Learn More
Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This posts a great challenge for effectively utilizing cloud data, such as executing common SQL queries. A variety of searchable(More)
Secure initial trust establishment for multiple resource constrained devices is a fundamental issue underlying wireless networks. A number of protocols have been proposed for secure key deployment among nodes without prior shared secrets (ad hoc), however so far most of them rely on secure out-of-band (OOB) channels (e.g., audio, visual) which either only(More)
Traditional video coding method is able to achieve wonderful performance in data compressing. However, it has high complexity, which is not suitable for some environments where low complexity coding is needed. A new method of video coding which is based on compressive sensing is proposed. In this system, the sparsity of residual of successive frames is(More)
Wireless Body Area Networks (BANs) demand for highly robust communication due to the criticality and time-sensitivity of the medical monitoring data. However, as BANs will be widely deployed in densely populated areas, they inevitably face the RF cross-technology interference (CTI) from non-protocol-compliant wireless devices operating in the same spectrum(More)
With searchable encryption, a data user is able to perform meaningful search on encrypted data stored in the public cloud without revealing data privacy. Besides handling simple queries (e.g., keyword queries), complex search functions, such as multi-dimensional (conjunc-tive) range queries, have also been studied in several approaches to support the search(More)
This paper explores a new paradigm for the coexistence among heterogeneous multi-hop networks in unplanned deployment settings, called cooperative interference mitigation (CIM). CIM exploits recent advancements in physical layer technologies such as technology-independent multiple output (TIMO), making it possible for disparate networks to cooperatively(More)
—This paper explores a new paradigm for the coexistence among heterogeneous multi-hop networks in unplanned deployment settings, called cooperative cross-technology interference mitigation (CIM). CIM exploits recent advancements in physical layer technologies such as technology-independent interference cancellation (TIIC), making it possible for disparate(More)
MIMO is an emerging technology which can substantially increase the link capacity of wireless communications. MIMO has also been shown to enhance the throughput in the coexistence of heterogeneous wireless networks due to its capability of performing spatial-multiplexing (SM) and interference cancellation (IC). Practical protocols such as 802.11n+ have been(More)
Physical layer message integrity protection and authentication by countering signal-cancellation has been shown as a promising alternative to traditional pure cryptographic message authentication protocols, due to the non-necessity of neither pre-shared secrets nor secure channels. However, the security of such an approach remained an open problem due to(More)