The calculating methods for path number and path matrix of ventilation net- works without unidirectional circuits were introduced,and the inapplicability problem of the matrix algorithm to determine paths in a ventila...The calculating methods for path number and path matrix of ventilation net- works without unidirectional circuits were introduced,and the inapplicability problem of the matrix algorithm to determine paths in a ventilation network with unidirectional circuit was brought forward,and a depth-first search method based algorithm to determine path ma- trix by means of modifying search strategies was discussed.The method is suitable for ventilation networks with unidirectional circuits and ventilation networks without unidirec- tional circuits,moreover the complexity is less than the complexities of matrix based algo- rithms.A series of methods and means to avoid and to reduce the negative effects of un- idirectional circuits such as the optimum of the positions of fan stations,the increase or de-crease of fan station numbers,the optimum regulation of network and the analysis of diagonal structures were put forward.展开更多
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to...This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.展开更多
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a...A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed.展开更多
2003年Akavia基于列表译码提出研究硬核谓词的一般框架,并将该方法成功地应用于许多硬核谓词的研究.但是,对于ax+b mod p的任意比特是任意单向函数的硬核谓词,这个关于单向函数的一般性结论能否适用,仍是一个公开问题.文章利用这种新方...2003年Akavia基于列表译码提出研究硬核谓词的一般框架,并将该方法成功地应用于许多硬核谓词的研究.但是,对于ax+b mod p的任意比特是任意单向函数的硬核谓词,这个关于单向函数的一般性结论能否适用,仍是一个公开问题.文章利用这种新方法研究积性码可接近的单向陷门函数的比特安全性,并且证明ax+b mod p的任意比特是p阶循环群上该类单向函数的硬核谓词.展开更多
文摘The calculating methods for path number and path matrix of ventilation net- works without unidirectional circuits were introduced,and the inapplicability problem of the matrix algorithm to determine paths in a ventilation network with unidirectional circuit was brought forward,and a depth-first search method based algorithm to determine path ma- trix by means of modifying search strategies was discussed.The method is suitable for ventilation networks with unidirectional circuits and ventilation networks without unidirec- tional circuits,moreover the complexity is less than the complexities of matrix based algo- rithms.A series of methods and means to avoid and to reduce the negative effects of un- idirectional circuits such as the optimum of the positions of fan stations,the increase or de-crease of fan station numbers,the optimum regulation of network and the analysis of diagonal structures were put forward.
文摘This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.
文摘A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed.
文摘2003年Akavia基于列表译码提出研究硬核谓词的一般框架,并将该方法成功地应用于许多硬核谓词的研究.但是,对于ax+b mod p的任意比特是任意单向函数的硬核谓词,这个关于单向函数的一般性结论能否适用,仍是一个公开问题.文章利用这种新方法研究积性码可接近的单向陷门函数的比特安全性,并且证明ax+b mod p的任意比特是p阶循环群上该类单向函数的硬核谓词.