Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
With the prevalence of Internet of Things(loT)devices,data collection has the potential to improve people's lives and create a significant value.However,it also exposes sensitive information,which leads to privacy...With the prevalence of Internet of Things(loT)devices,data collection has the potential to improve people's lives and create a significant value.However,it also exposes sensitive information,which leads to privacy risks.An approach called N-source anonymity has been used for privacy preservation in raw data collection,but most of the existing schemes do not have a balanced efficiency and robustness.In this work,a lightweight and efficient raw data collection scheme is proposed.The proposed scheme can not only collect data from the original users but also protect their privacy.Besides,the proposed scheme can resist user poisoning attacks,and the use of the reward method can motivate users to actively provide data.Analysis and simulation indicate that the proposed scheme is safe against poison attacks.Additionally,the proposed scheme has better performance in terms of computation and communication overhead compared to existing methods.High efficiency and appropriate incentive mechanisms indicate that the scheme is practical for IoT systems.展开更多
In this paper, we apply Aubry-Mather theory developed in recent years about monotone twist mappings to the study of the superlinear Duffing equation+g(x)=p(t), (0)where p(t)∈C^0(R) is periodic with period 1 and g(x) ...In this paper, we apply Aubry-Mather theory developed in recent years about monotone twist mappings to the study of the superlinear Duffing equation+g(x)=p(t), (0)where p(t)∈C^0(R) is periodic with period 1 and g(x) satisfies the superlinearity condition Consequently, this gives descriptions of the global dynamical behavior, particularly periodic solutions and quasi-periodic solutions of a wide class of Eq. (0), not requiring high order smoothness assumption.展开更多
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
基金supported in part by the National Natural Science Foundation of China(62072133)the Innovation Project of Guangxi Graduate Education(YCSW2022279)Wenzhou Science and Technology Plan(2023ZW0013).
文摘With the prevalence of Internet of Things(loT)devices,data collection has the potential to improve people's lives and create a significant value.However,it also exposes sensitive information,which leads to privacy risks.An approach called N-source anonymity has been used for privacy preservation in raw data collection,but most of the existing schemes do not have a balanced efficiency and robustness.In this work,a lightweight and efficient raw data collection scheme is proposed.The proposed scheme can not only collect data from the original users but also protect their privacy.Besides,the proposed scheme can resist user poisoning attacks,and the use of the reward method can motivate users to actively provide data.Analysis and simulation indicate that the proposed scheme is safe against poison attacks.Additionally,the proposed scheme has better performance in terms of computation and communication overhead compared to existing methods.High efficiency and appropriate incentive mechanisms indicate that the scheme is practical for IoT systems.
文摘In this paper, we apply Aubry-Mather theory developed in recent years about monotone twist mappings to the study of the superlinear Duffing equation+g(x)=p(t), (0)where p(t)∈C^0(R) is periodic with period 1 and g(x) satisfies the superlinearity condition Consequently, this gives descriptions of the global dynamical behavior, particularly periodic solutions and quasi-periodic solutions of a wide class of Eq. (0), not requiring high order smoothness assumption.