paper

    Interactive Deformation of Irregular Surface Models

    Interactive deformation of surface models, which consist of quadrilateral (regular) and non-quadrilateral (irregular) surface patches, arises in many applications of computer animation and computer aided produ...

    ** ** Zheng, Jian J. Zhang in Computational Science — ICCS 2002 (2002)

  12. Chapter and Conference Paper

    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

    Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundatio...

    Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai in Public Key Cryptography (2002)

  13. Chapter and Conference Paper

    A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme

    Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of...

    Chong-zhi Gao, Zheng-an Yao, Lei Li in Applied Cryptography and Network Security (2003)

  14. Chapter and Conference Paper

    Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts

    There are many applications for true, unpredictable random numbers. For example the strength of numerous cryptographic operations is often dependent on a source of truly random numbers. Sources of random infor...

    Michael Epstein, Laszlo Hars in Cryptographic Hardware and Embedded System… (2003)

  15. Chapter and Conference Paper

    An Implementation of Storage-Based Synchronous Remote Mirroring for SANs

    Remote mirroring ensures that all data written to a primary storage device are also written to a remote secondary storage device to support disaster recoverability. In this study, we designed and implemented a...

    Ji-wu Shu, Rui Yan, Dongchan Wen, Weimin Zheng in Network and Parallel Computing (2004)

  16. Chapter and Conference Paper

    Network-Embedded Programmable Storage and Its Applications

    We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and functionalities are significantly...

    Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, Chi Zhang, Ming Zhang in Networking 2004 (2004)

  17. Chapter and Conference Paper

    MagicStore: A New Out-of-Band Virtualization System in SAN Environments

    In this paper, MagicStore, a new out-of-band virtualization system designed for SAN environments is proposed. Online multiplication of the components in a striped volume can help enhance both the I/O performan...

    Guangyan Zhang, Jiwu Shu, Wei Xue, Weimin Zheng in Network and Parallel Computing (2005)

  18. Chapter and Conference Paper

    A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services

    Today’s grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are mo...

    Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng in Web Engineering (2005)

  19. Chapter and Conference Paper

    Pattern-Based Specification and Validation of Web Services Interaction Properties

    There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWL-S. Part of the semantic description in OWL-S is about the interaction proce...

    Zheng Li, Jun Han, Yan ** in Service-Oriented Computing - ICSOC 2005 (2005)

  20. Chapter and Conference Paper

    Modelling and Analysis of Power Consumption for Component-Based Embedded Software

    With the increasing complexity of the real-time embedded software, the power consumption is becoming a real challenge in the system designs. In this paper, for modelling the component-based embedded software, ...

    Hu Jun, Li Xuandong, Zheng Guoliang in Emerging Directions in Embedded and Ubiqui… (2006)

previous disabled Page of 5