首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
无线电   9篇
自动化技术   3篇
  2022年   1篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2008年   1篇
  2001年   2篇
  1998年   1篇
  1996年   2篇
  1993年   1篇
排序方式: 共有12条查询结果,搜索用时 31 毫秒
1.
Radio frequency identification (RFID) tag delegation enables a centralized back-end server to delegate the right to identify and authenticate a tag to specified readers. This should be used to mitigate the computational load on the server side and also to solve the issues in terms of latency and dependency on network connectivity. In this study, we describe a basic RFID delegation architecture and then under this model, we investigate the security of an RFID delegation protocol: Song Mitchell delegation (SMD), which is recently proposed by Song and Mitchell. We point out security flaws that have gone unnoticed in the design and present two attacks namely, a tag impersonation attack and a desynchronization attack against it. We also discover a subtle flaw by which a delegated entity can still keep its delegation rights after the expire of them—this infringes security policy of the scheme. More precisely, we show that the protocol will be still vulnerable to previously mentioned attacks, even if the back-end server ends the delegation right of a delegated reader and update the secrets of the delegated tags. To counteract such flaws, we improve the SMD protocol with a stateful variant so that it provides the claimed security properties.  相似文献   
2.
Multidirectional and multiscale edge detection via M-band wavelettransform   总被引:8,自引:0,他引:8  
In this correspondence, the problem of directional and multiscale edge detection is considered. Orthogonal and linear-phase M-band wavelet transform is used to decompose the image into MxM channels. These channels are then combined such that each combination, which we refer to as decomposition filter, results in zero-crossings at the locations of edges corresponding to different directions and resolutions, and inherently performs regularization against noise. By applying a zero-crossing detector on the outputs of the decomposition filters, edge maps of desired resolution and direction are obtained. In addition, with the application of the Teager's energy operator at the analysis stage, it is possible to obtain a reduction in unwanted zero-crossings. Final edge maps of images are obtained through simple combinations of directional edge maps.  相似文献   
3.
Two new design techniques for adaptive orthogonal block transforms based on vector quantization (VQ) codebooks are presented. Both techniques start from reference vectors that are adapted to the characteristics of the signal to be coded, while using different methods to create orthogonal bases. The resulting transforms represent a signal coding tool that stands between a pure VQ scheme on one extreme and signal-independent, fixed block transformation-like discrete cosine transform (DCT) on the other. The proposed technique has superior compaction performance as compared to DCT both in the rendition of details of the image and in the peak signal-to-noise ratio (PSNR) figures.  相似文献   
4.
RFID technology continues to flourish as an inherent part of virtually every ubiquitous environment. However, it became clear that the public—implying the industry—seriously needs mechanisms emerging the security and privacy issues for increasing RFID applications. As the nodes of RFID systems mostly suffer from low computational power and small memory size, various attempts which propose to implement the existing security primitives and protocols, have ignored the realm of the cost limitations and failed. In this study, two recently proposed protocols—SSM and LRMAP—claiming to meet the standard privacy and security requirements are analyzed. The design of both protocols based on defining states where the server authenticates the tag in constant time in a more frequent normal state and needs a linear search in a rare abnormal states. Although both protocols claim to provide untraceability criteria in their design objectives, we outline a generic attack that both protocols failed to fulfill this claim. Moreover, we showed that the SSM protocol is vulnerable to a desynchronization attack which prevents a server from authenticating a legitimate tag. Resultantly, we conclude that defining computationally unbalanced tag states yields to a security/scalability conflict for RFID authentication protocols.  相似文献   
5.
Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. That is, spectrum efficiency can be increased significantly by giving opportunistic access of the frequency bands to a group of cognitive users to whom the band has not been licensed. In this paper, as a cross layer application (MAC and physical layers) of graph theory, we consider the problem of throughput maximization of spectrum allocation in cognitive radio networks under interference constraint. We propose a novel auction-based channel allocation mechanism which tries to maximize both total and primary users’ utilities while satisfying signal to interference ratio constraint on primary receivers so that transmitted packets will be successfully received, without controlling secondary user powers. For comparison we discuss a greedy algorithm as well, however, one that does not handle interference issue. In order to compare results of proposed and greedy algorithms, we propose net throughput by taking into account outage probability of primary receiver. Simulation results show that exposing higher SINR (outage) threshold not only decreases total gain and primary users’ utilities but also worsens channel distribution performance. On the other hand adding auction mechanism significantly increases total gain throughput and primary user’ s utility. Particularly, up to SINR threshold values of 20 dBs, auction provides outstanding performance and proposed algorithm has total throughput results close to those of the greedy one even though no interference constraint is applied in the greedy algorithm. Another noticeable point of simulation results is crossover of net throughputs of proposed and greedy algorithms at a SINR threshold level after which results of ABSA-UNIC and NASA-UNIC are much better. This clearly shows superiority of proposed mechanism.  相似文献   
6.
Designing privacy preserving authentication protocols for massively deployed Radio Frequency IDentification (RFID) systems is a real world challenge that have drawn significant attention from RFID community. This interest yields considerable amount of proposals targeting to overcome the main bottleneck (i.e. the exhaustive search over the list of all tag entries) which appears in the back-end database for large-scale RFID tag deployments. A class of these proposals contains RFID protocols where the server authenticates the tag in a negligible constant/sub-linear time for a more frequent normal state and needs a linear search in a rare abnormal states. In this study, however, we show that such protocols having unbalanced states are subject to side-channel attacks and do not preserve the RFID privacy. To illustrate this brutal security flaw, we conduct our analysis on different RFID protocols.  相似文献   
7.
International Journal of Information Security - Exploring novel security layers in academia and industry is always a concern due to the types of malware developing currently. Adding a widely...  相似文献   
8.
The method presented by T. Katayama and T. Hirai (1990), who considered the problem of semicausal autoregressive (AR) parameter identification for images degraded by observation noise, is extended. In particular, an approach to identifying both the causal and semicausal AR parameters without a priori knowledge of the observation noise power is proposed. The image is decomposed into 1-D independent complex scalar subsystems resulting from the vector state-space model, using the unitary discrete Fourier transform (DFT). Then the expectation-maximization algorithm is applied to each subsystem to identify the AR parameters of the transformed image. The AR parameters of the original image are then identified using the least-square method. The restored image is obtained as a byproduct of the EM algorithm.  相似文献   
9.
We extend a method presented previously, which considers the problem of the semicausal autoregressive (AR) parameter identification for images degraded by observation noise only. We propose a new approach to identify both the causal and semicausal AR parameters and blur parameters without a priori knowledge of the observation noise power and the PSF of the degradation. We decompose the image into 1-D independent complex scalar subsystems resulting from the vector state-space model by using the unitary discrete Fourier transform (DFT). Then, by applying the expectation-maximization (EM) algorithm to each subsystem, we identify the AR model and blur parameters of the transformed image. The AR parameters of the original image are then identified by using the least squares (LS) method. The restored image is obtained as a byproduct of the EM algorithm.  相似文献   
10.
In this paper, the bit-search type irregular decimation algorithms, that are used within linear-feedback shift register (LFSR)-based stream ciphers, are investigated. In particular, bit-search generator (BSG) and and its variant ABSG are concentrated on and two different setups are considered for the analysis. In the first case, the input is assumed to be an m-sequence; it is shown that all possible output sequences can be classified into two sets, each of which is characterized by the equivalence of their elements up to shifts. Furthermore, it is proved that the cardinality of each of these sets is equal to the period of one of its elements and subsequently the (upper and lower) bounds on the expected output period (assuming that no subperiods exist) are derived. In the second setup, we work in a probabilistic framework and assume that the input sequence is evenly distributed (i.e., independent and identically distributed (i.i.d.) Bernoulli process with probability 1/2). Under these assumptions, closed-form expressions are derived for the distribution of the output length and the output rate, which is shown to be asymptotically Gaussian-distributed and concentrated around the mean with exponential tightness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号