Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yiling Wang is active.

Publication


Featured researches published by Yiling Wang.


annual acis international conference on computer and information science | 2007

Hybrid Group Key Management Scheme for Secure Wireless Multicast

Yiling Wang; Phu Dung Le; Balasubramaniam Srinivasan

Along with the dramatic development of wireless network technologies and portable devices, wireless group applications are rapidly innovated to provide online services via wireless broadband networks. This development has led to a prime concern for providing clients with a secure and efficient key management system for group services such as multimedia conferencing, stock quoting and so on. In this paper we propose a new hybrid group key management approach which is suitable for the cellular wireless environment. This new approach has a two-level structure where the group users are sub-divided into clusters, hence reducing the rekeying cost in the key updating. We demonstrate that our proposed approach can achieve better efficiency when compared to the conventional Logical Key Hierarchy scheme.


international conference on hybrid information technology | 2008

Efficient Key Management for Secure Wireless Multicast

Yiling Wang; Phu Dung Le; Balasubramaniam Srinivasan

Along with the rapid development of mobile devices and widespread deployment of wireless networks, more and more content and service providers are increasingly interested in provide multicast applications over wireless networks. Before wireless group-oriented applications can be deployed in large scale, security must be guaranteed. Group key management is a critical issue in the wireless multicast security. In this paper, we propose a new key management scheme dedicated to wireless networks. In the proposal, we divide group members into several small operation units to perform the micro key management. Compared to the logical key hierarchy (LKH), our proposal can significantly reduce the workload of key server and provide efficient key management operations for secure wireless multicast.


international conference on information technology new generations | 2006

Efficient Group Key Management in Wireless Networks

Yiling Wang; Dhilak Damodaran; Phu Dung Le

There has been a rapid growth in the field of wireless networks along with the advent of portable devices. This development has led to a stage where it is now become a prime concern for providing the wireless clients with a secure and efficient group key management system for services such as mobile data access, information retrieval and so on. In this paper, we propose a new group key management algorithm suitable for the wireless environment. This new approach is a two-level structure where the group of users are sub-divided into clusters, hence reducing the rekeying cost in the key updating. We demonstrate that our proposed approach can achieve better efficiency when compared to the conventional logical key hierarchy scheme


international conference on information technology | 2007

A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention

Osama Dandash; Yiling Wang; Phu Dung Le; Balasubramaniam Srinivasan

Fraud prevention is one of the most important security properties of electronic commerce (e-commerce). A strong authentication mechanism is a fundamental requirement in managing fraud on the Internet. Several authentication systems were proposed however; they are not effective enough to prevent attackers from performing illegal transactions over the Internet. In this paper, we propose a new dynamic key generation scheme DKGS with algorithms for different technologies that is more capable than the existing systems in preventing fraudulent Internet payments


international conference on computer sciences and convergence information technology | 2009

Probabilistic Encryption--A Comparative Analysis against RSA and ECC

Orhio Mark Creado; Xianping Wu; Yiling Wang; Phu Dung Le

This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance of our implementation for varying key sizes of 128/1024, 160/2048, and 192/4096 bits. We target our implementation to justify if the probabilistic model can perform equivalently against the deterministic model so as to be considered to be used in more practical scenarios today.


network-based information systems | 2009

A Membership-Oriented Group Key Management for Application Services

Harry Huy Hoang Ngo; Yiling Wang; Phu Dung Le; Balasubramaniam Srinivasan; Vishv Malhotra

Group key management is an important framework to secure group communications. To improve the performance of re-keying for group key management in large scale systems, logical hierarchical key was proposed. However, this approach does not consider the high re-keying cost of single user having multiple memberships. In this paper, we propose a membership oriented group key structure to optimize the re-keying of multiple membership users. Users in the systems are grouped into key-groups based on their memberships. Therefore, the re-keying operations for members of these groups can be combined without sacrificing forward secrecy. An analysis shows that the cost of re-keying operations in large scale multiple membership group key management can be improved with the proposed group key management.


network-based information systems | 2009

Multicasting Key Management in Wireless Networks

Yiling Wang; Harry Huy Hoang Ngo; Phu Dung Le; Balasubramaniam Srinivasan; Vishv Malhotra

Multicasting is an efficient communication mechanism to deliver information to a number of recipients. Due to the broadcast nature of wireless communication, multicasting has great potential for commercial and military applications in wireless networks. In this paper, we propose a secure and efficient key management scheme, hybrid key management (HKM), for the wireless multicasting. Compared to the existing multicasting key management approaches, our proposal can achieve operation efficiency.


international conference on computer sciences and convergence information technology | 2009

The Design and Implementation of a Sensitive Information System

Xianping Wu; Yiling Wang; Phu Dung Le

Protecting sensitive information systems from security threats such as unauthorized access, information eavesdropping and information interfering, is significant. Most of the natural approaches employ strong authentication or cryptography systems to protect critical data. But those approaches do not stress on the potential amount of risks associated with sensitive information, especially the vulnerability from compromising of long term cryptographic keys and the lack of fine-grained access control for group sharing. Therefore, in this paper, we use dynamic key and group key theories to propose a new security architecture for sensitive information protection. The architecture categorizes sensitive information based on classified information. We implement the architecture by adopting elliptic curve cryptography (ECC) and dynamic key approaches to generate symmetric key to secure unicast and multicast communication among users. A formal analysis is provided to verify the security of the proposed work. It shows that the proposed system guarantees critical information data security and access control flexibility.


Journal of Networks | 2008

Fraudulent Internet Banking Payments Prevention using Dynamic Key

Osama Dandash; Yiling Wang; Phu Dung Leand; Bala Srinivasan


international conference on enterprise information systems | 2007

A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS DETECTION

Osama Dandash; Yiling Wang; Phu Dung Le; Bala Srinivasan

Collaboration


Dive into the Yiling Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge