Achieving secure service sharing over IP networks

Paper


Lai, David, Zhang, Zhongwei and Shen, Chong. 2006. "Achieving secure service sharing over IP networks." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.
Paper/Presentation Title

Achieving secure service sharing over IP networks

Presentation TypePaper
AuthorsLai, David (Author), Zhang, Zhongwei (Author) and Shen, Chong (Author)
EditorsLi, Hong
Journal or Proceedings TitleProceeding of the ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006)
Number of Pages14
Year2006
Place of PublicationNew York, USA
Conference/EventASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006)
Event Details
ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006)
Event Date
28 to end of 29 Apr 2006
Event Location
New York, United States
Abstract

[Abstract]: No matter how many and how comprehensive the services a network can provide, in order to satisfy the diverse requirement of services, networks should share services among themselves. For secure service sharing on IP networks, the authenticity of users and the scalability of participating networks are always two major issues among others. Service Network Graph (SNG) was proposed to address the problems of cross network authentication and scalability, which usually occur in a dynamic aggregations of heterogeneous networks.

Our SNG approach is based on Authentication Propagation and Service Paths. Authentication Propagation is a process of relaying authentication results from the authenticating network to the service providing network. Within an SNG, networks delegate authentication duties to some other networks which gather all authentication and service information and return the authentication result to the user. A Service Path is designed to hold all the authentication delegation information from the user's home network to the service providing network. An example of Service Path in a network, N_x, looks like:<F:/N_x/N_y/N_z/S_z/Service_z>:<4> where the second field, /N_x/N_y/N_z/S_z/Service_z, stands for the NetworkPath of a service, Service_z, which is provided by a server S_z, in a network N_z. We can work out the routes for the authentication and service information from the NetworkPath as

(1) from N_x to N_y if it does not end at N_x;
(2) from N_y to N_z if it does not originate from N_z;
(3) from N_z to N_y if it does not end at N_x; and
(4) from N_y to N_x if it does not originate from N_x.

These routes can be represented in the 4-tuples form:
(<Net_{ori}>,<Net_{from}>,<Net_{to}>,<Net_{dest}>)
To differentiate route (2) and route (4), <Net_ori> is used. Route (1) can be expressed as (Net_x, Net_x, Net_y, Net_z) using the 4-tuple notation. Obviously, it is not efficient to extract the routes from incoming Service Paths each and every time. Besides, the NetworkPath field may contain a substantial number of networks. Hence reusing the routes could improve the efficiency. The 4-tuple notation facilitates the reuse of routing information.

In this paper, we devise a 4-tuple (ATR tuple) representation of authentication and service information routes. The ATR tuple representation is shown to be an alternative representation of SNG other than the graphical representation. We also explore how the ATR tuple representation can be applied to facilitate the authentication propagation process. A set of experiments on network simulator, OMNeT++, have been carried out to illustrate the application of SNG with ATR tuples to IP networks. The preliminary simulation results show that the ATR tuple representation greatly simplifies the implementation of the SNG authentication routing algorithm, and secure service sharing can be achieved as well.

KeywordsService Network Graph, SNG, service sharing, authentication delegation, authentication propagation, service path, routing tuple
ANZSRC Field of Research 2020460609. Networking and communications
Public Notes

No evidence of copyright restrictions.

Byline AffiliationsDepartment of Mathematics and Computing
Permalink -

https://research.usq.edu.au/item/9z2vx/achieving-secure-service-sharing-over-ip-networks

Download files


Accepted Version
Lai_Zhang_Shen_ASEE_2006_AV.pdf
File access level: Anyone

  • 1982
    total views
  • 200
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

Challenges of using tibia bone ash and toe ash as biomarkers of phosphorus nutrition for meat chickens
Li. X.H., Zou. Z. W., Zhang, Z.W., Zhang. D.G., Huang. K. H. and Bryden, W.. 2024. "Challenges of using tibia bone ash and toe ash as biomarkers of phosphorus nutrition for meat chickens." Journal of Applied Animal Nutrition. (12), pp. 40-54.
Routing Protocol for Healthcare Applications Data Over the 6LoWPAN-based Wireless Sensor Networks
Zhang, Zhongwei, Hu, Hong and Hu, Xiaohua. 2023. "Routing Protocol for Healthcare Applications Data Over the 6LoWPAN-based Wireless Sensor Networks." Howlett, R. (ed.) 27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems (KES 2023). Athens, Greece 04 - 08 Sep 2023 https://doi.org/10.1016/j.procs.2023.10.206
On Standards for Wireless Sensor Networks in the Application of Structural Health Monitoring
Edge, Peter, Zhang, Zhongwei and Akarinejad, Hossein. 2023. "On Standards for Wireless Sensor Networks in the Application of Structural Health Monitoring." 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). Las Vegas, United States 24 - 27 Jul 2023 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CSCE60160.2023.00440
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708
An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.
Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373
A framework of developing health care application systems using 6LoWPAN based wireless sensor networks
Zhang, Zhongwei, Wang, Jianxiong and Hu, Xiaohua. 2020. "A framework of developing health care application systems using 6LoWPAN based wireless sensor networks." Ever, Enver and Al-Turjman, Fadi (ed.) 1st EAI International Conference on Forthcoming Networks and Sustainability in the IoT Era. Turkey 01 - 02 Oct 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-69431-9_12
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738
Software Defined Networking Managed Hybrid IoT as a Service
Edge, Peter, Davar, Zara and Zhang, Zhongwei. 2019. "Software Defined Networking Managed Hybrid IoT as a Service." Makhijani, Kiran (ed.) Fifteenth International Conference on Networking and Services (ICNS 2019). Athens, Greece 02 - 06 Jun 2019 Wilmington, United States.
Mathematical Modelling for Optimally Allocating the Medical and Health Supplies Reserve in Hainan Province
Hu, Xiao-hua, Bayanmunkh, Bolormaa and Zhang, Zhong-wei. 2020. "Mathematical Modelling for Optimally Allocating the Medical and Health Supplies Reserve in Hainan Province." Chinese Journal of Engineering Mathematics. 37 (3), pp. 335-346. https://doi.org/10.3969/j.issn.1005-3085.2020.03.008
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490
Application of generalized intervention analysis model
Hu, Xiaohua and Zhang, Zhongwei. 2019. "Application of generalized intervention analysis model." Scholars Journal of Economics, Business and Management. 6 (1), pp. 17-23. https://doi.org/10.21276/sjebm.2019.6.1.4
Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902
Low power wide area networks: a survey of enabling technologies, applications and interoperability needs
Qadir, Qahhar Muhammad, Rashid, Tarik A., Al-Salihi, Nawzad K., Ismael, Birzo, Kist, Alexander A. and Zhang, Zhongwei. 2018. "Low power wide area networks: a survey of enabling technologies, applications and interoperability needs." IEEE Access. 6, pp. 77454-77473. https://doi.org/10.1109/ACCESS.2018.2883151
An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
Sahi, Aqeel, Lai, David, Li, Yan and Diykh, Mohammed. 2017. "An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment ." IEEE Access. 5, pp. 6036-6048. https://doi.org/10.1109/ACCESS.2017.2688460
An energy efficient TCP DoS attacks mitigation method in cloud computing
Sahi, Aqeel, Lai, David and Li, Yan. 2017. "An energy efficient TCP DoS attacks mitigation method in cloud computing." Al-Jumaily, Adel Ali, Barifcani, Ahmed and Al-Jumaily, Ahmed (ed.) 1st MoHESR and HCED Iraqi Scholars Conference in Australasia 2017 (ISCA 2017). Melbourne, Australia 05 - 06 Dec 2017 Melbourne, Australia.
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan
Sahi, Aqeel, Lai, David and Li, Yan. 2016. "Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan." Computers in Biology and Medicine. 78, pp. 1-8. https://doi.org/10.1016/j.compbiomed.2016.09.003
A quality of experience-aware cross-layer architecture for optimizing video streaming services
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2016. "A quality of experience-aware cross-layer architecture for optimizing video streaming services." Computer Networks. 102, pp. 38-49. https://doi.org/10.1016/j.comnet.2016.02.030
Data selection in EEG signals classification
Wang, Shuaifang, Li, Yan, Wen, Peng and Lai, David. 2016. "Data selection in EEG signals classification." Physical and Engineering Sciences in Medicine. 39 (1), pp. 157-165. https://doi.org/10.1007/s13246-015-0414-x
IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems
Zhang, Zhongwei. 2014. "IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems." Grana, Manuel, Toro, Carlos, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 2nd KES International Conference on Innovation in Medicine and Healthcare (InMed 2014): Smart Medical and Healthcare Systems. San Sebastian, Spain 09 - 11 Jul 2014 Amsterdam, Netherlands. https://doi.org/10.3233/978-1-61499-474-9-125
QoE-aware cross-layer architecture for video traffic over internet
Qadir, Safeen, Kist, Alexander A. and Zhang, Zhongwei. 2014. "QoE-aware cross-layer architecture for video traffic over internet." 2014 IEEE Region 10 International Conference (TENCON 2014). Kuala Lumpur, Malaysia 14 - 16 Apr 2014 United States. https://doi.org/10.1109/TENCONSpring.2014.6863089
Parallel encryption mode for probabilistic scheme to secure data in the cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2015. "Parallel encryption mode for probabilistic scheme to secure data in the cloud." 10th International Conference on Information Technology and Applications (ICITA 2015). Sydney, Australia 01 - 04 Jul 2015 Australia.
Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Khader, Aqeel Sahi and Lai, David. 2015. "Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124683
Optimization of quality of experience for video traffic
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "Optimization of quality of experience for video traffic." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124720
The probability relationship between video’s instantaneous and average aggregate rates
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2016. "The probability relationship between video’s instantaneous and average aggregate rates." Multimedia Tools and Applications. 75 (12), pp. 6909-6924. https://doi.org/10.1007/s11042-015-2617-2
A novel traffic rate measurement algorithm for quality of experience-aware video admission control
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "A novel traffic rate measurement algorithm for quality of experience-aware video admission control." IEEE Transactions on Multimedia. 17 (5), pp. 711-722. https://doi.org/10.1109/TMM.2015.2416637
Mechanisms for QoE optimisation of video traffic: a review paper
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "Mechanisms for QoE optimisation of video traffic: a review paper." Australasian Journal of Information, Communication Technology and Applications. 1 (1), pp. 1-18.
Numerical terrain modelling for wireless underground sensor networks: a protoype for nut tree plantations
Parameswaran, Vinod, Zhang, Zhongwei and Zhou, Hong. 2014. "Numerical terrain modelling for wireless underground sensor networks: a protoype for nut tree plantations." Postalache, Octavian, Jayasundera, Krishanthi P., Korostynska, Olga, Mason, Alex and Mukhopadhyay, Subhas (ed.) 8th International Conference on Sensing Technology (ICST 2014). Liverpool, United Kingdom 02 - 04 Sep 2014 New Zealand.
Wireless underground sensor network design for irrigation control: simulation of RFID deployment
Parameswaran, Vinod, Zhou, Hong and Zhang, Zhongwei. 2013. "Wireless underground sensor network design for irrigation control: simulation of RFID deployment." Mason, A., Jayasundera, K. P. and Mukhopadhyay, S. C. (ed.) 7th International Conference on Sensing Technology (ICST 2013). Wellington, New Zealand 03 - 05 Dec 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICSensT.2013.6727770
ZigBee based wireless sensor networks and their use in medical and health care domain
Zhang, Zhongwei and Hu, Xiaohua. 2013. "ZigBee based wireless sensor networks and their use in medical and health care domain." Mason, A., Jayasundera, K. P. and Mukhopadhyay, S. C. (ed.) 7th International Conference on Sensing Technology (ICST 2013). Wellington, New Zealand 03 - 05 Dec 2013 Wellington, New Zealand. https://doi.org/10.1109/ICSensT.2013.6727754
