Mingxin Lu's research while affiliated with Nanjing University and other places

Publications (7)

Article
Traditional network security assessment technologies are usually qualitative analyses from large variation of security factors. It is difficult to guide security managers to configure network security mechanisms. A new network security quantitative analysis method called ACRL is presented in this paper. It assesses attack sequences from credibility...
Article
Full-text available
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to conventional public-key cryptology, DNA-PKC uses two pairs of keys for encryption and signature, respectively. Using the public encry...
Article
Full-text available
Purpose – This paper aims to provide details of a study on the widely shared definition of e-government and to help scholars – especially young scholars – to understand the scope and meaning of the field. Design/methodology/approach – From 1998-2007, a ten-year time-span, 632 articles from the three world-leading academic databases, including Wiley...
Conference Paper
The initiative and development of e-Government (e-Gov) is a kind of national strategy and a systemic engineering. As a way to locate its progress, the evaluation to e-Gov platforms, Web sites, and service capabilities is critical and meaningful for their further development deeply. However, the studies in service capability evaluation also need mor...
Article
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys ar...
Article
Full-text available
DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information density inherent in DNA molecules are explored for cryptographic purposes such as encryptio...

Citations

... The mixing of truly threatening information and the mass of useless information causes the decision making difficult. Consequently, direct response to particular attack without any assessment on alerts itself as well as network in overall will create a lot of false positive and false negative notification (Jawdekar, Richariya, & Richariya, 2012; Sendi et al., 2012; Shi, Hu, Lu, & Xie, 2010). This shortage has become a strong motivation for us to design a current network security situation assessment module for IPS based on the threats assessment on every single asset in the network. ...
... Rather than implementing it at a molecular level, researchers have preferred DNA coding to carry the information in digital form and manipulate it using the corresponding feasible DNA operations. It has induced a new way of concealing the information through DNA microdots [15] and subsequently following this development, Gehani [16], Xiao [17] and Kang [18] too presented the new perspectives of information hiding using the DNA concepts. Optical transforms and DNA encoding/operations do not offer nonlinearity therefore solely are not suitable to develop secure encryption systems as per Shanon's criterion. ...
... The highest layer is the representation layer, representing content service capabilities (CSCs) (Hu, Pan, Lu, & Wang, 2008;Hu, Zhong, & Mei, 2008). On one hand, CSCs are the capabilities that enable public servants to provide satisfying services to citizens. ...
... 23). DG does not have one settled definition; extracting the "perfect" one emerges as a scientific activity on its own [3], and circulating definitions vary in terms of scope-from information supply to e-democracy; subject-from citizens to all public stakeholders; and technology family-from personal computers to the Internet [4] (p. 9). To make things worse, DG is also called by various synonyms or near synonyms, such as "electronic government," "electronic governance," "transformational government," and others. ...
... Going forward, [13] proposed another cryptosystem based on the manipulation of DNA binary strands. Other symmetric and asymmetric cryptosystems were proposed later [22], [23]. The Playfair algorithm is symmetric encryption based on substitution technique. ...
... DNA coding has several inherent properties such as vast storage and massive parallelism. [3], [4]. ...