Zongjian He

Learn More
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN(More)
A dvances in telecommunication and carrier network technologies have significantly improved the ubiq-uity of wireless communication. More and more devices are becoming connected to each other and to the Internet. Applying telecommunication technologies to the vehicular scenario allows vehicles to connect to the cloud, roadside units (RSUs), and ambient(More)
—Network virtualization in cloud computing environment has attracted many attentions recently. With the help of network virtualization, VMM is able to provide fine-grained isolation among different VMs. However, the performance and overhead introduced by network virtualization is also important concerns when applying network virtualization to the cloud(More)
Seat-level positioning of a smartphone in a vehicle can provide a fine-grained context for many interesting in-vehicle applications, including driver distraction prevention, driving behavior estimation, in-vehicle services customization, etc. However, most of the existing work on in-vehicle positioning relies on special infrastructures, such as the stereo,(More)
Security and privacy are both fundamental requirements of vehicular networking applications. Existing anonymous authentication protocols entail serious performance issues due to serialized verification operations. This paper presents an efficient anonymous authentication protocol based on signature with message recovery. Different from existing solutions,(More)