Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artifici...Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.展开更多
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony...In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme.展开更多
The paper proposes the identification method of linear and non-linear chromatographic system. Isotherms and lumped mass transfer coefficients of chromatography separating isomer sorbitol and mannitol on D80 adsorbent ...The paper proposes the identification method of linear and non-linear chromatographic system. Isotherms and lumped mass transfer coefficients of chromatography separating isomer sorbitol and mannitol on D80 adsorbent are determined. The analyses of root mean square error of chromatography elution curves are carried out. The results show that the system studied is non-linear and the theoretical elution curves of the non-linear chromatographic model are more accurate than those of the linear chromatographic model. Results of parameter sensitivity analyses show that elution curves of non-linear chromatographic separation are more sensitive to the variation of parameter "ai" in the adsorption isotherms than to the variation of parameter "bi" as well as lumped mass transfer coefficients.展开更多
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed...In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology.展开更多
In China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.In fact, although som...In China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.In fact, although some other countries do not admit the qualification of children witnesses under certain age, they do not take it as the factor to measure whether a witness has qualification or not. It is the judge who can decide whether a witness has qualification or not. Based on the these foreign countries's experience, we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability, we should embody this particularity when we judge children's testimony and protect children witnesses.展开更多
The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To re...The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To reduce the authentication costs associated with communication,computation and energy,this paper proposes a simple and low-cost re-authentication protocol that does not compromise the provided security services.The proposed protocol uses as the re-authentication parameter a Master Session Key(MSK)that has already been computed in the initial authentication,and does not require the full initial authentication to be repeated.Moreover,the proposed protocol does not modify the 3GPP infrastructure,and is easily applied to the HeNB system.Finally,the security of the proposed protocol is verified by Automated Validation of Internet Security Protocols and Applications(AVISPA)and Burrows-Abadi-Needham(BAN)Logic;detailed evaluations of performance are also given.The analysis results illustrate that the proposed protocol can achieve at least 50%cost reduction in communication and 58%cost reduction in energy.The computational cost is also reduced by half compared with the initial authentication.展开更多
The stronglink with muhi-try function based on MEMS technology and the PC startup in authentication system have been designed and fabricated. The generation principle and structure of UQS code are introduced, which co...The stronglink with muhi-try function based on MEMS technology and the PC startup in authentication system have been designed and fabricated. The generation principle and structure of UQS code are introduced, which consists of two groups of metal counter-meshing gears, two pawl/ratchet mechanisms, two driving micromotors and two resetting micromotors. The energy-coupling element is a photoelectric sensor with a circular and notched plate. It is fabricated using the UV-LiGA process and precision mechanical engineering. The PC startup authentication system is controlled by BIOS program, which is written into the chip according with special format. The program in BIOS output signals controls the running of stronglink to finish the process of authentication. The device can run more than 10000 times before a stop. The driving voltage is 12 V, and the normal decoding time is 3 s.展开更多
In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plu...In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied.展开更多
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be...A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.展开更多
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr...Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,展开更多
in China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.in fact, although som...in China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.in fact, although some other countries do not admit the qualification of children witnesses under certain age,they do not take it as the factor to measure whether a witness has qualification or not.It is the judge who can decide whether a witness has qualification or not.Based on the these foreign counlries' s experience,we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability,we should embody this particularity when we judge children's testimony and protect children witnesses.展开更多
Management has addressed the critical issue of environmental protection by developing environmental management systems. The purpose of this research is to describe the organizational structure for environmental protec...Management has addressed the critical issue of environmental protection by developing environmental management systems. The purpose of this research is to describe the organizational structure for environmental protection, an attribute of environmental management systems of privately held companies, certified with MS ISO 14001. Descriptive statistics are reported for the primary data. The commonly reported attributes provide evidence of high-level commitment to environmental protection: written environmental policy statement, corporate-level environmental management function, and Board of Directors' responsibility for oversight of environmental affairs. Findings indicate that companies have educational programs and environmental goals to disseminate environmental management values throughout their organizations.展开更多
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res...Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.展开更多
One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begu...One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begun to be designed and implemented based on digital technology with online and real time performance to achieve high speed and high density operation. The software is designed, coded and implemented into the system, and controls hardware components in order to satisfy the functional requirements of the system. As the functions that are implemented by software are increased, it becomes very difficult to predict the soil-ware failures because of its complexity. Therefore, it has become one of the key issues how to assure that the sottware is reliable, safe and secure. In this paper, the safety criteria are suggested to secure the software safety for the field of railway system. Characteristic of railway software and review safety related standards are analyzed. The authors also suggest development methodology and certification procedure for the developer and assessor to easily make safety critical railway software with following the safety criteria.展开更多
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t...Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender.展开更多
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processi...In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.展开更多
基金supported by the NSFC (U1536206,61232016,U1405254,61373133, 61502242)BK20150925the PAPD fund
文摘Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.
基金supported in part by the European Commission Marie Curie IRSES project "AdvIOT"the National Natural Science Foundation of China (NSFC) under grant No.61372103
文摘In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme.
