Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Tsinghua Science and Technology

Issue 5 • September 2017

Filter Results

Displaying Results 1 - 12 of 12
  • Front cover

    Publication Year: 2017, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (553 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2017, Page(s): c2
    IEEE is not the copyright holder of this material | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • A trustenclave-based architecture for ensuring run-time security in embedded terminals

    Publication Year: 2017, Page(s):447 - 457
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2532 KB)

    The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use universal hardware and software to connect with public networks via the Internet, and are probably open to security threats from Trojan viruses and other malware. As a result, the security... View full abstract»

    Open Access
  • Semi-valid fuzz testing case generation for stateful network protocol

    Publication Year: 2017, Page(s):458 - 468
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3963 KB)

    Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support state transitions very well. This paper focuses on this issue and proposes the Semi-valid Fuzzing for the Stateful Network Protocol (SFSNP). The SFSNP analyzes protocol interactions and b... View full abstract»

    Open Access
  • Trusted attestation architecture on an infrastructure-as-a-service

    Publication Year: 2017, Page(s):469 - 477
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (6142 KB)

    Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (IaaS) platform is a problem that must be solved. The IaaS platform provides the Virtual Machine (VM), and the Trusted VM, equipped with a virtual Trusted Platform Module (vTPM), is the foundation of the ... View full abstract»

    Open Access
  • Conflict analysis and detection based on model checking for spatial access control policy

    Publication Year: 2017, Page(s):478 - 488
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (7263 KB)

    In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multigranularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We des... View full abstract»

    Open Access
  • A novel video reversible data hiding algorithm using motion vector for H.264/AVC

    Publication Year: 2017, Page(s):489 - 498
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3414 KB)

    A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the origina... View full abstract»

    Open Access
  • Evolutionary cryptography theory-based generating method for secure ECs

    Publication Year: 2017, Page(s):499 - 510
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (8432 KB)

    Ant Colony Optimization (ACO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptograp... View full abstract»

    Open Access
  • Simple method for realizingweil theorem in secure ECC generation

    Publication Year: 2017, Page(s):511 - 519
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4553 KB)

    How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general EC, a simple method called the Weil theorem can be used to compute the order of an EC characterized by a small prime number, such as the Kobltiz EC characterized by two. The fifteen se... View full abstract»

    Open Access
  • An improved space-time joint anti-jamming algorithm based on variable step LMS

    Publication Year: 2017, Page(s):520 - 528
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (8967 KB)

    In wireless communication, the space-time anti-jamming method is widely applied because it shows better performance than the pure airspace and pure temporal anti-jamming methods. However, its application is limited by its computational complexity, and it cannot suppress narrowband interference that is in the same direction as the navigation signal. To solve these problems, we propose improved freq... View full abstract»

    Open Access
  • Analysis of specialized production of transaction services based on essential services quantity

    Publication Year: 2017, Page(s):529 - 538
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (8506 KB)

    The specialized production of e-commerce transaction systems is an important research topic, which is of great significance for evaluating the development level and forecasting the development direction of e-commerce. However, there is a certain disparity between the current mainstream research model and reality, which leads to a deviated result. This paper puts forward a definition of “tran... View full abstract»

    Open Access
  • Campus bus network design and evaluation based on the route property

    Publication Year: 2017, Page(s):539 - 550
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (11056 KB)

    A campus bus network design and evaluation, taking Tsinghua University as an example, is investigated in this paper. To minimize the total cost for both passengers and operator, the campus bus system planning in a sequential approach is discussed, including the route network design, headway (i.e., the inverse of service frequency) optimization, and system evaluation. The improved genetic algorithm... View full abstract»

    Open Access

Aims & Scope

Tsinghua Science and Technology (Tsinghua Sci Technol) aims to highlight scientific achievements in computer science, electronic engineering, and other IT fields. Contributions all over the world are welcome.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Jiaguang Sun
School of Software
Tsinghua University
Beijing  100084 China
journal@tsinghua.edu.cn
Phone:86-10-62771385