Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Xiaoliang Wang
Total Records ( 3 ) for Xiaoliang Wang
  Xiaoliang Wang and Xingming Sun
  Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While, anonymity related issues have been extensively studied in Peer-to-Peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires controlled anonymity, so that misbehaving entities in the network remain traceable. We are working on seeking novel and more effective methods to control anonymity, authentication and traceability. In this study, we propose a security architecture to ensure anonymity and authentication for honest users and keep traceability for misbehaving users in P2P systems. We use Fair Blind Signature Trust (FBST) to resolve the conflicts among anonymity, authentication and traceability. Signature scheme that has information about identity ensures authentication. At the same time, use of blind signature and additional anonymous scheme provides anonymity. Moreover, traceability is achieved due to the fairness of fair blind signature. Security analysis shows that the FBST can perfectly solve tradeoff between anonymity, authentication and traceability.
  Xiaoliang Wang , Lincong Yang , Xingming Sun , Jinsong Han , Wei Liang and Lihong Huang
  Anonymity has received increasing attention in the literature due to the users` awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires authentication so that misbehaving entities in the network remain traceable. This study analyzes this problem and reviews related researches. Besides, we also advise some possible methods for this problem.
  Xiaoliang Wang , Yuling Liu and Hengfu Yang
  In P2P network, the existing researches focus on protecting the security of information transmission, or ensuring users’ privacy. Security certification is a basic demand of P2P network, including the general authenticity, credibility, integrity and so on. Privacy protection for transactions is the high-level requirement of security, including confidentiality, copyright management, access control. One-sided pursuit of certification will affect the privacy rights of users while one-sided pursuit of anonymous will bring a series of anonymous abuse problems. However, little research has paid attention to urgency of this dilemma, leading to the emergence of a large number of problems in the applications. This study presents an anonymous authentication scheme based on homomorphic encryption, called FHET (Fully homomorphic encryption trust). FHET makes use of trust certificates and can also be combined with existing P2P reputation system which effectively prevents the selfish behavior of peers and ensures scalability, portability and practicality.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility