Hung-Min Sun

Hung-Min Sun
  • Ph.D.
  • Professor (Full) at National Tsing Hua University

About

222
Publications
38,646
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,482
Citations
Current institution
National Tsing Hua University
Current position
  • Professor (Full)

Publications

Publications (222)
Article
The paper proposes an RFID management information system that integrates two common topics including inventory workflow management and warehouse management for bonded warehouse. The main core of this research focused on the boxes and pallets management for the bonded warehouse of Hsinchu Science Park in Taiwan. The entire management mechanism cover...
Article
Full-text available
Raptor codes can provide good error correction capability and efficient encoding and decoding rate. Its fountain code property is effective in avoiding packet retransmission for both unicast and multicast service delivery. Hence, there are many mobile, vehicular and broadband applications adopting it such as mobile multimedia broadcasting, multimed...
Article
Full-text available
Due to the growing popularity of Internet of People (IoP) and its impacts on human activity, it has quickly become an important research field and hot subject. Since one purpose of IoP is to connect people to people, personal live video delivery that has been popular recently can also be regarded as an important application of IoP. For improving th...
Conference Paper
Most of the mutual authentication protocols with user anonymity proposed for providing secure roaming service through wireless communications are based on smart cards and have to establish public key cryptosystems in advance. To solve this, Guo et al. firstly proposed an efficient mutual authentication protocol with user anonymity using smart card...
Conference Paper
Nowadays the cloud security becomes a significant issue: while the single user keyword search on encrypted data has been proposed, encrypting files before uploading scarifies the advantage of the convenience of sharing data with others on the cloud. We design a searchable encryption for the multi-user case. We combine the advantage of efficiency of...
Patent
Full-text available
A receiver of a communication system includes: an input module, a group-based pre-decoding module and a reconstructing module. The input module is for receiving a received data. The group-based pre-decoding module is for combining the received data with a grouped decoding matrix into an encoded equation matrix (EEM) based on a group parameter and f...
Conference Paper
Cloud computing has been recognized as an important advance for virtualizing computing hardware, distributed computing middleware, and communication networks. For simplifying the network OA&M (Operation, Administration, and Management) tasks of customers, a CaaS (Communications-asa-Service) operator can provide virtual communication channels tailor...
Article
Cloud storage is one of the most important applications in our daily lives. User can store their own data into cloud storage and remotely access the saved data. Owing to the social media develops, users can share the digital files to other users, leading to the amount of data growing rapidly and searching abilities necessarily. In the some cases, s...
Patent
Full-text available
In one exemplary embodiment of an apparatus for accelerating the encoding of Raptor codes, based on an inputted block length, a pre-encoding matrix generation device determines to generate an encoding matrix M corresponding to the inputted block length and computes an inverse matrix M−1, or makes a pre-coding operation list storage device output an...
Patent
Full-text available
In one exemplary embodiment of an apparatus for accelerating the encoding of Raptor codes, based on an inputted block length, a pre-encoding matrix generation device determines to generate an encoding matrix M corresponding to the inputted block length and computes an inverse matrix M−1, or makes a pre-coding operation list storage device output an...
Article
In a Private Matching (PM) scheme, the client C has a dataset X of m elements, and the server S has a dataset Y of n elements. The client C can learn the set intersection X∩YX∩Y without leaking any information to the server S . Previously, the most efficient PM scheme requires communication of complexity O∼(m+n), which increases linearly with n . T...
Patent
Full-text available
The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image...
Article
Full-text available
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our...
Conference Paper
It is easy to discover if there are hooks in the System Service Dispatch Table (SSDT). However, it is difficult to tell whether theses hooks are malicious or not after finding out the hooks in the SSDT. In this paper, we propose a scheme that evaluates the hooks by comparing the returned results before hooking and after hooking. If a malicious hook...
Article
Full-text available
RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener att...
Article
Radio-frequency identification (RFID) systems can benefit from cloud databases since information on thousands of tags is queried at the same time. If all RFID readers in a system query a cloud database, data consistency can easily be maintained by cloud computing. Privacy-preserving authentication (PPA) has been proposed to protect RFID security. T...
Article
Although Integer Factorization Problem (IFP) is one of the most difficult problems in the world due to the limited computational capability, there exist some vulnerable integers which are factorable by the development of cloud computing. For example, given an integer N=pqN=pq, which is a product of two primes, it is hard to determine the prime fact...
Article
Full-text available
Stack smashing is still one of the most popular techniques for hijacking program controls. A return address of a program is the best-known target, and its previous frame pointer is the second best. Various techniques have been proposed to defeat stack smashing attacks, but most techniques need to alter compilers or require hardware support, and onl...
Patent
Full-text available
The present disclosure relates to a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) image authentication method and system. The CAPTCHA image authentication method comprises the steps of: collecting a plurality of first objects; defining a plurality of variables so as to be used as basis for classifying and divi...
Article
IT office-aid assets (ex. PC, Telephone, etc.) are required tools for most office workers in an enterprise. The process from ordering to dispatching the composite office-aid assets for new employees itself is a supply chain within a company. This study aims to reduce labor costs, increase process efficiency, and resolve operational issues in the su...
Patent
A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP se...
Article
The man-in-the-middle (MITM) attack is the major threat for handheld devices to agree on a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. Apart from insecurely typing passwords into handheld devices or comparing long hexadecimal keys displayed on the devices' scree...
Article
Full-text available
Recently, concealed data aggregation schemes have been proposed to reduce the transmission cost under maintaining data privacy. Those schemes enhanced security of conventional aggregation through utilizing privacy homo-morphic encryption. The privacy homomorphic encryption provides algebraic computations on ciphertexts directly, e.g., without decry...
Article
For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. Since aggregators collect data wit...
Conference Paper
Full-text available
Reversible data hiding based on prediction-based is a good technique that can hide message bits into digital images with low distortion. In this paper, we propose a reversible data hiding method based on interleaving prediction and local complexity for enhancing stego-image quality. The thresholds and local complexity are used to determine which pr...
Article
Mobile ad hoc networks (MANETs) are vulnerable to active attacks, such as dropping attacks, replay attacks, collusion attacks, and tampering attacks. Many researches have been proposed to provide security transmission. However, they cannot effectively and efficiently resist colluding attacks. Therefore, we propose a collaborative routing protocol (...
Conference Paper
This paper presents an HD (High Definition) streaming system that employs an AL-FEC (Application-Layer FEC) scheme (i.e., DVB AL-FEC) based on Raptor codes to protect the transmission of MPEG-2 TS (Transport Streaming) over RTP streaming packets over error-prone Wi-Fi multicast channels. The employed AL-FEC scheme can effectively recover the missin...
Conference Paper
Raptor codes can provide good error correction capability and efficient encoding and decoding rates. Its fountain code property is effective in avoiding packet retransmission for both unicast and multicast service delivery. Hence, there are many wireless and broadband applications adopting it such as mobile multimedia broadcasting and broadband IPT...
Article
Multimedia hiding system is to embed message behind the specified media, but it is still kept normal in media representations via human sensitive organizations without causing imperceptibility. In this article, we propose a data hiding system by means of flexible exploiting modification directions to achieve safer message concealments in image-medi...
Chapter
In 2006, Zhang and Wang presented the Exploiting Modification Direction (EMD) method for embedding secret message. The EMD approach is a steganographic approach in which only pixel in [1, -1] is changed after a message is hidden. This investigation presents a novel reversible data hiding scheme that is based on the modulo function and histogram shi...
Conference Paper
In recent years, wireless technologies have been widely deployed and the corresponding applications (e.g., video streaming services) have shown high economic potentials. Different from wired networks, wireless signals are more sensitive to the variations of deployed environments, resulting in variant Round Trip Time (RTT) and Packet Loss Rate (PLR)...
Conference Paper
In RSA equation: ed = k·φ(N) + 1, we may guess on partial bits of d or p + q by doing an exhaustive search to further extend the security boundary of d. In this paper, we discuss the following question: Does guessing on p + q bring more benefit than guessing on d? We provide the detailed analysis on this problem by using the lattice reduction techn...
Conference Paper
Given an integer N = pq, which is a product of two primes, it is difficult to determine the prime factors p and q efficiently. However, for the suitable size of a number N, Fermat’s algorithm is one of the most simple method for solving it. In this paper, a method called EPF for estimating the prime factors of a composite number is proposed. We use...
Article
The advance in information technology has made video service a market with great commercial value. As an example, in-vehicle infotainment has been introduced to vehicles with which customers can enjoy subscribed media services wherever they are. This paper investigates the authentication in commercial video services using a recently proposed protoc...
Article
Nd–Fe–B permanent magnets with a small amount of Cu nano-particles doping have been prepared by conventional sintered method. Effects of Cu content on magnetic properties, corrosion resistance, and oxidation properties of the magnets have been studied. It shows that the coercivity rises gradually, while the remanence decreases simultaneously with i...
Article
Routing misbehavior and collusion attack in Mobile Ad Hoc Networks (MANETs) are the main topics in this paper. Various techniques prevent routing misbehaviors have been published, but most of them do not consider the collusion attacks. Therefore, we propose the scheme called NACK to simultaneously detect routing misbehavior and collusion attacks, a...
Article
We provide a brief rebuttal of Chang (2012), who suggested that there were flaws in our article, Chen et al. (2011), that deserved further investigation and comment. We believe that these criticisms are unfounded, and offer some additional details related to the intractable discrete elliptic curve discrete logarithm problem to further support the c...
Conference Paper
Time-bound hierarchical key management mechanisms are widely discussed in several environments and applications. Obviously, the collusion attacks are the serious problems in the time-bound hierarchical key management schemes. In the collusion attacks, two or more users assigned to some classes in distinct time periods collude to compute a key to wh...
Conference Paper
Text passwords have been used in authentication systems for many decades. Users must recall the textual strings selected during registration to pass authentication. However, there are some serious problems with text passwords---recollection and security. Hence, various graphical-password authentication systems have been proposed to solve the proble...
Article
The IT OA -office-aid- assets (ex. PC, Telephone … etc.) are required tools for most office workers in an enterprise. The process from ordering to dispatching the composite OA assets for new employees itself is a supply chain within a company. This study aims to save man power, increase process efficiency and resolve the supply chain issues beneath...
Article
Full-text available
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provides better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, t...
Article
Full-text available
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users' passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select weak passwords and reuse the same passwords across different websites. Routinely reusing passwords...
Article
Full-text available
Broadcast is an efficient communication channel on wireless sensor networks. Through authentic broadcast, deployed sensors can perform legitimate actions issued by a base station. According to previous literature, a complete solution for authentic broadcast is digital signature based on asymmetric cryptography. However, asymmetric cryptography util...
Article
In a Universal Mobile Telecommunications System (UMTS), a user equip-ment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the IMS service is trans...
Article
Untraceable electronic cash is an attractive payment tool for electronic-commerce because its anonymity property can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In this paper, several recent untraceable e-cash systems are examined. Most of these provide identity revealing only when the e-cash is dou...
Article
Full-text available
Image vector quantization (VQ) has many current and future envisioned applications, such as digital image and signal compression, watermarking, data hiding, speaker identification. The idea of lossless index coding is to enhance the performance of image VQ by further encoding the index map of the VQ without introducing extra distortion. A novel los...
Conference Paper
Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to affect the decision of base station by compromised nodes. We, therefore, propose a lightweight...
Article
E-forensics investigates and extracts confidential information from electronic products; in other words, the anti- forensics indicates that evidences in those products are imper- ceptible and undetected. This work presents an anti-forensic steganography method that can embed and extract messages from images. Highlight of exploiting modification dir...
Article
As new vulnerabilities on Windows systems are reported endlessly, it is more practical to stop polymorphic malicious code from exploiting these vulnerabilities by building an behavior-based monitor, rather than adopting a signature-based detection system or fixing these vulnerabilities. Many behavior-based monitors have been proposed for Windows sy...
Article
Nd-Fe-B permanent magnets doped with a small amount of praseodymium (Pr) nanoparticles were prepared by conventional sintering method. Effects of the Pr nanoparticles doping amount and the sintering temperature on the magnetic properties of the magnets were studied. As the doping amount increases, the coercivity of the magnets rises gradually, whil...
Article
Full-text available
Security issues become more and more significant in RFID development. Recently, Chien proposed an ultralightweight RFID authentication protocol in order to achieve privacy and authenticity with limited computation and transmission resources. However, we find two desynchronization attacks to break the protocol. In order to repair the protocol, two p...
Conference Paper
Many routing protocols in MANET have been proposed to resist packet dropping attacks by removing suspicious node from route. However, when they cannot discovery who is an adversary, they cannot effectively deal with packet dropping attacks launch by the adversary. In other words, when there is anyone type of packet dropping attacks they cannot resi...
Conference Paper
FLUTE is a file delivery protocol whose operation can only require a unidirectional communication channel from a sender to a receiver. Due to the nature of unidirectional delivery, FLUTE is designed in a flexible way so that it can cooperate with different kinds of forward error correction codes in application layer, such as systematic Raptor codes...
Article
Full-text available
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provide relatively low probabilistic guarantees of authenticity (95 percent for realistic settings). This work presents SPATE, a primitive that allows users to establish trust...
Article
In recent years, wireless sensor networks (WSN) have received a lot of attention and several cryptographic protocols have been proposed to protect WSN. However, it still opens that how to balance authenticity and transmission. For authenticating the message from a sensor, the message is appended a Message Authentication Code (MAC) authenticating it...
