Xuefeng Zheng

Learn More
Feature subset selection, as an important processing step to knowledge discovery and machine learning, is effective method in reducing irrelevant and or redundant features, compressing repeated data, and improving classification accuracy. Rough set theory is an important tool to select feature subset from high-dimensional data. In this work, feature subset(More)
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-Hellman are getting more and more unsafe, and elliptic curve cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides elliptic curve cryptosystem into several(More)
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key(More)
Secure routing is the key to assure wireless sensor networks working in order, and the classical security mechanisms, such as encryption and authentication can only prevent the outside attacks. In order to defeat the attacks of the inside malicious or captured nodes, in this paper, the trust technology and node¿s location information are employed in the(More)
— An emerging internet based super computing model is represented by cloud computing. Cloud computing is the convergence and evolution of several concepts from virtualization, distributed storage, grid, and automation management to enable a more flexible approach for deploying and scaling applications. However, cloud computing moves the application software(More)
Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is difficult on many networks: either the volume of data is so large as to make packet inspection intractable,(More)
In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources / services against security infringements. Based on analysis of current cloud computing security characteristics, the preamble of the concept of trust, role-based access control policy, combined with the characteristics of the cloud(More)
In this paper, the security of electronic commerce and the security methods are introduced firstly. Then, the history of Java security architecture and its design principles are described. After that, partial implementation of elliptic curve cryptosystem developed with Java is discussed. In the end, the advantages of electronic commerce systems developed(More)
Given signatures on distinct messages from n distinct users, aggregate signature scheme is possible to aggregate all these signature into a single short signature. In this paper, we propose an identity-based aggregate signature scheme which requires constant pairing operations in the verification. We prove that the proposed signature scheme is secure(More)
In order to decrease unfair evaluations to service peers in peer-to-peer network, a trust model based on the declaration of preference is proposed in this paper, which considers the similarity between two peers' preferences. The trust model gives the declaration of preference, and proposes algorithms to carry out the computations. Experiments show that our(More)