Bangdao Chen

Learn More
The Internet of Things (IoT) is a network of objects; it is enabled by the Internet technologies. The IoT always collects sensitive data, but inadequate protection may lead to serious user privacy leakage. Thus, privacy protection functions are important to the IoT. Our research aims to provide better privacy protections to IoTs. Firstly, user controlled(More)
Body sensor networks enable many interesting applications. In these applications, sensor networks always collect sensitive information, thus security is significant. Since most security mechanisms are based on identities and keys, we propose a human controlled LED-camera channel based hash key before knowledge identity and key distribution protocol. The(More)
A new family of protocols, based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. These protocols are particularly suitable for authentication on mobile phones where PKI or trusted third party solutions are not practical to cover all scenarios. Rather, individuals are able(More)
In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this.
Photomechanical nanocomposites embedded with light-absorbing nanoparticles show promising applications in photoresponsive actuations. Near infrared (nIR)-responsive nanocomposites based photomechanical soft actuators can offer lightweight functional and underexploited entry into soft robotics, active optics, drug delivery, etc. A novel graphene-based(More)
New families of protocol, based on communication over human-based side channels , permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the(More)