Mingxin Lu's research while affiliated with Nanjing University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (7)
Traditional network security assessment technologies are usually qualitative analyses from large variation of security factors. It is difficult to guide security managers to configure network security mechanisms. A new network security quantitative analysis method called ACRL is presented in this paper. It assesses attack sequences from credibility...
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic
engineering and cryptology. It is an exploratory research of biological cryptology. Similar to conventional public-key cryptology,
DNA-PKC uses two pairs of keys for encryption and signature, respectively. Using the public encry...
Purpose – This paper aims to provide details of a study on the widely shared definition of e-government and to help scholars – especially young scholars – to understand the scope and meaning of the field. Design/methodology/approach – From 1998-2007, a ten-year time-span, 632 articles from the three world-leading academic databases, including Wiley...
The initiative and development of e-Government (e-Gov) is a kind of national strategy and a systemic engineering. As a way to locate its progress, the evaluation to e-Gov platforms, Web sites, and service capabilities is critical and meaningful for their further development deeply. However, the studies in service capability evaluation also need mor...
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key
cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred
to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys ar...
DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information
carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information
density inherent in DNA molecules are explored for cryptographic purposes such as encryptio...
Citations
... The mixing of truly threatening information and the mass of useless information causes the decision making difficult. Consequently, direct response to particular attack without any assessment on alerts itself as well as network in overall will create a lot of false positive and false negative notification (Jawdekar, Richariya, & Richariya, 2012; Sendi et al., 2012; Shi, Hu, Lu, & Xie, 2010). This shortage has become a strong motivation for us to design a current network security situation assessment module for IPS based on the threats assessment on every single asset in the network. ...
... Rather than implementing it at a molecular level, researchers have preferred DNA coding to carry the information in digital form and manipulate it using the corresponding feasible DNA operations. It has induced a new way of concealing the information through DNA microdots [15] and subsequently following this development, Gehani [16], Xiao [17] and Kang [18] too presented the new perspectives of information hiding using the DNA concepts. Optical transforms and DNA encoding/operations do not offer nonlinearity therefore solely are not suitable to develop secure encryption systems as per Shanon's criterion. ...
... The highest layer is the representation layer, representing content service capabilities (CSCs) (Hu, Pan, Lu, & Wang, 2008;Hu, Zhong, & Mei, 2008). On one hand, CSCs are the capabilities that enable public servants to provide satisfying services to citizens. ...
... 23). DG does not have one settled definition; extracting the "perfect" one emerges as a scientific activity on its own [3], and circulating definitions vary in terms of scope-from information supply to e-democracy; subject-from citizens to all public stakeholders; and technology family-from personal computers to the Internet [4] (p. 9). To make things worse, DG is also called by various synonyms or near synonyms, such as "electronic government," "electronic governance," "transformational government," and others. ...
... Going forward, [13] proposed another cryptosystem based on the manipulation of DNA binary strands. Other symmetric and asymmetric cryptosystems were proposed later [22], [23]. The Playfair algorithm is symmetric encryption based on substitution technique. ...
... DNA coding has several inherent properties such as vast storage and massive parallelism. [3], [4]. ...