Yunfang Feng

Learn More
although the online business-to-consumer (B2C) channel is the primary selling channel for digital content (e.g., videos, images, and music), modern digital technology has made possible the legal dissemination of such content over the consumer-to-consumer (C2C) channel through personal computing devices, such as PCs, mobile phones, and portable media(More)
  • Yunfang Feng
  • 2007 International Conference on Computational…
  • 2007
In MANET, trust management is an effective measure of interoperation and collaboration. The authorization decisions to collaborate with a stranger are often tackled by two different trust management systems: a policy-based approach, where authorization decisions are built on logical rules and verifiable properties encoded in signed credentials, and a(More)
Lack of online trusted dealer and group membership dynamics make the membership control become a challenging task in wireless ad hoc network. Based on the threshold cryptography (and verifiable secret sharing), we propose a secure membership control scheme using a new threshold signature based on the RSA variant. Compared with other proposed solutions based(More)
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID- based threshold signature scheme, which has three attractive properties: (1) The user's co-signing(More)
The group membership dynamics and the lack of online trusted dealer make the secure membership control become an open challenge in ad hoc groups. The paper proposes a secure and efficient ID-based membership control scheme, which is non-interactive and verifiable in GMC issuance. Compared with other proposed solutions, the verifiability is only achieved in(More)
  • 1