Search Results - jian ren

4 Results Sort By:

Regenerating Code uses Rate-matching to Improve Retrieval from Hostile Networks

Executive SummaryA combination of two new regenerating algorithms increases the ability to recover information in a hostile network. This layered approach yields a more efficient and reliable way of detecting and correcting malicious nodes.Description of TechnologyIn a hostile network, conventional regeneration codes struggle to restore corrupt nodes...
Published: 11/3/2017   |   Inventor(s): Jian Ren, Jian Li, Tongtong Li
Keywords(s):   Category(s): Computer Software, Communication

Cost-Aware Secure Outsourcing of General Computational Problems

Executive SummaryCloud computing provides end-users on demand access to a shared pool of computing resources, such as computational power and storage. It enables the end-users to utilize those resources in a pay-per-use manner instead of purchasing expensive equipment and maintaining an IT staff. The end-users outsource their computational tasks to...
Published: 7/1/2016   |   Inventor(s): Jian Ren, Kai Zhou
Keywords(s):   Category(s): Computer Software, Data Processing/Analysis, Informatics, Telecommunications and Internet

Secure Access Gateway Design for Smart Grid and Smart Home

Executive SummarySecure and efficient communication between human beings and managed devices is key to the success of Smart Grid and Smart Home technology. Security has to be ensured from the aspects of access control, privacy protection, communication integrity, and intrusion detection. Unfortunately, the security provided by existing systems is far...
Published: 6/29/2016   |   Inventor(s): Jian Ren, Tongtong Li, Xiaochen Tang
Keywords(s):   Category(s): Control Systems, Devices, Telecommunications and Internet

Defense Against Primary User Emulation Attacks In Cognitive Radio Networks

Executive SummaryCognitive radio (CR) networks take advantage of unused bandwidth through which secondary unlicensed users may share the spectrum with the licensed primary users to better utilize the spectrum at any given time. Primary user emulation attacks (PUEAs) are malicious attacks in which a malicious user mimics the signal of a primary user...
Published: 6/16/2016   |   Inventor(s): Tongtong Li, Jian Ren, Mai Abdelhakim, Ahmed Alahmadi
Keywords(s):   Category(s): Communication