Resource Type

Journal Article 1402

Conference Videos 77

Conference Topics 1

Year

2024 1

2023 92

2022 138

2021 128

2020 98

2019 76

2018 84

2017 74

2016 63

2015 78

2014 51

2013 49

2012 39

2011 47

2010 53

2009 41

2008 43

2007 55

2006 52

2005 39

open ︾

Keywords

system 17

optimization 15

index system 10

system engineering 9

Artificial intelligence 8

Multi-agent system 8

management 8

management system 8

simulation 8

system construction 8

Qian Xuesen 7

modeling 6

public health 6

engineering management 5

fault diagnosis 5

innovation 5

sustainable development 5

system integration 5

China 4

open ︾

Search scope:

排序: Display mode:

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 28-42 doi: 10.1631/FITEE.1400133

Abstract: This type of encryption mechanism can be implemented most efficiently with kernel file systems.However, this approach has some disadvantages since developing a new file system and attaching it inNevertheless, current implementations of cryptographic FUSE-based file systems suffered from severalThis paper describes the design and implementation of ImgFS, a fully transparent cryptographic file systemThe development of ImgFS has managed to solve weaknesses that have been identified on cryptographic FUSE-based

Keywords: Storage image security     Cryptographic file system     Filesystem in userspace (FUSE)     Transparent encryption    

NICFS: a file system based on persistent memory and SmartNIC Research Article

Zhiwang YU, Runyu ZHANG, Chaoshu YANG, Shun NIE, Duo LIU,zhangry@gzu.edu.cn,csyang@gzu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 688-702 doi: 10.1631/FITEE.2200468

Abstract: (PM) s have been developed to achieve high performance by exploiting the advanced features of PMs, including nonvolatility, byte addressability, and dynamic random access memory (DRAM) like performance. Unfortunately, these PMs suffer from limited write endurance. Existing space management strategies of PM s can induce a severely unbalanced wear problem, which can damage the underlying PMs quickly. In this paper, we propose a -aware , called WMAlloc, to achieve the wear leveling of PMs while improving the performance of s. WMAlloc adopts multiple min-heaps to manage the unused space of PMs. Each heap represents an allocation granularity. Then, WMAlloc allocates less-worn blocks from the corresponding min-heap for allocation requests. Moreover, to avoid recursive split and inefficient heap locations in WMAlloc, we further propose a bitmap-based multi-heap tree (BMT) to enhance WMAlloc, namely, WMAlloc-BMT. We implement WMAlloc and WMAlloc-BMT in the Linux kernel based on NOVA, a typical PM . Experimental results show that, compared with the original NOVA and dynamic wear-aware range management (DWARM), which is the state-of-the-art -aware allocator of PM s, WMAlloc can, respectively, achieve 4.11× and 1.81× maximum write number reduction and 1.02× and 1.64× performance with four workloads on average. Furthermore, WMAlloc-BMT outperforms WMAlloc with 1.08× performance and achieves 1.17× maximum write number reduction with four workloads on average.

Keywords: File system     Persistent memory     Wear-leveling     Multi-grained allocator    

ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers None

Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, doi: 10.1631/FITEE.17e0626

Abstract: None

Keywords: None    

& Research Article

Yitian YANG, Youyou LU,yangyiti22@mails.tsinghua.edu.cn,luyouyou@tsinghua.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 675-687 doi: 10.1631/FITEE.2200469

Abstract: Emergence of new hardware, including and , has brought new opportunities to design. In this paper, we design and implement a new named NICFS based on and SmartNIC. We divide the into two parts: the front end and the back end. In the front end, data writes are appended to the in a log-structured way, leveraging the fast persistence advantage of . In the back end, the data in logs are fetched, processed, and patched to files in the background, leveraging the processing capacity of SmartNIC. Evaluation results show that NICFS outperforms Ext4 by about 21%/10% and about 19%/50% on large and small reads/writes, respectively.

Keywords: Non-volatile memory     Persistent memory     Data processing unit     Smart network interface card (SmartNIC)     Filesystem    

ONFS: a hierarchical hybrid file system based on memory, SSD, andHDDfor high performance computers Article

Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 1940-1971 doi: 10.1631/FITEE.1700626

Abstract: To rise to the challenge, we propose a hierarchical hybrid storage system, on-line and near-line filesystem (ONFS).solid state drive (SSD) in compute nodes, and HDD in storage servers to build a three-level storage systemIt supports portable operating system interface (POSIX) semantics, and provides high bandwidth, low latency

Keywords: High performance computing     Hierarchical hybrid storage system     Distributed metadata management     Data    

Anovel non-volatile memory storage system for I/O-intensive applications None

Wen-bing HAN, Xiao-gang CHEN, Shun-fen LI, Ge-zi LI, Zhi-tang SONG, Da-gang LI, Shi-yan CHEN

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 10,   Pages 1291-1302 doi: 10.1631/FITEE.1700061

Abstract: This paper presents a novel PCMbased storage system.It consists of the in-storage processing enabled file system (ISPFS) and the configurable parallel computationOn the other hand, ISPFS passes ISP instructions through a command file and invokes the ISP engine toExtensive experiments are performed on the prototype system.

Keywords: In-storage processing     File system     Non-volatile memory (NVM)     Storage system     I/O-intensive applications    

The Constructions of Cryptographic Functions

Teng Jihong,Zhang Wenying,Liu Wenfen,Li Shiqu

Strategic Study of CAE 2003, Volume 5, Issue 7,   Pages 47-52

Abstract: On the basis of this formula, the constructions of some cryptographic functions, such as resilient functions

Keywords: Walsh spectrum     decomposition formula of Walsh spectrum     Bent function     resilient function     strict avalanche criterion    

Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system Research Articles

Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.1900167

Abstract: An autonomous five-dimensional (5D) system with is constructed by modifying the well-known three-dimensionalautonomous Liu and Chen system.Equilibrium points of the proposed autonomous 5D system are found and its stability is analyzed.Using a field programmable gate array (FPGA), the proposed autonomous 5D system is implemented and theThe chaotic attractors and coexistence of the attractors generated by the of the proposed system have

Keywords: 混沌系统;霍普夫分岔;共存吸引子;偏置增强;FPGA实现;声音加密    

Characteristic of Spectrum and Self-correlation of Some Boolean Fuctions Linearly Equivalent to Specific Cryptographic

Yang Rui,Zeng Bensheng,Li Shiqu

Strategic Study of CAE 2005, Volume 7, Issue 11,   Pages 60-65

Abstract:

The paper made an analysis of the similarities and differences about the cryptographic properties

Keywords: linear equivalence     Walsh cycle spectrum     self-correlation function     correlation-immunity     propagation criterion     SAC    

Nanoscale cryptographic architecture design using quantum-dot cellular automata Regular Article

Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11,   Pages 1578-1586 doi: 10.1631/FITEE.1800458

Abstract: based on cryptography is a new paradigm in the field of nanotechnology. The overall performance of QCA is high compared to traditional complementary metal-oxide semiconductor (CMOS) technology. To achieve data security during nanocommunication, a cryptography-based application is proposed. The devised circuit encrypts the input data and passes it to an output channel through a cum data path selector, where the data is decrypted back to its original form. The results along with theoretical implication prove the accuracy of the circuit. Power dissipation and circuit complexity of the circuit have been analyzed.

Keywords: 量子点元胞自动机(QCA);多数决定门密码学;加密;解密;纳米级路由    

The Cryptographic Properties of Select Logic Functions

Liang Zeng,Li Shiqu

Strategic Study of CAE 2005, Volume 7, Issue 7,   Pages 50-54

Abstract:

In this paper, the main results are concerned with the Walsh transform and the autocorrelation function of select logic functions. Select logic functions with large number of variables have perfect stability and can resist towards cryptanalysis of best affine approximation, but they can't resist towards differential cryptanalysis efficiently because of weak propagation property. By a linear transformation of coordinates, an explicit construction for functions satisfying the strict avalanche criterion or Being correlation immune is provided.

Keywords: select logic function     Walsh transform     autocorrelation function     strict avalanche criterion     correlation immune     probability expressions    

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Strategic Study of CAE 2022, Volume 24, Issue 4,   Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015

Abstract:

Note: Barrel capacity represents information system securityA QKD system consists of a transmitter, a receiver, and the channels that connect each.At the application level, a new cryptographic system combining quantum and classical cryptography issystem that combines quantum and classical cryptography.Further significant research is required to establish a mature and practical protocol system.

Keywords: quantum cryptography     protocols     quantum key distribution     quantum digital signature     quantum private query    

An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems Research Article

Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 703-715 doi: 10.1631/FITEE.2200462

Abstract: is an effective way to manage increasingly large file system metadata, but it suffers from low concurrency

Keywords: Extendible hashing     Non-volatile memory (NVM)     High concurrency    

An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC Research Article

Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG,raspberry0213@126.com,liwei12@fudan.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1,   Pages 134-144 doi: 10.1631/FITEE.2000325

Abstract: RSA and ellipse curve cryptography (ECC) algorithms are widely used in authentication, data security, and access control. In this paper, we analyze the basic operation of the ECC and RSA algorithms and optimize their modular multiplication and modular inversion algorithms. We then propose a modular operation architecture, with a mix-memory unit and double multiply-accumulate structures, to realize our unified, asymmetric cryptosystem structure in an operational unit. Synthesized with 55-nm CMOS process, our design runs at 588 MHz and requires only 437 801 μm of hardware resources. Our proposed design takes 21.92 and 23.36 mW for 2048-bit RSA modular multiplication and modular inversion respectively, as well as 16.16 and 15.88 mW to complete 512-bit ECC dual-field modular multiplication and modular inversion respectively. It is more energy-efficient and flexible than existing single algorithm units. Compared with existing multiple algorithm units, our proposed method shows better performance. The operation unit is embedded in a 64-bit RISC-V processor, realizing key generation, encryption and decryption, and digital signature functions of both RSA and ECC. Our proposed design takes 0.224 and 0.153 ms for 256-bit ECC point multiplication in and respectively, as well as 0.96 ms to complete 1024-bit RSA exponentiation, meeting the demand for .

Keywords: Modular operation unit     Reconfigurable     High energy efficiency    

System reliability and system resilience

Frontiers of Engineering Management 2021, Volume 8, Issue 4,   Pages 615-619 doi: 10.1007/s42524-021-0176-y

Title Author Date Type Operation

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Journal Article

NICFS: a file system based on persistent memory and SmartNIC

Zhiwang YU, Runyu ZHANG, Chaoshu YANG, Shun NIE, Duo LIU,zhangry@gzu.edu.cn,csyang@gzu.edu.cn

Journal Article

ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers

Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU

Journal Article

&

Yitian YANG, Youyou LU,yangyiti22@mails.tsinghua.edu.cn,luyouyou@tsinghua.edu.cn

Journal Article

ONFS: a hierarchical hybrid file system based on memory, SSD, andHDDfor high performance computers

Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU

Journal Article

Anovel non-volatile memory storage system for I/O-intensive applications

Wen-bing HAN, Xiao-gang CHEN, Shun-fen LI, Ge-zi LI, Zhi-tang SONG, Da-gang LI, Shi-yan CHEN

Journal Article

The Constructions of Cryptographic Functions

Teng Jihong,Zhang Wenying,Liu Wenfen,Li Shiqu

Journal Article

Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system

Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com

Journal Article

Characteristic of Spectrum and Self-correlation of Some Boolean Fuctions Linearly Equivalent to Specific Cryptographic

Yang Rui,Zeng Bensheng,Li Shiqu

Journal Article

Nanoscale cryptographic architecture design using quantum-dot cellular automata

Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com

Journal Article

The Cryptographic Properties of Select Logic Functions

Liang Zeng,Li Shiqu

Journal Article

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Journal Article

An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems

Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com

Journal Article

An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC

Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG,raspberry0213@126.com,liwei12@fudan.edu.cn

Journal Article

System reliability and system resilience

Journal Article