期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
1
作者 zhicai shi shitao Ren +1 位作者 Fei Wu Changzhi Wang 《Journal of Computer and Communications》 2016年第8期1-9,共9页
The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most... The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols. 展开更多
关键词 RFID Authentication Protocol VULNERABILITY Hash Function Security and Privacy
下载PDF
Simulation of Passenger Behavior in Virtual Subway Station Based on Multi-Agent
2
作者 Yan Li Zequn Li +4 位作者 Fengting Yan Yu Wei Linghong Kong zhicai shi Lei Qiao 《国际计算机前沿大会会议论文集》 2020年第2期393-408,共16页
According to architectural structure of underground station and condition of passengers,the emergency evacuations are extremely important during emergency accidents caused in the stations.Based on the architectural fe... According to architectural structure of underground station and condition of passengers,the emergency evacuations are extremely important during emergency accidents caused in the stations.Based on the architectural features and situation of passengers in the station,Multi-Agent system is proposed to analyze passengers’behavior and elements which affect passengers’behavior.Base on the crowd mentality,the model of selective behavior of passengers’route was established to simulate passengers’actions during emergency accidents.It is feasible to find out the influence brought by crowd mentality affect the emergency evacuations,and the influence of remitting the situation from external factor through WebVR.At last,it provides references for emergency evacuation strategy. 展开更多
关键词 Underground station Emergency accidents Passengers’behavior MULTI-AGENT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部