Use trust management module to achieve effective security mechanisms in cloud environment
W Li, L Ping, X Pan - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Security and interoperability is the biggest challenge to promote cloud computing currently.
Trust has proved to be one of the most important and effective alternative means to construct …
Trust has proved to be one of the most important and effective alternative means to construct …
Lossless data hiding scheme based on adjacent pixel difference
Z Li, X Chen, X Pan, X Zeng - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
This paper proposes a lossless data hiding scheme with high embedding capacity, which can
recover the original image without any distortion after the hidden data have been extracted…
recover the original image without any distortion after the hidden data have been extracted…
A lossless robust data hiding scheme
XT Zeng, LD Ping, XZ Pan - Pattern Recognition, 2010 - Elsevier
This paper presents a lossless robust data hiding scheme. The original cover image can be
recovered without any distortion after the hidden data have been extracted if the stego-…
recovered without any distortion after the hidden data have been extracted if the stego-…
Detection of low-rate DDoS attack based on self-similarity
Z Sheng, Z Qifei, P Xuezeng… - 2010 Second International …, 2010 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDos) attack is one of the high threats to the Internet. This paper
proposes a measure based on Hurst coefficient to detect DDoS on Low-rate. The result of …
proposes a measure based on Hurst coefficient to detect DDoS on Low-rate. The result of …
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
R Fan, D He, X Pan, L Ping - Journal of Zhejiang University SCIENCE C, 2011 - Springer
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …
A secure and efficient user authentication protocol for two-tiered wireless sensor networks
R Fan, LD Ping, JQ Fu, XZ Pan - 2010 Second Pacific-Asia …, 2010 - ieeexplore.ieee.org
As wireless sensor networks (WSNs) are susceptible to attacks and sensor nodes have
limited resources, designing a secure and efficient user authentication protocol for WSNs is a …
limited resources, designing a secure and efficient user authentication protocol for WSNs is a …
LTE/SAE Model and its Implementation in NS 2
Q Qiu, J Chen, Q Zhang, X Pan - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
Expectation and requirements for future wireless communication systems continue to grow
and evolve. Thus, 3GPP has considered LTE/SAE to ensure its competitiveness in the future. …
and evolve. Thus, 3GPP has considered LTE/SAE to ensure its competitiveness in the future. …
[PDF][PDF] High concurrence Wu-Manber multiple patterns matching algorithm
B Zhang, X Chen, X Pan, Z Wu - Proceedings. The 2009 International …, 2009 - Citeseer
Manber algorithm greatly. In order to solve this problem, an improved Wu-Manber algorithm
is proposed. It divides all the patterns into different sets according to their length. For each set…
is proposed. It divides all the patterns into different sets according to their length. For each set…
A fast exact pattern matching algorithm for biological sequences
Y Huang, L Ping, X Pan, G Cai - 2008 International Conference …, 2008 - ieeexplore.ieee.org
Pattern matching is a powerful tool for querying sequence patterns in the biological sequence
databases. The remarkable increase in the number of DNA and proteins sequences has …
databases. The remarkable increase in the number of DNA and proteins sequences has …
[PDF][PDF] Watermark embedded in polygonal line for copyright protection of contour map
X Zhou, Y Ren, X Pan - International Journal of Computer Science and …, 2006 - Citeseer
In GIS system, we often use vector contour map to show or locate position on the earth. Since
such map data is very worthy of value, it is necessary and important to protect its copyright. …
such map data is very worthy of value, it is necessary and important to protect its copyright. …