Search Results - jian+ren

4 Results Sort By:

d-CRAME: Blockchain-based Distributed Coercion-Resistant and Anonymous Mobile Electronic Voting

Blockchain-based Mobile Electronic Voting VALUE PROPOSITION Electronic voting presents a convenient and cost-effective alternative to current paper ballot-based voting. It provides many benefits such as increased voter turnout and accuracy in the decision-making process. While presenting many improvements, e-voting still faces serious security challenges...
Published: 2/6/2024   |   Inventor(s): Jian Ren, Ehab Zaghloul, Tongtong Li
Keywords(s):   Category(s): Computer Software, Informatics

Regenerating Code uses Rate-matching to Improve Retrieval from Hostile Networks

Executive SummaryA combination of two new regenerating algorithms increases the ability to recover information in a hostile network. This layered approach yields a more efficient and reliable way of detecting and correcting malicious nodes.Description of TechnologyIn a hostile network, conventional regeneration codes struggle to restore corrupt nodes...
Published: 6/8/2021   |   Inventor(s): Jian Ren, Jian Li, Tongtong Li
Keywords(s):   Category(s): Computer Software, Communication

Cost-Aware Secure Outsourcing of General Computational Problems

Executive SummaryCloud computing provides end-users on demand access to a shared pool of computing resources, such as computational power and storage. It enables the end-users to utilize those resources in a pay-per-use manner instead of purchasing expensive equipment and maintaining an IT staff. The end-users outsource their computational tasks to...
Published: 6/8/2021   |   Inventor(s): Jian Ren, Kai Zhou
Keywords(s):   Category(s): Computer Software, Data Processing/Analysis, Informatics, Telecommunications and Internet

Defense Against Primary User Emulation Attacks In Cognitive Radio Networks

Executive SummaryCognitive radio (CR) networks take advantage of unused bandwidth through which secondary unlicensed users may share the spectrum with the licensed primary users to better utilize the spectrum at any given time. Primary user emulation attacks (PUEAs) are malicious attacks in which a malicious user mimics the signal of a primary user...
Published: 6/8/2021   |   Inventor(s): Tongtong Li, Jian Ren, Mai Abdelhakim, Ahmed Alahmadi
Keywords(s):   Category(s): Communication