Article
Femtocells is an ongoing technology to improve coverage for broadband radios, e.g., WiMAX and 3G. To prevent the core network from unauthorized accesses, a security gateway is designed to protect communications between legal femtocells and the core network. However, there are no integrated solutions to protect subscribers from rogue femtocells. Wit...
Article
Recently, the Pay-TV broadcasting system becomes one of the popular applications because of the advance of modern network technique. The conditional access system is the essential function to provide the channel protection in Pay-TV broadcasting system. It ensures that only the authorized subscribers can precisely receive the TV program and the ser...
Article
Image steganographic schemes based on the least-significant-bit (LSB) replacement method own the character of high capacity and good quality, but they are detected easily by some programs. Pixel-value differencing (PVD) approaches are one kind of methods to pass some program detections, but PVD approaches usually provide lower capacities and larger...
Article
Image Vector Quantization (VQ) has many current applications, like speech and image compression, and envisioned applications, such as digital watermarking, data hiding and speaker identification. Given an image, VQ produce an index map by quantizing the image block by block. Recently, a loss less VQ index compression scheme, called Index Searching...
Article
Nd–Fe–B permanent magnets with a small amount of Dysprosium (Dy) nanoparticles doping were prepared by conventional sintered method, and the microstructure and magnetic properties of the magnets were studied. Investigation shows that the coercivity rises gradually, while the remanence decreases simultaneously with increased Dy doping amount. As a r...
Patent
A method of synthesizing a modulated optical signal using a laser cascaded with an amplitude modulator. A phase drive signal V.sub.F(t) is derived for driving the laser to generate an optical carrier signal with a desired phase .phi.(t). An amplitude drive signal V.sub.S(t) is then derived for driving the amplitude modulator to impose a desired amp...
Article
In this paper, a novel vector quantization (VQ)-based digital image watermarking scheme is proposed which retains high image quality even after embedding. The general scheme of watermarking is to embed a representative digital watermark in the protected image to claim the ownership. The robustness of watermark is important; however, the imperceptib...
Article
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is appli...
Article
In 2007, Kim et al. proposed a secure compression code called the secure arithmetic code (SAC). The code was claimed to be secure against chosen plaintext attacks. However, we find that the SAC is not as secure as the authors have claimed. In this paper, we show the code is prone to two attacks. The first attack completely breaks the code using an...
Patent
A method of suppressing effects of aliasing in a system for digitally processing a high speed signal having a symbol rate of 1/T. The high speed signal is sampled at a fractional multiple (N) of the symbol rate, wherein 1<N<2, to generate a corresponding sample stream, and filtered using a low-pass filter characteristic having a cut-off frequency c...
Conference Paper
Full-text available
DNS cache poisoning attacks have been proposed for a long time. In 2008, Kaminsky enhanced the attacks to be powerful based on nonce query method. By leveraging Kaminsky’s attack, phishing becomes large-scale since victims are hard to detect attacks. Hence, DNS cache poisoning is a serious threat in the current DNS infrastructure. In this paper, we...
Conference Paper
Full-text available
Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usability during comparison, a number of researchers have propo...
Conference Paper
Grouping proof is a security token that proves the existence of multiple RFID tags at the same period of time. In the research field of grouping proof, some of the previous works are vulnerable to replay attack. Others have limitations in operating environments, like readers need to stay connected (on-line) to the server, and tags need to be querie...
Article
Multicast transmission enables a sender to distribute data to multiple intended receivers simultaneously. However, the multicast transmission should be reliable in erasure channel. Forward Error Correction (FEC) enables the lost packets to be recovered from some extra redundant packets without any retransmission. In this paper, we propose a new FEC...
Article
Abstract—The requirements for encrypting multimedia files are very different than general purpose symmetric encryptions. With constraints including low computation power, minimum data size, and resilient to chosen ciphertext attacks, neither common block ciphers like DES/AES nor other stream ciphers are applicable to protect multimedia files. Recen...
Conference Paper
Full-text available
In recent years, as video technologies have been broadly used in TV, communication and multimedia, video security has been gaining in importance. This paper proposes a real-time selective video encryption using context-key control. The new context-key control encryption in this scheme is modified from ElGamal encryption. Using context-key control,...
Conference Paper
Full-text available
In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means userspsila other friendspsila information does not be leaked except their common friends. The authenticity signifies anyone can not successfully claim he is a friend of someone unless he real...
Article
Full-text available
SUMMARY This investigation proposes two methods for embedding backdoors in the RSA modulus N = pq rather than in the public exponent e. This strategy not only permits manufacturers to embed backdoors in an RSA system, but also allows users to choose any desired public exponent, such as e = 216 + 1, to ensure efficient encryption. This work utilizes...
