Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource alloc...In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource allocation algorithm based on noncooperation game theory is proposed to manage the resource allocation in UDNs, including transmission point association, user channels, and power. The algorithm derives a multidimensional resource optimization model and converts into a noncooperation game model according to the analysis of transmission point association user channel and power allocation. The algorithm includes two phases: transmission point association, and channel and power allocation. Then, feasible domain and discrete variables relaxation approaches are introduced to derive an approximate optimal multidimensional resource allocation solution with low complexity. Simulation results show that this method has some advantages in suppressing interference and improves the overall system throughput, while ensuring the QoS of femtocell users.展开更多
According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous...According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous snakeskin patterns reveal themselves as conflatable. Furthermore, following tractogra<span><span><span style="font-family:;" "="">- </span></span></span><span><span><span style="font-family:;" "="">phic research, a functional segregation of the subcortical pathway is to be <span>presupposed. Thus, there can’t be a later dissociation of two stimuli pre</span>viously associated. The outc</span></span></span><span><span><span style="font-family:;" "="">omes of lecture will gradually appear probabilistically <span>(much) more peaceful than encountering a venomous snake, though, and</span> thus a continuous lessening of the reaction is expectable. Here, on one hand, it is relevant that the subcortical visual pathway goes to the amygdala. The reactions we describe tap into goal-oriented processes, and they will do that un<span>fettered. On the other hand, in the case of characters, since the beginning,</span> fear has been converted into appetition to a great degree. This process should be fostered in the presence of light. In this way, luminosity might become a conditioned stimulus for attraction. In this case, a Pavlovian addiction for light <span>will foster, yet also—from the point of view of reward fee</span>ling—counterbalance the lessening of the stimulation elicited by characters. The addiction we refer to is one towards light accompanied by graphic signs. Yet, as opposed to the case of the luminous medium, the attention captured by the later ones taken for themselves is continuously reduced.</span></span></span>展开更多
Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the...Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.展开更多
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
基金supported by Natural Science Foundation of China (61372125)973 project (2013CB329104)+1 种基金Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (16KJA510005)the open research fund of National Mobile Communications Research Laboratory, Southeast University (2013D01, 2015D10)
文摘In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource allocation algorithm based on noncooperation game theory is proposed to manage the resource allocation in UDNs, including transmission point association, user channels, and power. The algorithm derives a multidimensional resource optimization model and converts into a noncooperation game model according to the analysis of transmission point association user channel and power allocation. The algorithm includes two phases: transmission point association, and channel and power allocation. Then, feasible domain and discrete variables relaxation approaches are introduced to derive an approximate optimal multidimensional resource allocation solution with low complexity. Simulation results show that this method has some advantages in suppressing interference and improves the overall system throughput, while ensuring the QoS of femtocell users.
文摘According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous snakeskin patterns reveal themselves as conflatable. Furthermore, following tractogra<span><span><span style="font-family:;" "="">- </span></span></span><span><span><span style="font-family:;" "="">phic research, a functional segregation of the subcortical pathway is to be <span>presupposed. Thus, there can’t be a later dissociation of two stimuli pre</span>viously associated. The outc</span></span></span><span><span><span style="font-family:;" "="">omes of lecture will gradually appear probabilistically <span>(much) more peaceful than encountering a venomous snake, though, and</span> thus a continuous lessening of the reaction is expectable. Here, on one hand, it is relevant that the subcortical visual pathway goes to the amygdala. The reactions we describe tap into goal-oriented processes, and they will do that un<span>fettered. On the other hand, in the case of characters, since the beginning,</span> fear has been converted into appetition to a great degree. This process should be fostered in the presence of light. In this way, luminosity might become a conditioned stimulus for attraction. In this case, a Pavlovian addiction for light <span>will foster, yet also—from the point of view of reward fee</span>ling—counterbalance the lessening of the stimulation elicited by characters. The addiction we refer to is one towards light accompanied by graphic signs. Yet, as opposed to the case of the luminous medium, the attention captured by the later ones taken for themselves is continuously reduced.</span></span></span>
文摘Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.