Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots. This paper introduce a new security primitive based on hard AI problems, namely, a novel family of graphical password systems integrating Captcha technology, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical […]
Cloud-Assisted Privacy-Preserving E-Health System
This paper proposed a cloud-assisted mobile-access of health data with privacy and audit-ability. The system consists of two components: searchable encryption and auditable access control. Upon receiving the health data from users, the private cloud processes and stores it on public cloud such that storage privacy and efficient retrieval can be guaranteed. The private cloud […]
A Study on Online Service Migration from a Competitive Analysis Perspective
This paper introduces the service migration problem and formalize, it in the competitive analysis framework. For a single-server setting, we present a randomized online algorithm MIX and a deterministic online algorithm CEN that achieve a competitive ratio of in the worst case, i.e., without any knowledge of the future demand, where is the substrate size. […]
A Novel Network Security Metric Computation and Application
In this paper, we propose a novel network security metric, k-zero day safety. This is among the first efforts on network security metrics that is capable of modeling the security risk of unknown zero-day attacks. The metric would bring about new opportunities to the quantitative evaluation, hardening, and design of secure networks. We then studied […]
SPI: Institutionalizing Process Improvement Framework
This paper extends the line of enquiry in SPI research to address process improvement in distributed product development teams. We develop key process areas (KPAs) that specifically address the fundamental characteristics of distributed work identified in ‘collaboration readiness’, ‘technology readiness’, ‘common ground’, and ‘coupling in work’. By explicating the five-year SPI journey of a large […]
Privacy Preserving Authenticated Access Control Scheme
This paper proposes privacy preserving authenticated access control scheme. In this scheme to scheme a user can create a file and store it securely in the cloud. This scheme consists of use of the two protocols Attribute Base Encryption (ABE) and Attribute Based Signature (ABS). Distributed access control of data stored in cloud so that […]
Mis-sequencing problem: Three Stage load-balancing switch
In this paper, we introduced a three-stage load-balancing switch and studied its performance via theoretical analysis and experimental simulation. This effectively solves the mis-sequencing problem without the need of costly online scheduling algorithms or hardware speedup. The most significant difference between the 3SLB switch and prior load-balancing switches is the third stage of the 3SLB […]
iTRUST Scheme For Misbehavior Detection In DTNs
In this paper, we propose iTrust, a probabilistic misbehavior detection scheme to achieve efficient trust establishment in DTNs. we propose a general misbehavior detection framework based on a series of newly introduced data forwarding evidences. The proposed evidence framework could not only detect various misbehaviors but also be compatible to various routing protocols. We introduce […]
Improving System throughput in CSMA protocols
In this paper, we consider random access protocols with MPR, where there is an access point (AP) and multiple nodes in a wireless network. The AP has an M MPRcapability. The study includes both the slotted-Aloha and the -persistent CSMA protocols. For both protocols, each node makes a transmission attempt with a given probability in […]
QOD Routing Protocols for hybrid Networks
In this paper, we propose a QoS-Oriented Distributed routing protocol (QOD). Usually, a hybrid network has widespread base stations. The data transmission in hybrid networks has two features. First, an AP can be a source or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP […]