Mingxin Lu’s research while affiliated with Nanjing University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (7)


Intrusion Alerts Correlation Based Assessment of Network Security
  • Article

August 2010

·

11 Reads

·

1 Citation

Jin Shi

·

·

Mingxin Lu

·

Li Xie

Traditional network security assessment technologies are usually qualitative analyses from large variation of security factors. It is difficult to guide security managers to configure network security mechanisms. A new network security quantitative analysis method called ACRL is presented in this paper. It assesses attack sequences from credibility, risk and the loss of system and provides the assessment values to security managers. It can assess the network security mechanisms and measures in position and can help security managers adjust the corresponding security mechanisms and choose the response methods against attacks in detail. An experiment of our method shows favorable and promising results.


Asymmetric encryption and signature method with DNA technology
  • Article
  • Full-text available

March 2010

·

1,321 Reads

·

100 Citations

Science China Information Sciences

·

MingXin Lu

·

Lei Qin

·

[...]

·

Xiwen Fang

This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to conventional public-key cryptology, DNA-PKC uses two pairs of keys for encryption and signature, respectively. Using the public encryption key, everyone can send encrypted message to a specified user, only the owner of the private decryption key can decrypt the ciphertext and recover the message; in the signature scheme, the owner of the private signing key can generate a signature that can be verified by other users with the public verification key, but no else can forge the signature. DNA-PKC differs from the conventional cryptology in that the keys and the ciphertexts are all biological molecules. The security of DNA-PKC relies on difficult biological problems instead of computational problems; thus DNA-PKC is immune from known attacks, especially the quantum computing based attacks.

Download

Figure 1. Subject categories of “e-government” 
Figure and Tables
The widely shared definition of e-Government An exploratory study

November 2009

·

1,475 Reads

·

63 Citations

The Electronic Library

Purpose This paper aims to provide details of a study on the widely shared definition of e‐government and to help scholars – especially young scholars – to understand the scope and meaning of the field. Design/methodology/approach From 1998‐2007, a ten‐year time‐span, 632 articles from the three world‐leading academic databases, including Wiley InterScience, Elsevier ScienceDirect, and SCI Expanded, were retrieved and 324 were analyzed using CATA software (Concordance 3.20), to identify the vocabulary that was used frequently by e‐government scholars. Then the distinct vocabulary was used to construct the widely shared definition of e‐government. Findings In those 324 articles, 57 words generated from the text analysis formed the basis for imputing a widely shared definition of the field of e‐government. The definition was conceptualized by six elements. Research limitations/implications Two limitations of the pool of articles selected may be noted. First, articles were drawn from three leading academic databases in an effort to distinguish e‐government from other fields; but such an approach omitted any consideration of how e‐government definitions varied from different academic fields. Second, because the pool of articles was drawn only from these three, journals excluded by these databases were thus omitted. Originality/value The study is unique in that it discusses the definition of e‐government by an exploratory approach. The universal shared definition extracted could serve as either a screen or a magnet for future research. And the methodology could be applied to several academic fields, including administration and management, library and information science, e‐records management, computer science, etc.


Electronic Government Services Integration Degree: An Empirical Study

November 2008

·

16 Reads

·

3 Citations

The initiative and development of e-Government (e-Gov) is a kind of national strategy and a systemic engineering. As a way to locate its progress, the evaluation to e-Gov platforms, Web sites, and service capabilities is critical and meaningful for their further development deeply. However, the studies in service capability evaluation also need more efforts. This article proposes the conception of 'e-Gov service integration degree (EGSID)' firstly, which is used to describe the density of e-Gov services. And then, the evaluation theory and method are discussed. Continuously, the progresses of Chinese local e-Gov Web sites are surveyed to examine the suitability of the method. Finally, as a result of byproduct, the paper reports the analysis of EGSID and other related themes, such as the relation between EGSID and users' satisfaction. The method and results are likely to benefit administrative policy makers, government agencies and information system designers.


Symmetric-key cryptosystem with DNA technology

June 2007

·

176 Reads

·

77 Citations

Science in China Series F Information Sciences

DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.


Fig. 1. Directed graph.  
Fig. 2. Ligation reaction.  
Fig. 3. Sticker model.  
Fig. 4. Steganography method.  
New field of cryptography: DNA cryptography

June 2006

·

5,203 Reads

·

205 Citations

Chinese Science Bulletin

DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information density inherent in DNA molecules are explored for cryptographic purposes such as encryption, authentication, signature, and so on. In this paper, we briefly introduce the biological background of DNA cryptography and the principle of DNA computing, summarize the progress of DNA cryptographic research and several key problems, discuss the trend of DNA cryptography, and compare the status, security and application fields of DNA cryptography with those of traditional cryptography and quantum cryptography. It is pointed out that all the three kinds of cryptography have their own advantages and disadvantages and complement each other in future practical application. The current main difficulties of DNA cryptography are the absence of effective secure theory and simple realizable method. The main goal of the research of DNA cryptography is exploring characteristics of DNA molecule and reaction, establishing corresponding theories, discovering possible development directions, searching for simple methods of realizing DNA cryptography, and laying the basis for future development.


Citations (6)


... The mixing of truly threatening information and the mass of useless information causes the decision making difficult. Consequently, direct response to particular attack without any assessment on alerts itself as well as network in overall will create a lot of false positive and false negative notification (Jawdekar, Richariya, & Richariya, 2012; Sendi et al., 2012; Shi, Hu, Lu, & Xie, 2010). This shortage has become a strong motivation for us to design a current network security situation assessment module for IPS based on the threats assessment on every single asset in the network. ...

Reference:

A Framework for Analytic Hierarchy Process-Entropy Network Security Situation Assessment and Adaptive Grey Verhulst-Kalman Prediction in Intrusion Prevention System
Intrusion Alerts Correlation Based Assessment of Network Security
  • Citing Article
  • August 2010

... By creating hydrogen bonds with one another to keep the two strands of DNA connected, the structure of DNA strands. While C and G create bonds with one another, A makes a hydrogen bond with T [32]. Before 1994, it was thought that DNA exclusively contained biological information. ...

New field of cryptography: DNA cryptography

Chinese Science Bulletin

... The highest layer is the representation layer, representing content service capabilities (CSCs) (Hu, Pan, Lu, & Wang, 2008;Hu, Zhong, & Mei, 2008). On one hand, CSCs are the capabilities that enable public servants to provide satisfying services to citizens. ...

Electronic Government Services Integration Degree: An Empirical Study
  • Citing Conference Paper
  • November 2008

... First, e-government is an umbrella term for issues related to the use of digital technologies by governments. Considering that e-government can be applied for various purposes and has multiple forms of potential, it encompasses a broad range of dimensions and is open to diverse definitions or frames (Alcaide-Muñoz et al. 2017;Bekkers 2012;Hu et al. 2009;Twizeyimana and Andersson 2019;Yildiz 2007). Second, e-government stakeholders always attempt to embed their interests in designing and implementing e-government projects with discourses and policies (Azad and Faraj 2011). ...

The widely shared definition of e-Government An exploratory study

The Electronic Library

... Rights reserved. MingXin et al. [47] DNA Symmetric-Key Cryptosystem (DNASC) DNA Computing were used for the generation of encryption and decryption keys. The encryption process involves specially designed DNA chip fabrication, and the decryption process uses DNA hybridization festal and substitution permutation architectural methods to improve the algorithm's efficiency. ...

Symmetric-key cryptosystem with DNA technology
  • Citing Article
  • June 2007

Science in China Series F Information Sciences

... To address the issue of data hiding, numerous cryptographic techniques based on DNA have been presented. For example, the method suggested in [23] combines genetic engineering with cryptology technology to create an asymmetric encryption and signature cryptosystem. This approach is an investigation into biological cryptology. ...

Asymmetric encryption and signature method with DNA technology

Science China Information Sciences