Conference Paper
Full-text available
Random key pre-distribution scheme is a flexible key management scheme for wireless sensor networks. Recently, numerous related studies have been proposed. However, most of them have weaknesses. First of all, sensors require large storage to store keys in order to maintain high connectivity. Secondly, impact caused by compromised sensors cannot be...
Conference Paper
To enlarge the capacity of the hidden secrete, a steganographic approach using modification pixels in conjunction with [1, -1] is proposed in this paper. The underlying concept of our scheme is that 3n variations of modification to n cover pixels correspond 3n possible values of a secret digit; and each secret digit is composed of k-bit binary stri...
Article
In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the e...
Article
Full-text available
In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication purposes. In traditional authentication schemes, with one-to-one delivery, one authentication message per request is delivered from a head end system to subscribers. This results in the delivery of a large quantity of messages and therefore is inefficient...
Conference Paper
Full-text available
Online reviews are widely used for purchase decisions. Their trustworthiness is limited, however, by fake reviews. Fortunately, opinions from friends in a social network are more reliable but less convenient to obtain. Combining the advantages purchase decisions of online reviews and opinions from friends can be achieved by enabling users to recogn...
Article
Full-text available
In this letter the complexity of factoring an alpha-LSBS modulus is analyzed. This gives an improvement on the lower bound of the previous results.
Patent
A method of processing a stream of digital samples of an optical signal received by a coherent optical receiver. The digital sample stream is processed to generate a dispersion compensated sample stream. The dispersion compensated sample stream is then processed to compensate polarization dependent impairments of the optical signal.
Conference Paper
Full-text available
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provide relatively low probabilistic guarantees of authenticity (95% for realistic settings). This work presents SPATE, a primitive that allows users to establish trust via dev...
Article
Recently, Bertino et al. proposed a new time-bound key management scheme for broadcasting. The security of their scheme is planted on the hardness breaking of elliptic curve discrete log problem, HMAC, and tamper-resistance devices. They claimed that as long as the three assumptions hold, their scheme is secure. By means of secure, users cannot acc...
Article
We measured the tolerance to multiple-path interference (MPI) of a dual-polarization QPSK transceiver with coherent detection and real-time digital signal processing. The MPI-induced Q-penalties with coherent detection were compared to those with direct detection.
Article
Full-text available
In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponent d is selected first, the public exponent e should be of the same order of magnitude as phi(N). Sun et al. devised three RSA variants using unbalanced prime factor...
Conference Paper
Forward error correction (FEC) allows the receiver to correct erasure without asking retransmission. This advantage is significant for several applications where retransmission is not available or desirable. In recent years, applying FEC codes to peer-to-peer data distribution networks is an innovation. In this way, the downloader can efficiently r...
Article
Full-text available
As traditional oblivious transfer protocols are treated as a cryptographic primitive, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications such as mental poker playing, some necessary mechanism must...
Article
Full-text available
Recently, Chen et al. and Juang et al. each proposed one and two e-cash payment systems respectively. They claimed that their schemes are secure. However, in this paper, we will present the shortcomings of their schemes and then propose a novel one from pairings. After security analysis and comparison, we conclude that our scheme not only is more s...
Article
Digital watermarking techniques are an importantmethod to provide copyright protection of multimedia. In this paper, we proposed a non-embedded watermarking scheme, based on vector quantization (VQ), to protect the image copyright. Our approach applies a codebook to generate a relationship between image blocks and watermark bits, and then the relat...
Conference Paper
Several applications benefited from multicast data distribution because a sender can concurrently transmit data to multiple receivers using fewer bandwidth. However, reliability is an important issue in multicast because retransmission is not very efficient in multicast. In recent years, Forward Error Correction (FEC) codes are proposed to facilita...
Article
Full-text available
We demonstrate performance monitoring based on the electronic compensation provided within a dual-polarization quadrature-phase-shift-keyed coherent receiver. Measurements were made over an 8 times 100-km system with distributed high polarization-mode-dispersion fiber. A laboratory demonstration of in-service monitoring was completed over a ten-day...
Article
This paper concerns appropriate 3D DRAM architecture design and the potential of using 3D DRAM to implement both L2 cache and main memory in 3D multi-core processor-DRAM integrated computing systems. We first present a coarse-grained 3D partitioning strategy for 3D DRAM design that can well exploit the benefits provided by 3D integration without in...
Article
Full-text available
A digital multisignature is a normal digital signa-ture of a message generated by multiple signers with knowledge of multiple private keys. In this paper, we point out that two CRT-equations can be totally independent in Rebalanced-RSA. This means that we can choose different public exponents when using Rebalanced-RSA. From this point of view, we p...

Network

Cited By