期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
1
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
ON CLASSICAL BCH CODES AND QUANTUM BCH CODES 被引量:3
2
作者 Xu Yajie Ma Zhi Zhang Chunyuan 《Journal of Electronics(China)》 2009年第1期64-70,共7页
It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its des... It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions. 展开更多
关键词 Quantum error-correcting codes Bose-Chaudhuri-Hocquenghem (BCH) codes Self-orthogonal Euclidean dual Hermitian dual
下载PDF
A New Provably-Secure Key Agreement Protocol for Roaming in Mobile Networks 被引量:1
3
作者 LI Guangsong WANG Penghai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期605-608,共4页
Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. I... Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model. 展开更多
关键词 mobile network ROAMING key agreement provablesecurity
下载PDF
ALTERNATING DIRECTIONFINITE ELEMENT METHOD FORSOME REACTION DIFFUSION MODELS
4
作者 江成顺 刘蕴贤 沈永明 《Numerical Mathematics A Journal of Chinese Universities(English Series)》 SCIE 2004年第2期172-182,共11页
This paper is concerned with some nonlinear reaction - diffusion models. To solve this kind of models, the modified Laplace finite element scheme and the alternating direction finite element scheme are established for... This paper is concerned with some nonlinear reaction - diffusion models. To solve this kind of models, the modified Laplace finite element scheme and the alternating direction finite element scheme are established for the system of patrical differential equations. Besides, the finite difference method is utilized for the ordinary differential equation in the models. Moreover, by the theory and technique of prior estimates for the differential equations, the convergence analyses and the optimal L2- norm error estimates are demonstrated. 展开更多
关键词 非线性反应扩散模型 Laplace有限元方法 有限差分法 L^2-标准误差估计
下载PDF
ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS
5
作者 李大兴 陆浪如 李大为 《Journal of Electronics(China)》 1994年第4期289-295,共7页
The real polynomial type public-key cryptosystems are broken up by computing the equivalent secure keys, then some computational problems related to securities of cryptosystems are discussed.
关键词 CRYPTANALYSIS Public-key CRYPTOSYSTEM COMPUTATION
下载PDF
0,1 distribution in the highest level sequences of primitive sequences over Z2e 被引量:1
6
作者 范淑琴 韩文报 《Science China Mathematics》 SCIE 2003年第4期516-524,共9页
In this paper, we discuss the 0, 1 distribution in the highest level sequence ae-1 of primitive sequence over Z2e generated by a primitive polynomial of degree n. First we get an estimate of the 0, 1 distribution by u... In this paper, we discuss the 0, 1 distribution in the highest level sequence ae-1 of primitive sequence over Z2e generated by a primitive polynomial of degree n. First we get an estimate of the 0, 1 distribution by using the estimates of exponential sums over Galois rings, which is tight for e relatively small to n. We also get an estimate which is suitable for e relatively large to n. Combining the two bounds, we obtain an estimate depending only on n, which shows that the larger n is, the closer to 1/2 the proportion of 1 will be. 展开更多
关键词 primitive sequence highest level sequence Galois ring exponential sum over Galois ring 0 1 distribution
原文传递
Using Micro-Level Data to Evaluate Infrastructure of the Walking Environment Around Bus Rapid Transit Stations:A Case Study of Xiamen,China 被引量:1
7
作者 Xu Junping Wang Peng +1 位作者 Kenneth Joh Bi Bo 《China City Planning Review》 CSCD 2016年第2期18-25,共8页
China has experienced rapid car-oriented suburbanization during the past decades and is facing emerging challenges such as traffic congestion,air pollution,and even health threats.Learning from North American cities,C... China has experienced rapid car-oriented suburbanization during the past decades and is facing emerging challenges such as traffic congestion,air pollution,and even health threats.Learning from North American cities,Chinese cities have started adopting and implementing a Transit-Oriented Development(TOD) strategy,which encourages the transit ridership and walking trips by creating a pedestrian-friendly urban environment.Although much research has examined the walking environment in various neighborhoods or communities,few existing studies have examined the walking environment around transit stations,especially using micro-level data,such as walking infrastructure variables.This research chooses several infrastructure variables that are critical for pedestrians to investigate the walking environment around stations of the Bus Rapid Transit(BRT) No.1 Line in Xiamen City,China.This study defines a half mile buffer centered on each station as the spatial unit of analysis.The Geographic Information System(GIS) and field audits are employed to measure the characteristics of the infrastructure for pedestrians in each spatial unit of analysis.The results of this analysis can help assess the existing conditions of the infrastructure for pedestrians in each station area,which might need to be added or improved.The findings will not only provide empirical support for improving TODs in Xiamen,but also offer a lesson on how areas around transit stations could be retrofitted to improve the pedestrian environment. 展开更多
关键词 INFRASTRUCTURE TOD WALKING
原文传递
Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift
8
作者 CHEN Biao ZHANG Weiming YU Nenghai 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期126-132,共7页
Reversible watermarking has extensive applications in fields such as medical data management and forensic enforcement. In this article, we propose a modified reverse zero-run length (RZL) coding method for reversibl... Reversible watermarking has extensive applications in fields such as medical data management and forensic enforcement. In this article, we propose a modified reverse zero-run length (RZL) coding method for reversible watermarking, which intro- duces fewer modifications to cover than previous ones under the same embedding rate. By combining the coding method with his- togram shift and quantization table modification strategy, we pro- pose a novel reversible data hiding algorithm for JPEG images. Compared with previous art, when embedding the same payload, our method has an improvement of at least 2 dB in stego image's quality, which proves the effectiveness and advantage of our algo- rithm. 展开更多
关键词 reversible watermarking JPEG images image au-thentication PAYLOAD PSNR
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部