Modeling performance of CSMA/CA with retransmissions in wireless personal area networks
Zhang, Zhongwei. 2013. "Modeling performance of CSMA/CA with retransmissions in wireless personal area networks." International Journal of Networked and Distributed Computing. 1 (2), pp. 97-107. https://doi.org/10.2991/ijndc.2013.1.2.4
Irrigation control using wireless underground sensor networks
Parameswaran, Vinod, Zhou, Hong and Zhang, Zhongwei. 2012. "Irrigation control using wireless underground sensor networks." 6th International Conference on Sensing Technology (ICST 2012). Kolkata, India 18 - 21 Dec 2012 Piscataway, NJ. United States. https://doi.org/10.1109/ICSensT.2012.6461760
Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment
Zhang, Zhongwei and Zhou, Hong. 2012. "Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment." Hochin, Teruhisa and Lee, Rodger (ed.) 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012). Kyoto, Japan 08 - 10 Aug 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2012.103
Distance education platform for effective learning in computer networking courses
Lai, David, Venkatakrishnan, Vijayakrishnan and Li, Yan. 2012. "Distance education platform for effective learning in computer networking courses." Wang, Chih-Chien (ed.) 2012 International Conference on Applied and Theoretical Information Systems Research (ATISR 2012). Taipei, Taiwan 10 - 12 Feb 2012 Taipei, Taiwan.
Examining QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2011. "Examining QoS guarantees for real-time CBR services in broadband wireless access networks." Lee, Roger (ed.) Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Berlin, Germany. Springer. pp. 25-40
A novel secure routing protocol for MANETs
Zhang, Zhongwei. 2011. "A novel secure routing protocol for MANETs." Wang, Xin (ed.) Mobile ad-hoc networks: protocol design. Rijeka, Croatia. In-Tech. pp. 455-466
A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains
Zhang, Zhongwei and Zhou, Hong. 2011. "A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains." Chowdhury, Morshed, Ray, Sid and Lee, Roger (ed.) 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011). Sydney, Australia 06 - 08 Jul 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2011.32
Supporting secure services on dynamic aggregation of heterogeneous networks
Lai, David Tai Wai. 2010. Supporting secure services on dynamic aggregation of heterogeneous networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
An intelligent scheme of secure routing for mobile ad hoc networks
Zhang, Zhongwei. 2009. "An intelligent scheme of secure routing for mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813739
A robust ensemble classification method analysis
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "A robust ensemble classification method analysis." Arabnia, Hamid R. (ed.) Advances in computational biology. New York, NY. United States. Springer. pp. 149-155
A coupled fuzzy logic control for routers' queue management over TCP/AQM networks
Li, Zhi and Zhang, Zhongwei. 2005. "A coupled fuzzy logic control for routers' queue management over TCP/AQM networks." Khosla, Rajiv, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005). Melbourne, Australia 14 - 16 Sep 2005 Berlin, Germany.
A hybrid wired and wireless network infrastructure to improve the productivity and quality care of critical medical applications
Zhou, Hong, Ali, Hesham, Youn, Jon and Zhang, Zhongwei. 2010. "A hybrid wired and wireless network infrastructure to improve the productivity and quality care of critical medical applications." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558842
Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439
On the effectiveness of gene selection for microarray classification methods
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "On the effectiveness of gene selection for microarray classification methods." Nguyen, Ngoc Thanh, Le, Manh Thanh and Swiatek, Jerzy (ed.) 2nd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010). Hue City, Vietnam 24 - 26 Mar 2010 Heidelberg, Germany. https://doi.org/10.1007/978-3-642-12101-2_31
Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks
Zhou, Hong and Zhang, Zhongwei. 2009. "Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks." Martini, Maria and Politis, Christos (ed.) 5th International ICST Mobile Multimedia Communications Conference (MobiMedia'09). London, United Kingdom 07 - 09 Sep 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.MOBIMEDIA2009.7438
Empirical examination of mobile ad hoc routing protocols on wireless sensor networks
Zhang, Zhongwei and Zhou, Hong. 2009. "Empirical examination of mobile ad hoc routing protocols on wireless sensor networks." International Journal of Computer Networks and Communications. 1 (1), pp. 75-87.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Understanding and enlivening AQM workings using computer simualtion
Shen, Chong, Zhang, Zhongwei and Lai, David. 2006. "Understanding and enlivening AQM workings using computer simualtion." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.
Efficient information propagation in service routing for next generation network
Lai, David and Zhang, Zhongwei. 2009. "Efficient information propagation in service routing for next generation network." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Berlin, Germany. https://doi.org/10.1007/978-3-642-02962-2_43
Integrated key exchange protocol capable of revealing spoofing and resisting dictionary attacks
Lai, David and Zhang, Zhongwei. 2004. "Integrated key exchange protocol capable of revealing spoofing and resisting dictionary attacks." Xue, Li, Zhou, JiangYing, Yung, Moti and Jakobsson, Markus (ed.) 2nd International Conference, Applied Cryptography and Network Security ACNS 2004. Yellow Mountain, China 08 - 11 Jun 2004 China.
Service re-routing for service network graph: efficiency, scalability and implementation
Lai, David and Zhang, Zhongwei. 2009. "Service re-routing for service network graph: efficiency, scalability and implementation." International Journal of Computer Networks and Communications. 1 (1), pp. 46-59.
An active approach to multimedia network management
Zhang, Zhongwei and Lai, David. 2005. "An active approach to multimedia network management." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.
Decentralized management of multimedia network using active network technology
Zhang, Zhongwei and Lai, David. 2005. "Decentralized management of multimedia network using active network technology." WSEAS Transactions on Communications. 4 (7), pp. 325-333.
Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network
Jin, Lu, Zhang, Zhongwei and Lai, David. 2006. "Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network." Powell, Steven (ed.) 5th Annual Wireless Telecommunication Symposium (WTS2006). Pomona, United States 27 - 29 Apr 2006 Pomona, California, USA.
Secure service sharing over networks for mobile users using service network graphs
Lai, David and Zhang, Zhongwei. 2006. "Secure service sharing over networks for mobile users using service network graphs." Powell, Steven (ed.) 5th Annual Wireless Telecommunication Symposium (WTS2006). Pomona, United States 27 - 29 Apr 2006 Pomona, California, USA.
Network service sharing infrastructure: service authentication and authorization revocation
Lai, David and Zhang, Zhongwei. 2005. "Network service sharing infrastructure: service authentication and authorization revocation." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.
An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks
Lai, David and Zhang, Zhongwei. 2005. "An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks." WSEAS Transactions on Communications. 4 (8), pp. 537-547.
A unified approach to ameliorate active queue management of network routers
Zhang, Zhongwei, Lai, David and Suthaharan, Shan. 2005. "A unified approach to ameliorate active queue management of network routers." Ohta, Naohisa (ed.) 2005 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2005). Hong Kong, China 13 - 16 Dec 2005 New York, United States.
Self-authentication of encrypted channels in service network graph
Lai, David and Zhang, Zhongwei. 2008. "Self-authentication of encrypted channels in service network graph." Cao, Jiang, Li, Minglu, Weng, Chuliang, Xiang, Yang, Wang, Xin, Tang, Hong, Hong, Feng, Liu, Hong and Wang, Yinglin (ed.) IFIP International Conference on Network and Parallel Computing (NPC 2008). Shanghai, China 18 - 21 Oct 2008 Los Alamitos, CA. United States. https://doi.org/10.1109/NPC.2008.20
Improving efficiency and scalability of service network graph by re-routing service routes
Lai, David and Zhang, Zhongwei. 2009. "Improving efficiency and scalability of service network graph by re-routing service routes." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ACIIDS.2009.31
Scrutinizing performance of ad hoc routing protocols on wireless sensor networks
Zhang, Zhongwei, Zhou, Hong and Gao, Jason. 2009. "Scrutinizing performance of ad hoc routing protocols on wireless sensor networks." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 United States. https://doi.org/10.1109/ACIIDS.2009.30
An evaluation of electronic individual peer assessment in an introductory programming course
de Raadt, Michael, Lai, David and Watson, Richard. 2008. "An evaluation of electronic individual peer assessment in an introductory programming course." Lister, Raymond (ed.) 7th Baltic Sea Conference on Computing Education Research (Koli Calling 2007). Koli National Park, Finland 15 - 18 Nov 2007 Sydney, Australia.
Applications and performances of extended TTDDs in large-scale wireless sensor networks
Zhou, Hong, Jin, Lu, Zhang, Zhongwei, Ali, Hesham and Wang, Chulho. 2007. "Applications and performances of extended TTDDs in large-scale wireless sensor networks." Zhang, H., Olariu, S., Cao, Jiannong and Johnson, D. B. (ed.) 3rd International Conference of Mobile Ad-hoc and Sensor Networks. Beijing, China 12 - 14 Dec 2007 Berlin. https://doi.org/10.1007/978-3-540-77024-4
The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Zhou, Hong, Lu, Jie, Zhang, Guangquan and Zhang, Zhongwei. 2007. "The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers." Applied Mathematics and Computation. 188 (2), pp. 1686-1698. https://doi.org/10.1016/j.amc.2006.11.176
A comparative study on the performance of wireless sensor networks
Zou, Lin and Zhang, Zhongwei. 2007. "A comparative study on the performance of wireless sensor networks." 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Melbourne, Australia 11 - 13 Jul 2007 Piscataway, NJ, USA.
Towards enhancing trust on Chinese e-commerce
Wang, Zhen, Zhang, Zhongwei and Zhang, Yanchun. 2006. "Towards enhancing trust on Chinese e-commerce." Zhou, X., Li, J., Shen, H., Kitsuregawa, M. and Zhang, Y. (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Berlin, Germany. Springer. https://doi.org/10.1007/11610113_30
Throughput and fairness performance of multiple STT-Vegas connections
Zhang, Zhongwei, Zhou, Hong and Leis, John. 2005. "Throughput and fairness performance of multiple STT-Vegas connections." Sanadidi, M. Y. (ed.) 3rd IASTED International Conference on Communications and Computer Networks. Marina del Rey, United States 24 - 26 Oct 2005 Marina del Rey, USA.
Quantitative analysis of queue management schemes in TCP/IP network routers
Li, Zhenquan, Zhang, Zhongwei and Zhou, Hong. 2004. "Quantitative analysis of queue management schemes in TCP/IP network routers." Safaei, F. (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2004). Sydney, Australia 08 - 10 Dec 2004 Canberra, Australia.
Deliberation and implementation of adaptive fuzzy logic based security level routing protocol for mobile ad hoc network
Jin, Lu, Zhang, Zhongwei and Zhou, Hong. 2007. "Deliberation and implementation of adaptive fuzzy logic based security level routing protocol for mobile ad hoc network." Jiang, Yingtao (ed.) 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007). Las Vegas, United States 11 - 13 Jan 2007 Las Vegas, USA.
Improving the performance of SCTP Transport Protocol over wireless networks
Zhang, Zhongwei and Jin, Lu. 2006. "Improving the performance of SCTP Transport Protocol over wireless networks." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP2006). Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Performance comparison of the AODV, SAODV and FLSL routing protocols in mobile ad hoc networks
Jin, Lu, Zhang, Zhongwei and Zhou, Hong. 2006. "Performance comparison of the AODV, SAODV and FLSL routing protocols in mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP2006). Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.
Performance of STT-Vegas in heterogeneous wired and wireless networks
Zhou, Hong, Gyasi-Agyei, Amoakoh and Zhang, Zhongwei. 2006. "Performance of STT-Vegas in heterogeneous wired and wireless networks." 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine). Waterloo, Canada 07 - 09 Aug 2006 New York, NY, USA.
Fuzzy logic strategy of prognosticating TCP's timeout and retransmission
Zhang, Zhongwei, Li, Zhi and Suthaharan, Shan. 2005. "Fuzzy logic strategy of prognosticating TCP's timeout and retransmission." Halgamuge, Saman K. and Wang, Lipo (ed.) Computational intelligence for modelling and prediction. Berlin. Springer.