The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID systems...
This paper introduced a method for biometric authentication using EEG signals. Especially, we focused on the performance of reproducibility for personal authentication. Four healthy subjects participated in the experiment. EEG was measured from only one bipolar channel (O1A2) during resting state with closed eyes. EEG was also recorded with same protocol from same subjects on different days to verify...
Motor imagery brain-computer interface (BCI) is a system that sends commands from human to external devices using brain activity patterns of imagination of a motor action without an actual movement. In this paper, we compared classification performance among the various combinations of motor imagery tasks, toward the multi-dimensional control of motor imagery BCI. We used EEG motor imagery dataset...
Hybrid scenario is an operational regime designed to achieve a long pulse operation with a combination of inductive and non-inductive current drive. It was suggested for the operation of ITER to allow high fusion power in long pulse operations over 1000 s at a plasma current lower than the inductive reference scenario. Engineering tests of reactor-relevant components, such as breeding blankets are...
In the last few years, researchers have extensively studied the key exchange protocol. In 2007, Kwon et al. proposed a simple three-step key exchange protocol using smart card. In 2008, Chen and Lee proposed a secure and efficient user authentication scheme using smart card that is modified to enhance the security of the series of the Peyravian-Zunic scheme. The current paper demonstrates the vulnerability...
With the increase of the number of the blind, demand for visual prosthesis is increasing. Text reading is one of the most important visual functions to the blind. Therefore human trials and simulations of prosthetic vision have already been carried out for testing an improved system or studying rehabilitation of people who implant prosthesis. But although forms of electrode arrays used in those studies...
In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of-initiator attack and...
RFID technology has become one of the most hotly debated ubiquitous computing technologies, and public fears of its alleged capability for comprehensive surveillance have prompted a flurry of research trying to alleviate such concerns. Security mechanisms for RFID systems are therefore of utmost important. In this paper, we describe problems of previous work on RFID security protocols and specify...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
In this paper, we present a new artificial muscle actuator for the robotic applications, called multi-stacked actuator. This actuator is made from a new material, named synthetic elastomer previously developed by ourselves. The synthetic elastomer displays enhanced performance in terms of electrical as well as mechanical properties, which can be adjusted depending on its applications. The actuator...
In spite of application potentiality of RFID technology is un-describable, the RFID system has several privacy related problems such as the data leakage and data traceability which should be resolved before its pervasive employment. For this reason, a security protocol for the RFID system protection is considered to be the best solution to prevent the privacy related problems. However, previously...
The growing use of radio frequency identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID systems...
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept...
This paper describes the design and test results of a high performance low noise amplifier (LNA) for code division multiple access (CDMA) one chip transceiver integrated circuit (IC). The circuits are implemented in a standard 0.35-um Samsung Si/Ge BiCMOS process. The LNA has 4 step forward gain control of 15.8 dB, 4 dB, -7.5 dB, and -21 dB. The measured performance of the proposed LNA at the maximum...
RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security...
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol,...
Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost importance. In this paper, we describe problems of previous works on RFID security protocol and specify...
The common electronic purse specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities...
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification...
Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.