Junwei Gao

ORCID: 0009-0008-0464-423X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Rights Management and Security
  • Underwater Vehicles and Communication Systems
  • Cryptography and Data Security
  • Power Systems and Technologies
  • Energy Harvesting in Wireless Networks
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Satellite Communication Systems
  • Security in Wireless Sensor Networks

Sun Yat-sen University
2023

Huazhong University of Science and Technology
2007

To provide communication confidentiality in multicasting applications, traffic data secure multicast is encrypted with a session key known only by certificated group members. Whenever there change the membership, must be updated dynamically. Previous work has been focused on individual rekeying, are two problems rekeying: inefficiency and an out of sync problem between keys data. This paper devises batch rekeying scheme based iterated hash function which can improve efficiency server,and...

10.1109/wicom.2007.488 article EN International Conference on Wireless Communications, Networking and Mobile Computing 2007-09-01

It has become mainstream in the industry to introduce a variety of power distribution intelligent sensing devices into traditional network, and collect information real time provide support for monitoring platform. Such an Internet Things is called network. This paper proposes Identity authentication scheme network device using dynamic tokens identity-based cryptograph. Its advantage that it does not require real-time online public key management system, terminal can complete identity...

10.1117/12.2683868 article EN 2023-06-14

Satellite networks are playing a more and important role in network infrastructure. They useful providing broadband connectivity to remote locations which harder reach through terrestrial Data confidentiality integrity two critical issues for satellite networks. The multicast traffic should be accessible only subscribers, this requires security efficient methods generate, distribute update the keys. Access control can achieved by data encryption, such as end mechanisms----IPSec. Due high...

10.1117/12.775294 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2007-10-19
Coming Soon ...