The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any attribute authority (AA) can independently join and leave the system without collaborating with the existing AAs. In this paper, we propose a user collusion avoidance scheme which preserves the user's privacy when they interact with multiple authorities to obtain decryption credentials. The proposed...
This paper presents an identity-based dynamic authenticated group key agreement (DAGKA) protocol with following advantages. The algorithms of Setup and Join has only one round communication. There is no message exchange among members in Leave algorithm. Joining members cannot know previous session keys and leaving members cannot know future session keys. Its AKE-security is proved under Decisional...
Aiming at present ability and requirement of our Chinese global emergency communication system, a three-layered architectural framework, involving top layer, mid layer and bottom layer, is designed for global emergency communication system. The proposed system uses geosynchronous TDRSS as top layer facilities to achieve global communication coverage and stable system structure. Further, mid layer...
Communication technologies, involving fieldbus network, Wireless Sensor Network (WSN) and industrial Ethernet, are mainly applied to complex industrial applications like continuous casting field, in order to transmit information. However, there're still some shortcomings exposed and certain higher requirements such as compatibility, expansibility, and transmission distance and speed have been put...
Internet of Things solutions are typically domain-specific, relying on heterogeneous hardware, communication protocols and data models. In such system environments, the deployment of IoT applications is very intricate. The application environments differ from one system to another and service management procedures are non-standardized, making it hard for solution providers to efficiently deploy and...
The early degeneration of articular cartilage (AC) is closely related to the change in glycosaminoglycan (GAG) content. The observation of GAG is therefore an appropriate way for evaluating the degree of AC degeneration and diagnosing osteoarthritis. In this study, the method of contrast-agent enhanced Micro-CT, which has been demonstrated as a potential method for quantitatively analyzing the GAG...
With the popularization of intelligent mobile phone, the applications based on LBS has been spread rapidly. But there are also some problems of safety and complexity. An ordering scheme based on LBS which adopts the near-field mobile payment way is proposed in this paper. It has advantages of convenience and payment security.
This paper finds the same framework underlying some designated verifier signature schemes: each of them can be seen as a message authentication code scheme (MAC) where the private key is generated by the Diffie-Hellman key agreement protocol. So all these schemes could have been very simply constructed. Utilizing this framework, we can modularly construct private designated verifier signature schemes...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
The great advances in microelectronics and MEMS (micro-electro-mechanical system) make it possible to design real-time control loops over wireless networks. Real time character is the common request of control systems, multitask is the mainstream of the distributed control system nowadays. Aiming at selecting communication protocol in the wireless networks, the TrueTime toolbox is applied to establishing...
In this paper, a novel anti-collision algorithm based on cyclic redundancy check is proposed to improve the performance of the RFID system. Compared with the previous algorithm, two new techniques can be found in our algorithm. First, noting transmitting the RN16 in the process of reading costs too much time in ISO18000-6C protocol, we use 16-bit cyclic redundancy check (CRC16) to take the place of...
Heartbeat mechanism is widely used in designing high availability distributed system. In this paper, we design a multi-level heartbeat protocol, which consists of two kinds of heartbeat protocols: multipoint heartbeat protocol and bidirectional heartbeat protocol. Multi-level heartbeat protocol is very convenient for the nodes to join and leave the heartbeat protocol and can also avoid the single...
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little has been known about the upper bounds of achievable performance with available resources so that different designs could compare against. On the other hand, the current practice has shown increasing demand of server capacities in P2P-assisted streaming systems in order to maintain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.