In the issue of January, 2002, the magazine "Relation Between Both Sides of the Taiwan Straits" published by the Association of the Relation Between the Both Sides of the Taiwan Straits, a signed essay was c...In the issue of January, 2002, the magazine "Relation Between Both Sides of the Taiwan Straits" published by the Association of the Relation Between the Both Sides of the Taiwan Straits, a signed essay was carried out, stating that the development of the relation between the both sides last year, anticipates the trends of such relation in the future.展开更多
The data on the hillslope and channelized debris flows in the Shitou area of central Taiwan occurred during Typhoons Toraji and Nali in 2001 were applied in this paper. The geomorphic parameters, including the flow le...The data on the hillslope and channelized debris flows in the Shitou area of central Taiwan occurred during Typhoons Toraji and Nali in 2001 were applied in this paper. The geomorphic parameters, including the flow length, gully gradient, drainage area and form factor of the debris flows were determined by spatial analysis using a Geographic Information System (GIS) based on the data derived from field investigation, aerial photographs, and topographical maps. According to such determined geomorphic parameters, the threshold conditions and empirical equations, such as the relationship between the gully gradient and drainage area and that between gully length and drainage area and topographic parameter, are presented and used to distinguish the geomorphic characteristics between the channelized and hillslope debris flows.展开更多
Northward infl ow through the East Taiwan Channel is vital in modulation of water exchange processes off northeastern Taiwan,China.In addition to the eff ects of the Kuroshio Current and westward-propagating oceanic m...Northward infl ow through the East Taiwan Channel is vital in modulation of water exchange processes off northeastern Taiwan,China.In addition to the eff ects of the Kuroshio Current and westward-propagating oceanic mesoscale eddies,the seas off eastern Taiwan,China,are frequently infl uenced by typhoons.Focusing on extrema of East Taiwan Channel volume transport(ETCVT)that appear within days of typhoon infl uence,this study investigated 124 historical cyclones including 91 typhoons that passed over the study sea area off eastern Taiwan,China.Based on 25-year HYbrid Coordinate Ocean Model(HYCOM)data,71%of short-term(within 10 d)ETCVT absolute values with>5 Sv occurred under the infl uence of typhoons crossing the study sea area,and the maximum short-term ETCVT extrema induced by typhoons were 12.5 and-10.9 Sv.The ETCVT extrema induced by typhoons showed reasonable positive correlation with typhoon wind speed.More importantly,the ETCVT extrema diff ered in response to diff erent typhoon tracks.Three types of typhoon were identifi ed based on their track and impact on ETCVT.Representative typhoon cases were examined to elucidate the specifi cs of each typical response.Based on historical best track data and HYCOM data,it was established that Type I typhoons caused the ETCVT to exhibit a negative extremum followed by a positive extremum.All Type I,II,and III typhoons tended to result in typical ETCVT fl uctuations in the surface mixing layer above the depth of 50-100 m,while Type II typhoons were more likely to induce ETCVT fl uctuations in the subsurface layer.The fi ndings of this study enhance understanding of ETCVT extrema that occur following typhoon passage,which is valuable for short-term physical-biogeochemical studies both in the study region and in areas downstream owing to the large net volume transport changes induced by typhoons.展开更多
Taiwan Channel and environs developed typical collision structural zones in the Zhejiang-Fujian coast and Taiwan central mountain, analysis of which revealed their Late Mesozoic collision orogenesis.
In order to improve the efficiency and success rate of the side channel attack,the utility of side channel information of the attack object must be analyzed and evaluated before the attack implementation.Based on the ...In order to improve the efficiency and success rate of the side channel attack,the utility of side channel information of the attack object must be analyzed and evaluated before the attack implementation.Based on the study of side-channel attack techniques,a method is proposed in this paper to analyze and evaluate the utility of side channel information and the evaluation indexes of comentropy,Signal-to-Noise Ratio(SNR)are introduced.On this basis,the side channel information(power and electromagnetic)of a side channel attack experiment board is analyzed and evaluated,and the Data Encryption Standard(DES)cipher algorithm is attacked with the differential power attack method and differential electromagnetic attack method.The attack results show the effectiveness of the analysis and evaluation method proposed in this paper.展开更多
For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polariza...For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment.展开更多
Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased...Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased. Industry 4.0 concepts and sustainability expectations actually contribute to this performance improvement. Indeed, cybersecurity as one of these concepts is required to increase the company performance. Even if it is well-known and applied in companies through the protection of their information systems, progress is expected in research on how to ensure the security of data and factory processes in the manufacturing, as the number of cyberattacks towards industries is growing these last few years. This paper aims to increase the company performance and sustainability to enforce factory machines protection by creating private security network groups. But currently, most of the Programmable Logic Controller PLC protocols have not been securely designed. Thus, the creation of secure groups of machines by combining strong authentication, strong or lightweight ciphering, and data stream integrity is proposed. The security is enforced by a continuous key’s renewal algorithm. An experiment on an industry’s architecture has been led to validate the concepts of the proposition. The study is compared to existing OPC-UA and MACsec standards in terms of drawbacks and advantages. This work could be implemented in hardware for further performance improvement.展开更多
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s...The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed.展开更多
文摘In the issue of January, 2002, the magazine "Relation Between Both Sides of the Taiwan Straits" published by the Association of the Relation Between the Both Sides of the Taiwan Straits, a signed essay was carried out, stating that the development of the relation between the both sides last year, anticipates the trends of such relation in the future.
文摘The data on the hillslope and channelized debris flows in the Shitou area of central Taiwan occurred during Typhoons Toraji and Nali in 2001 were applied in this paper. The geomorphic parameters, including the flow length, gully gradient, drainage area and form factor of the debris flows were determined by spatial analysis using a Geographic Information System (GIS) based on the data derived from field investigation, aerial photographs, and topographical maps. According to such determined geomorphic parameters, the threshold conditions and empirical equations, such as the relationship between the gully gradient and drainage area and that between gully length and drainage area and topographic parameter, are presented and used to distinguish the geomorphic characteristics between the channelized and hillslope debris flows.
基金Supported by the National Natural Science Foundation of China(Nos.41630967,42076002,41776020,41476018)。
文摘Northward infl ow through the East Taiwan Channel is vital in modulation of water exchange processes off northeastern Taiwan,China.In addition to the eff ects of the Kuroshio Current and westward-propagating oceanic mesoscale eddies,the seas off eastern Taiwan,China,are frequently infl uenced by typhoons.Focusing on extrema of East Taiwan Channel volume transport(ETCVT)that appear within days of typhoon infl uence,this study investigated 124 historical cyclones including 91 typhoons that passed over the study sea area off eastern Taiwan,China.Based on 25-year HYbrid Coordinate Ocean Model(HYCOM)data,71%of short-term(within 10 d)ETCVT absolute values with>5 Sv occurred under the infl uence of typhoons crossing the study sea area,and the maximum short-term ETCVT extrema induced by typhoons were 12.5 and-10.9 Sv.The ETCVT extrema induced by typhoons showed reasonable positive correlation with typhoon wind speed.More importantly,the ETCVT extrema diff ered in response to diff erent typhoon tracks.Three types of typhoon were identifi ed based on their track and impact on ETCVT.Representative typhoon cases were examined to elucidate the specifi cs of each typical response.Based on historical best track data and HYCOM data,it was established that Type I typhoons caused the ETCVT to exhibit a negative extremum followed by a positive extremum.All Type I,II,and III typhoons tended to result in typical ETCVT fl uctuations in the surface mixing layer above the depth of 50-100 m,while Type II typhoons were more likely to induce ETCVT fl uctuations in the subsurface layer.The fi ndings of this study enhance understanding of ETCVT extrema that occur following typhoon passage,which is valuable for short-term physical-biogeochemical studies both in the study region and in areas downstream owing to the large net volume transport changes induced by typhoons.
基金Contribution No. 2206 from the Institute of Oceanology, Chinese Academy of SciencesThis work is supported by NSFC grant (No. 9490011-3)
文摘Taiwan Channel and environs developed typical collision structural zones in the Zhejiang-Fujian coast and Taiwan central mountain, analysis of which revealed their Late Mesozoic collision orogenesis.
文摘In order to improve the efficiency and success rate of the side channel attack,the utility of side channel information of the attack object must be analyzed and evaluated before the attack implementation.Based on the study of side-channel attack techniques,a method is proposed in this paper to analyze and evaluate the utility of side channel information and the evaluation indexes of comentropy,Signal-to-Noise Ratio(SNR)are introduced.On this basis,the side channel information(power and electromagnetic)of a side channel attack experiment board is analyzed and evaluated,and the Data Encryption Standard(DES)cipher algorithm is attacked with the differential power attack method and differential electromagnetic attack method.The attack results show the effectiveness of the analysis and evaluation method proposed in this paper.
基金supported by the National Key Research and Development Program of China under Grant No.2017YFA0303704National Natural Science Foundation of China under Grants No.61575102,No.61671438,No.61875101,and No.61621064+1 种基金Beijing Natural Science Foundation under Grant No.Z180012Beijing Academy of Quantum Information Sciences under Grant No.Y18G26
文摘For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment.
文摘Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased. Industry 4.0 concepts and sustainability expectations actually contribute to this performance improvement. Indeed, cybersecurity as one of these concepts is required to increase the company performance. Even if it is well-known and applied in companies through the protection of their information systems, progress is expected in research on how to ensure the security of data and factory processes in the manufacturing, as the number of cyberattacks towards industries is growing these last few years. This paper aims to increase the company performance and sustainability to enforce factory machines protection by creating private security network groups. But currently, most of the Programmable Logic Controller PLC protocols have not been securely designed. Thus, the creation of secure groups of machines by combining strong authentication, strong or lightweight ciphering, and data stream integrity is proposed. The security is enforced by a continuous key’s renewal algorithm. An experiment on an industry’s architecture has been led to validate the concepts of the proposition. The study is compared to existing OPC-UA and MACsec standards in terms of drawbacks and advantages. This work could be implemented in hardware for further performance improvement.
文摘The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed.