Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhang Xin-fang is active.

Publication


Featured researches published by Zhang Xin-fang.


ieee international conference on cyber technology in automation, control, and intelligent systems | 2011

An indoor location-based access control system by RFID

Zhang Xin-fang; Fang Ming-wei; Wu Junjun

With the rapid development of wireless and mobile network, traditional access control mechanisms face the new security risk that access data at any place may lead the leakage of the confidential data or bring new attack to the server. Location based access control is proposed to authorize user by consideration the location information of the user. In this paper, a novel indoor access control system is presented to protect the data security in mobile storage device. An Active tag is embedded into the storage device to implement location based access control. We make use of the limited penetration of RF signal to build the security zone, and get users location information from the tag and the reader. In order to protect the system and carry out authorization, an authenticate protocol is proposed. The protocol can ensure the anonymity of the tag, and protect the confidential of the data to prevent spoofing attack and replay attack. More important, our system can authorize the user according to users location information.


international workshop on computer science and engineering | 2009

A Secure Software Download Framework Based on Mobile Trusted Computing

Wu Junjun; Fang Ming-wei; Yu Peng-fei; Zhang Xin-fang

The number of software deployed on mobile terminals is dramatically increasing. However, this leads the mobile terminal facing a serious of security threats. In order to resolve these threat issues, several security requirements are proposed. Also, this paper introduces a secure software download framework and corresponding download protocol based on mobile trusted computing, designed to handle a collection of activities in software download. Such activities include authentication, download and installation of the software. The core part of the framework is a discretionary engine--Device Management Engine (DME), which provides entity authentication, integrity protection and remote attestation for the mobile device. By the introduction of software description file, we provide a mechanism to transfer Reference Integrity Metric (RIM), which makes up for the shortage of the specification.


Journal of Computer Applications | 2009

Twice-weighted centroid localization algorithm based on distance geometry constraints

Zhang Xin-fang


Computer Engineering and Science | 2010

Research of Mobile Phone Virus Defense Based on Heuristic Behavior-Checking

Zhang Xin-fang


Physics Procedia | 2012

A Trusted Portable Computing Device

Fang Ming-wei; Wu Junjun; Yu Peng-fei; Zhang Xin-fang


Computer Engineering and Science | 2011

A NFC Authentication Model Based on Trusted Computing

Zhang Xin-fang


Journal of Computer Applications | 2008

Improved identity-based key-insulation signature scheme

Zhang Xin-fang


Computer Engineering and Science | 2008

A Novel Bytecode Verification Algorithm on the Java Card

Zhang Xin-fang


Archive | 2013

IC card reading conversion equipment supporting magnetic strip card

Zhang Xin-fang; Wang Tongyang; Wu Junjun; Fu Jicun; Liao Xuelong


Journal of Computer Applications | 2011

Nave Bayesian text classification algorithm in cloud computing environment

Zhang Xin-fang

Collaboration


Dive into the Zhang Xin-fang's collaboration.

Top Co-Authors

Avatar

Wu Junjun

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Fang Ming-wei

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yu Peng-fei

Huazhong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge