hkr.sePublikationer
Ändra sökning
Avgränsa sökresultatet
1 - 13 av 13
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Arvidsson, Åke
    et al.
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS). Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap.
    Grinnemo, Karl-Johan
    Karlstads universitet.
    Chen, Eric Zhi
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS).
    Wang, Qinghua
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS). Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet.
    Web metrics for the next generation performance enhancing proxies2019Ingår i: 2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM) / [ed] Begusic, D Rozic, N Radic, J Saric, M, IEEE , 2019, s. 171-176Konferensbidrag (Refereegranskat)
    Abstract [en]

    The fast growth of Internet traffic, the growing importance of cellular accesses and the escalating competition between content providers and network operators result in a growing interest in improving network performance and user experience. In terms of network transport, different solutions ranging from tuning TCP to installing middleboxes are applied. It turns out, however, that the practical results sometimes are disappointing and we believe that poor testing is one of the reasons for this. Indeed, many cases in the literature limit testing to the simple and rare use case of a single file download, while common and complex use cases like web browsing often are ignored or modelled only by considering smaller files. To facilitate better testing, we present a broader view which includes domain counts, flow counts and different forms of concurrency to better characterise the complexity around web pages, and from which the potential for different optimisation techniques can be estimated. We also derive numerical values of these metrics for a small set of popular web pages and study similarities and differences between pages with the same kind of content (newspapers, e-commerce and video) and between pages designed for the same platform (computer and smartphone).

  • 2.
    Huang, Xin
    et al.
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Chen, Bangdao
    Department of Computer Science, University of Oxford.
    Markham, Andrew
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Wang, Qinghua
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap. Department of Communications and Networking, Aalto University, Espoo.
    Zheng, Yan
    Department of Communications and Networking, Aalto University, Espoo.
    Roscoe, Andrew William
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Human interactive secure key and ID exchange protocols in body sensor networks2013Ingår i: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, nr 1, s. 30-38Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

  • 3.
    Huang, Xin
    et al.
    Kina.
    Craig, Paul
    Kina.
    Wang, Qinghua
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap.
    Identity-based association protocols for wireless personal area networks2015Ingår i: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

  • 4. King'oku, Pascal
    et al.
    Sowe, Alieu
    Wang, Qinghua
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS). Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap.
    A demo implementation of interactive internet of things2020Ingår i: 16th Swedish National Computer Networking Workshop (SNCNW), Kristianstad (online), 2020, 2020, s. 15-18Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Internet of Things facilitates interaction betweenhuman users and physical environment through the use ofelectronic sensors, wireless communication and cloudtechnology. In this paper, we demonstrate a scalableimplementation of Internet of Things in a lab environment. Aversatile set of sensors including cameras, power outlets andordinary temperature sensors are embedded in the physicalenvironment and connected to the cloud via local gateways. Datais processed locally and accessible via the cloud. A web servicehosted in the cloud enables remote two-way interaction betweenthe human users and the monitored physical environments.

    Ladda ner fulltext (pdf)
    fulltext
  • 5.
    Wang, Qinghua
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap.
    A practice of using research seminars in teaching advanced students2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

    Ladda ner (pdf)
    summary
  • 6.
    Wang, Qinghua
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS).
    Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference2021Ingår i: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 103, s. 1-29, artikel-id 102175Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping attacks. This article suggests the using of secret spreading codes (i.e. only a legitimate receiver knows the spreading sequence) and artificial interference (i.e. by intentionally adding noise to the broadcast channel) on countering eavesdropping attacks. We have made a theoretical analysis on the potential performance degradation at the eavesdropper and at the legitimate receiver for a point-to-point wireless communication system using direct-sequence spread spectrum (DSSS) with coherent phase-shift keying (PSK) modulation. We have also proposed a lightweight non-cryptographic secret code generation scheme which leads to low correlation between the spreading codes used at the transmitter and at the eavesdropper. Simulation results confirms the good anti-eavesdropping performance on using the proposed non-cryptographic secret code generation scheme. Simulation results also conform with the theoretical analysis and motivate the using of artificial interference on countering eavesdropping attacks.

    Ladda ner fulltext (pdf)
    fulltext
  • 7.
    Wang, Qinghua
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap.
    Kvalitetssäkring i högre utbildning2016Ingår i: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Konferensbidrag (Övrigt vetenskapligt)
    Abstract [sv]

    Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

    Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

    Ladda ner fulltext (pdf)
    fulltext
  • 8.
    Wang, Qinghua
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS).
    Lightweight session-key establishment for the internet of things2018Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Internet of Things is evolving from the theory into reality. It is increasingly embedded into our daily lives to provide critical services such as pervasive healthcare and intelligent transportation systems, for which our privacy and security highly rely on the proper functioning of the products. This paper proposes a lightweight session-key establishment protocol that provides fundamental protection for the sensitive information flow in the Internet of Things. The new session-key establishment scheme utilizes the fact that time synchronization is a standard service in most of the Internet of Things products, and relies on loose time synchronization information to achieve secure and fast key agreement. Compared to traditional session-key establishment methods such as the one used by Wi-Fi, the new scheme is more lightweight and also allows a faster session establishment which can be critical for real-time services.

  • 9.
    Wang, Qinghua
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap.
    Using secret spreading codes to enhance physical layer security in wireless communication2017Ingår i: ICC 2017: 3rd International Workshop on Advanced PHY and MAC Technology for Super Dense Wireless Networks, 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    The broadcast nature of wireless communication make it intrinsically vulnerable to jamming and eavesdropping attacks. Spread-spectrum techniques spread narrowband signals over a wide bandwidth, and provide good resistance to noise and jamming attacks. However, spread-spectrum signals can still be intercepted if their used spreading codes are known. To tackle this issue, this paper proposes a lightweight design on generating secret spreading codes. A secret spreading code has all the desired properties of an ordinary spreading code, plus its unpredictability. Our method on generating secret spreading codes is shown to be resistant to cryptanalysis, and has little requirement on memory and computing resources.

  • 10.
    Wang, Qinghua
    et al.
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS).
    Huang, Xin
    England.
    Mengistu, Dawit
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS). dawit.mengistu@hkr.se .
    Session key agreement for end-to-end security in time-synchronized networks2018Konferensbidrag (Övrigt vetenskapligt)
  • 11.
    Wang, Qinghua
    et al.
    Högskolan Kristianstad, Fakulteten för naturvetenskap, Avdelningen för datavetenskap. Högskolan Kristianstad, Fakulteten för naturvetenskap, Forskningsmiljön för datavetenskap (RECS).
    Westlund, Viktor
    Johansson, Jonas
    Lindgren, Magnus
    Kristianstads Kommun.
    Smart Sewage Water Management and Data Forecast2021Ingår i: 33rd Workshop of the Swedish Artificial Intelligence Society, SAIS 2021, USA: Institute of Electrical and Electronics Engineers (IEEE), 2021, artikel-id 9484017Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    There is currently an ongoing digital transformation for sewage and wastewater management. By automating data collection and enabling remote monitoring, we will not only be able to save abundant human resources but also enabling predictive maintenance which is based on big data analytics. This paper presents a smart sewage water management system which is currently under development in southern Sweden. Real-time data can be collected from over 500 sensors which have already been partially deployed. Preliminary data analysis shows that we can build statistical data models for ground water, rainfall, and sewage water flows, and use those models for data forecast and anomaly detection.

  • 12.
    Wang, Qinghua
    et al.
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap.
    Yigitler, Huseyin
    Finland.
    Huang, Xin
    Kina.
    Jäntti, Riku
    Finland.
    Localizing multiple objects using radio tomographic imaging technology2016Ingår i: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, nr 5, s. 3641-3656Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

  • 13.
    Wang, Qinghua
    et al.
    Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap. Aalto University, Finland.
    Yigitler, Huseyin
    Aalto University, Finland.
    Jäntti, Riku
    Aalto University, Finland.
    System monitoring and fault diagnosis in wireless sensor systems2012Ingår i: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

1 - 13 av 13
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf