共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Debiao He 《Ad hoc Networks》2012,10(6):1009-1016
With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client–server environment, many user authentication protocols from pairings have been proposed. In 2009, Goriparthi et al. proposed a new user authentication scheme for mobile client–server environment. In 2010, Wu et al. demonstrated that Goriparthi et al.’s protocol fails to provide mutual authentication and key agreement between the client and the server. To improve security, Wu et al. proposed an improved protocol and demonstrated that their protocol is provably secure in random oracle model. Based on Wu et al.’s work, Yoon et al. proposed another scheme to improve performance. However, their scheme just reduces one hash function operation at the both of client side and the server side. In this paper, we present a new user authentication and key agreement protocol using bilinear pairings for mobile client–server environment. Performance analysis shows that our protocol has better performance than Wu et al.’s protocol and Yoon et al.’s protocol. Then our protocol is more suited for mobile client–server environment. Security analysis is also given to demonstrate that our proposed protocol is provably secure against previous attacks. 相似文献
3.
ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElGamal variant was also proposed,then the correctness,security and the complexity of computation and communication of the protocol were analyzed to extend the application of thinking to secure two-party line segments intersection scheme.Compared with the similar protocol of solving the geometric problem,a kind of secure two-party computation protocol based on homomorphic encryption system without using the oblivious transfer protocol and the millionaires protocol was put forward,which holds higher efficiency and a lower burden of communication. 相似文献
4.
Yu-Chi Chen Du-Shiau Tsai Gwoboa Horng 《Journal of Visual Communication and Image Representation》2012,23(8):1225-1233
Visual cryptography (VC), first presented by Naor and Shamir, is a variant of secret sharing, thus it also called visual secret sharing. It can be widely used in many applications such as encrypting large data efficiently. In the literature, the problem of cheating is under consideration in secret sharing. Recently, Horng et al. pointed out that cheating is possible in k-out-of-n VC schemes, and presented two kinds of the cheating prevention schemes for protecting honest participants. One of them is the authentication based cheating prevention scheme. In this paper, we analyze the definition of cheating prevention and propose a new authentication based cheating prevention scheme. This scheme is constructed with Naor–Shamir’s VC scheme. Finally, we give the security analysis to prove that the proposed scheme is immune to cheating. 相似文献
5.
Considering the highly dynamic nature of wireless networks, the major challenge in this environment is the provision of QoS guarantees that different applications demand. Recent research is interested in advance resource reservation to provide the necessary QoS to the mobile terminals. Another way to obtain a better use of the resources in this environment is to determine the future locations of the mobile terminal. This paper describes a user’s mobility profile management based approach for advance resource reservation in wireless networks; it is based on theNsis signaling. This reservation is based on an objectMspec (Mobility Specification) which determines the future location of the mobile terminal. The mspec object is a part of a user’s mobility profile; this last is determined by the mobile terminal. Another applicability of our user’s mobility profile is in the 4G wireless systems, in this case; the mobile terminal supports various access technologies and the user’s mobility profile is used to adapt the vertical and the diagonal handover to the user’s needs. 相似文献
6.
V. K. Marigodov 《Radioelectronics and Communications Systems》2011,54(4):196-203
Theoretical-game synthesis of radio communications system in a conflict situation of interaction between radio communications system (RCS) and radio masking system (RMS) operators taking into consideration information limitations that are imposed on differential entropies of players’ mixed strategies. 相似文献
7.
Most of the existing research for point of interest route planning only consider the static properties of POI,however,the congestion of the hot spots and users’ discontent may greatly reduce the travel quality.In order to increase the tourists’ satisfaction,the dynamic attributes of POI was considered and a route planning algorithm based on user’s requests was proposed.Firstly,Markov-GM(1,1) forecasting algorithm was designed to predict the number of people in each scenic spot.Markov-GM(1,1) could make the average predication error 12.2% lower than the GM(1,1) algorithm by introducing the predication residual.And then,the forward refinement (FR) algorithm was designed which could avoid visiting the unnecessary place and satisfy user’s requests as well.The average solving time of forward refinement algorithm was 9.4% lower than TMT algorithm under the same amount of user’s requests.Finally,based on the factors such as spot popularity,KL divergence of time,visiting order and distance et al,the scenic route profit planning algorithm which could make the number of Rank 1-5 spots 34.8% higher than Time_Based algorithm and 47.3% higher than Rand_GA algorithm. 相似文献
8.
Regular rules of constructing various systems of discrete composite frequency (DCF) signals have been proposed. Optimal systems of discrete frequency (DF) signals were chosen as a basis. In this case the extension of signal base is performed by the binary phase-shift keyed (BPS) signals coded by the Gold sequences. It was found out that the constructed systems of composite DCF-BPS signals possessed a number of essentially attractive properties. 相似文献
9.
《Mechatronics》2001,11(2):199-226
An active contour model, Snake, was developed as a useful segmenting and tracking tool for rigid or non-rigid (i.e. deformable) objects by Kass in 1987. Snake is designed on the basis of Snake energies. Segmenting and tracking can be executed successfully by the process of energy minimization. The ability to contract is an important process for segmenting objects from images, but the contraction forces of Kass’ Snake are dependent on the object’s form. In this research, new contraction energy, independent of the object’s form, is proposed for the better segmentation of objects. Kass’ Snake can be applied to the case of small changes between images because its solutions can be achieved on the basis of variational approach. If a somewhat fast moving object exists in successive images, Kass’ Snake will not operate well because the moving object may have large differences in its position or form, between successive images. Snake’s nodes may fall into the local minima in their motion to the new positions of the target object in next image. When the motion is too large to apply image flow energy to tracking, a jump mode is proposed for solving the problem. The vector used to make Snake’s nodes jump to the new location can be obtained by processing the image flow. The effectiveness of the proposed Snake is confirmed by some simulations. 相似文献
10.
11.
商业化四轴飞行器上的遥控器功能单一,没有DIY 的能力,无法自行编写代码,不利于飞控新功能的开发。利用BASYS3作为主控芯片自行设计了新的遥控器,采用 433 模块进行无线通讯,与飞控板进行有效信息交互;实现了除商用摇杆控制功能以外,还具备语音控制四轴飞行器的功能。与此同时,遥控器还可以实现同时与定高、定点、航拍等相结合的功能,实现四轴飞行器的全面稳定控制,为四轴飞行器后期的开发利用提供了进一步的参考。 相似文献
12.
A new non-topological information diffusion model of social network was proposed,called non-topological influence-interest diffusion model (NT-II).Representation learning was exploited to construct two hidden spaces for NT-II,called the user-influence space and the user-interest space,each user and each propagation item was mapped into a vector in space.The model predicted the probability of a user receiving a propagated item,considering not only the degree of influence from other users,but also the user's preference for propagated item.The experimental results show that the model can simulate the propagation process and predict the propagation results more accurately. 相似文献
13.
In-network caching is one of the most important features of ICN (information-centric networks).A caching strategy based on node’s importance to community was proposed to make content objects cached more reasonable in temporal and spatial distribution.Within each community,the strategy not only caches content objects in those nodes where users are easy to access the content,but also makes different popularity of content objects more reasonable in temporal distribution.The CSNIC strategy was implemented under a variety of experimental conditions,and compare it with the previous strategies CEE-LRU,Betw-LFU and Opportunistic.The simulation results show that the strategy can yield a significant performance improvement,such as,cache hit ratio,hop reduction ratio,content diversity ratio and number of replacement.Furthermore,the additional overhead of CSNIC is small. 相似文献
14.
Rahim Umar Fengfan Yang Shoaib Mughal HongJun Xu 《International Journal of Electronics》2018,105(7):1097-1116
A Plotkin-based polar-coded orthogonal frequency division multiplexing (P-PC-OFDM) scheme is proposed and its bit error rate (BER) performance over additive white gaussian noise (AWGN), frequency selective Rayleigh, Rician and Nakagami-m fading channels has been evaluated. The considered Plotkin’s construction possesses a parallel split in its structure, which motivated us to extend the proposed P-PC-OFDM scheme in a coded cooperative scenario. As the relay’s effective collaboration has always been pivotal in the design of cooperative communication therefore, an efficient selection criterion for choosing the information bits has been inculcated at the relay node. To assess the BER performance of the proposed cooperative scheme, we have also upgraded conventional polar-coded cooperative scheme in the context of OFDM as an appropriate bench marker. The Monte Carlo simulated results revealed that the proposed Plotkin-based polar-coded cooperative OFDM scheme convincingly outperforms the conventional polar-coded cooperative OFDM scheme by 0.5 ~ 0.6 dBs over AWGN channel. This prominent gain in BER performance is made possible due to the bit-selection criteria and the joint successive cancellation decoding adopted at the relay and the destination nodes, respectively. Furthermore, the proposed coded cooperative schemes outperform their corresponding non-cooperative schemes by a gain of 1 dB under an identical condition. 相似文献
15.
《Mechatronics》2023
In this paper, a new Fractional-Order Linear Active Disturbance Rejection Control scheme (FO-LADRC) is proposed to enhance the robustness against loop gain variations of the standard Active Disturbance Rejection Control (ADRC) in the case of uncertain integer-order systems. A new filtered Bode’s ideal transfer function (F-BITF) is proposed to be used as a reference model in the design approach of the proposed control scheme to ensure the dynamic behavior of the closed-loop BITF to the controlled system. A Fractional-order Extended State Observer (F-ESO) is used in the proposed FO-LADRC structure to approximate the system to be controlled by a filtered fractional-order integrator. The fractional order of the F-ESO is a design parameter to tune to achieve the desired overshoot of the closed-loop step response. For the tuning of FO-LADRC structure, an analytical method is proposed. The performance of the proposed FO-LADRC and the Chen’s et al. FO-ADRC structures are evaluated thorough numerical simulation, and then validated in practice in the case of a Cart-Pendulum. Both the simulation and the experimental results show that the proposed FO-LADRC is able to achieve the desired dynamics of the F-BITF and guarantee the robustness with respect to the controller gain variation and the system parameter uncertainties. The comparative study conducted also reveals that the proposed control scheme is more robust than that of Chen. 相似文献
16.
A two stage detection approach which combine application’s UI and program code based on the observation that repackaging applications merely modify the structure of their user interface was proposed.Firstly,a fast hash similarity detection technique based on an abstracted representation of UI to identify the potential visual-similar repackaging applications was designed.Secondly,program dependency graph is used to represent as the feature of app to achieve fine-grained and precise code clone detection.A prototype system,SPRD,was implemented based on the proposed approach.Experimental results show that the proposed approach achieves a good performance in both scalability and accuracy,and can be effectively applied in millions of applications and billions of code detection. 相似文献
17.
E. A. Kon’kov E. A. Soldatov 《Journal of Communications Technology and Electronics》2011,56(9):1105-1110
A method of the estimation of the parameters of a variable length Markov chain based on the use of Fisher’s exact test is proposed. The method has been applied to the problem of classification of convolutionally coded binary signals. Computer simulation has shown that the constructed models have a considerably smaller number of parameters as compared to the models based on the Kullbak-Leibler criterion, which is very popular in constructing variable-order Markov models. 相似文献
18.
Children have increasingly become the target of commercial entities that seek their customer data. This study examines how young children deal with these requests and explores how enhancing their privacy literacy is related to real disclosure behavior. Additionally, the paper explores how this relationship is affected when companies provide a reward in exchange for the data and how it is mediated by how fair children think data practices are. An experiment with 496 children (9–13 years old) shows that privacy literacy negatively influences disclosure behavior. However, there is an interaction effect between privacy literacy and reward on perceived fairness, eventually affecting disclosure behavior. More specifically, children who are more literate find data practices to be fairer when a reward is provided, which in turn leads to greater data disclosure. Implications of the findings and directions for future research are discussed. 相似文献
19.
Advances in personal devices and communication technologies have changed the learning landscape. Gamification is the use of technology to promote and induce the user's internal motivation by exploiting the game's characteristics. Recently, mobile learning applications introduce various gamification strategies to provoke users' voluntary participation. However, empirical evidence on how to attract users and influence sustained usage is limited. This study establishes a theoretical basis for designing learning applications and discusses its impact on business. A series of gamification strategies such as Competition, Challenge, Compensation, Relationship, and Usability, were applied to a company's Mobile Social Learning Platform (MSLP). A survey result of 293 users from South Korea was used for the advanced mediation model analysis. The result showed that Challenge, Relationship, and Usability had affected Flow and Continuous usage intention. This paper argues that the user's usage intention will have a positive effect on voluntary learning. It also provides a significant implication for organizational effectiveness through the development and application of mobile learning platform. 相似文献
20.
E. G. Lokk 《Journal of Communications Technology and Electronics》2014,59(7):767-776
An in-plane magnetized planar dielectric/ferrite/dielectric structure adjoining perfect conductors or magnetic walls is considered. Dispersion equations for dipole spin waves in this structure are obtained on the basis of Maxwell’s equations. It is shown that, by analogy with the permutation duality principle (according to which Maxwell’s equations can be transformed into each other), the dispersion equations for the structure with conductors and for the structure with magnetic walls are transformed into each other after certain quantities are replaced according to a certain scheme. It is found that solutions corresponding to a surface dipole spin TEM (or T) wave exist on the interface between the ferrite half-space and a magnetic wall and that similar solutions exist in a ferrite layer adjoining two magnetic walls. 相似文献