Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ...Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.展开更多
Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithm...Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively.展开更多
In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in w...In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect from the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to wait for more coded packets in the following time slots.展开更多
Global changes, including the rise of the sea level and frequent terrible disasters, are apparently threatening the living environment. For environmental mitigation, security, and sustainability, Taiwan should have re...Global changes, including the rise of the sea level and frequent terrible disasters, are apparently threatening the living environment. For environmental mitigation, security, and sustainability, Taiwan should have reliable, incorporative area-based security-information networks to protect their environments. Plural (dual) surveillance which is rooted in biologic senses, e.g., from two-eyes, can have the feature of fault-tolerance, availability and maintainability in monitoring tasks. Further, it can fit the contemporary wireless communication methods being incorporated with MIMO (multi-in multi-out), to prevent information loss, interference, unexpected changes caused by such as clogged water and chemical reactions. Consequently, network prototypes, including SW (spider-web)network and CCC (cube-connected cycle), are proactively suggested. More reliable capabilities, including those encouraging local ferries and drones, for efficient logistic operation and mixed-use buildings with quality assured performance, can be good for smart urban growth, resource utilization in Taiwan, which is aimed as an aerotropolis--a means for placemaking.展开更多
Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has de...Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.展开更多
基金supported by the National Key Research and Development Program of China (No. 2017YFC0820603)
文摘Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.
文摘Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively.
文摘In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect from the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to wait for more coded packets in the following time slots.
文摘Global changes, including the rise of the sea level and frequent terrible disasters, are apparently threatening the living environment. For environmental mitigation, security, and sustainability, Taiwan should have reliable, incorporative area-based security-information networks to protect their environments. Plural (dual) surveillance which is rooted in biologic senses, e.g., from two-eyes, can have the feature of fault-tolerance, availability and maintainability in monitoring tasks. Further, it can fit the contemporary wireless communication methods being incorporated with MIMO (multi-in multi-out), to prevent information loss, interference, unexpected changes caused by such as clogged water and chemical reactions. Consequently, network prototypes, including SW (spider-web)network and CCC (cube-connected cycle), are proactively suggested. More reliable capabilities, including those encouraging local ferries and drones, for efficient logistic operation and mixed-use buildings with quality assured performance, can be good for smart urban growth, resource utilization in Taiwan, which is aimed as an aerotropolis--a means for placemaking.
基金Supported by the National High Technology Research and Development Program of China(No.2006AA12Z210)
文摘Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.