Skip to main content

and
Your search also matched 54 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Attribute Ranking: An Entropy-Based Approach to Accelerating Browsing-Based Component Retrieval

Include preview-only content
  1. Chapter

    User Oriented IP Accounting in Multi-User Systems

    The traditional IP accounting method is IP address oriented, that means one IP address corresponds to one user, but it can not meet the finer granularity accounting requirement in multi-user systems, in which ...

    Ge Zhang, Bernd Reuther, Paul Mueller in Integrated Network Management VIII (2003)

  2. Chapter and Conference Paper

    A Design for Parameterized Roles

    Role-based access control eases the management of access control in cases where there are large numbers of objects and users. Roles provide certain access to specific data objects. In order to handle a very la...

    Mei Ge, Sylvia L. Osborn in Research Directions in Data and Applications Security XVIII (2004)

  3. Chapter and Conference Paper

    On Dynamic Subset Difference Revocation Scheme

    Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message overhead when the number of curr...

    Weifeng Chen, Zihui Ge, Chun Zhang, Jim Kurose, Don Towsley in Networking 2004 (2004)

  4. Chapter and Conference Paper

    An Anonymous Authentication Scheme for Identification Card

    This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...

    He Ge in Information and Communications Security (2006)

  5. Chapter and Conference Paper

    A Direct Anonymous Attestation Scheme for Embedded Devices

    Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...

    He Ge, Stephen R. Tate in Public Key Cryptography – PKC 2007 (2007)

  6. Chapter and Conference Paper

    Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites

    Web services selection aims to choose an appropriate web service among a number of service candidates. The trustworthiness of web services is an important metric for web services selection. Many trustworthines...

    Lijie Wang, Fei Liu, Ge Li, Liang Gu, Liangjie Zhang in Service-Oriented Computing (2009)

  7. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  8. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  9. Chapter and Conference Paper

    Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies

    According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...

    Wei Duan, Zhidong Cao, Yuanzheng Ge, **aogang Qiu in Intelligence and Security Informatics (2011)

  10. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  11. Chapter and Conference Paper

    Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

    Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against im...

    Junrong Liu, Yu Yu, François-Xavier Standaert in Computer Security -- ESORICS 2015 (2015)

  12. Chapter and Conference Paper

    Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups

    This paper present an identity-based encryption (IBE) scheme with full security in prime order bilinear groups by using dual pairing vector space. The security of our scheme is based upon decisional linear and...

    Jie Zhang, Aijun Ge, Siyu **ao, Chuangui Ma in Information and Communications Security (2016)