文摘The paper proposes the identification method of linear and non-linear chromatographic system. Isotherms and lumped mass transfer coefficients of chromatography separating isomer sorbitol and mannitol on D80 adsorbent are determined. The analyses of root mean square error of chromatography elution curves are carried out. The results show that the system studied is non-linear and the theoretical elution curves of the non-linear chromatographic model are more accurate than those of the linear chromatographic model. Results of parameter sensitivity analyses show that elution curves of non-linear chromatographic separation are more sensitive to the variation of parameter "ai" in the adsorption isotherms than to the variation of parameter "bi" as well as lumped mass transfer coefficients.
文摘In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology.
文摘In China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.In fact, although some other countries do not admit the qualification of children witnesses under certain age, they do not take it as the factor to measure whether a witness has qualification or not. It is the judge who can decide whether a witness has qualification or not. Based on the these foreign countries's experience, we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability, we should embody this particularity when we judge children's testimony and protect children witnesses.
基金supported by the China Scholarship Councilthe National Natural Science Foundation of China under Grants No. 60772136, No. 61102056+1 种基金the Fundamental Research Funds for the Central Universities under Grant No. JY10000901025the project supported by Natural Science Basic Research Plan in Shaanxi Province of China under Grant No. 2011JQ8042
文摘The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To reduce the authentication costs associated with communication,computation and energy,this paper proposes a simple and low-cost re-authentication protocol that does not compromise the provided security services.The proposed protocol uses as the re-authentication parameter a Master Session Key(MSK)that has already been computed in the initial authentication,and does not require the full initial authentication to be repeated.Moreover,the proposed protocol does not modify the 3GPP infrastructure,and is easily applied to the HeNB system.Finally,the security of the proposed protocol is verified by Automated Validation of Internet Security Protocols and Applications(AVISPA)and Burrows-Abadi-Needham(BAN)Logic;detailed evaluations of performance are also given.The analysis results illustrate that the proposed protocol can achieve at least 50%cost reduction in communication and 58%cost reduction in energy.The computational cost is also reduced by half compared with the initial authentication.
基金Sponsored by the National High Technology Research and Development Program (863 ) of China (Grant No.2003AA404210, 2005AA404250,2003AA404210, 2006AA01Z443)
文摘The stronglink with muhi-try function based on MEMS technology and the PC startup in authentication system have been designed and fabricated. The generation principle and structure of UQS code are introduced, which consists of two groups of metal counter-meshing gears, two pawl/ratchet mechanisms, two driving micromotors and two resetting micromotors. The energy-coupling element is a photoelectric sensor with a circular and notched plate. It is fabricated using the UV-LiGA process and precision mechanical engineering. The PC startup authentication system is controlled by BIOS program, which is written into the chip according with special format. The program in BIOS output signals controls the running of stronglink to finish the process of authentication. The device can run more than 10000 times before a stop. The driving voltage is 12 V, and the normal decoding time is 3 s.
文摘In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied.
文摘A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.
基金This paper has been performed in the Project "Key Technology Research of Eavesdropping Detection in the Quantum Security Communication" supported by the National Natural Science Foundation of China
文摘Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,
文摘in China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.in fact, although some other countries do not admit the qualification of children witnesses under certain age,they do not take it as the factor to measure whether a witness has qualification or not.It is the judge who can decide whether a witness has qualification or not.Based on the these foreign counlries' s experience,we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability,we should embody this particularity when we judge children's testimony and protect children witnesses.
文摘Management has addressed the critical issue of environmental protection by developing environmental management systems. The purpose of this research is to describe the organizational structure for environmental protection, an attribute of environmental management systems of privately held companies, certified with MS ISO 14001. Descriptive statistics are reported for the primary data. The commonly reported attributes provide evidence of high-level commitment to environmental protection: written environmental policy statement, corporate-level environmental management function, and Board of Directors' responsibility for oversight of environmental affairs. Findings indicate that companies have educational programs and environmental goals to disseminate environmental management values throughout their organizations.
文摘Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.
文摘One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begun to be designed and implemented based on digital technology with online and real time performance to achieve high speed and high density operation. The software is designed, coded and implemented into the system, and controls hardware components in order to satisfy the functional requirements of the system. As the functions that are implemented by software are increased, it becomes very difficult to predict the soil-ware failures because of its complexity. Therefore, it has become one of the key issues how to assure that the sottware is reliable, safe and secure. In this paper, the safety criteria are suggested to secure the software safety for the field of railway system. Characteristic of railway software and review safety related standards are analyzed. The authors also suggest development methodology and certification procedure for the developer and assessor to easily make safety critical railway software with following the safety criteria.
基金supported by the National Natural Science Foundation of China (Grant No. 61173157)Strategy Pilot Project of Chinese Academy of Sciences (Grant No. Sub-project XD06010702)IIE’s Cryptography Research Project
文摘Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender.
基金the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and2007AA01Z473)
文摘In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.