The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Benefited from cloud storage services, users can save their cost of buying expensive storage servers. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored in cloud servers, which are the research issues the provable data possession (PDP) faces. This paper analyzes the existing PDP algorithms, finds some defects of these...
This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN logic can be used formally and prove the correctness and security of the protocols, which indicates that BAN logic is an important tool for analyzing cryptographic protocols. The paper has established the ideal protocol model to Otway-Rees protocol based on the BAN logic,...
This paper researched on Needham-Schroeder symmetric key authentication protocol based on BAN logic. It pointed out the flaw of the protocol which can be used by replay attack and improved the protocol by adding nonce in the transferred message. Then it listed the improved NS authentication protocol. Finally, this paper proved the improved protocol successful and available with BAN logic.
In order to solve the problem which is easy to be overlooked in designing the security protocol, this paper discusses the concepts such as the key freshness, the key sharing and the public key ownership. This paper defines the parameters describing these beliefs, and then proposes security protocol formalization based on belief. Use the method to design security protocols, which can improve the ability...
The practical algorithm solves real time inverse kinematics of industrial 7R robot. Here D-H method is used to set up a closed-form 4x4 matrix equation of the 7R Robot, and then sine and cosine of joint angles is transformed to complex exponential form, 10 equations in same form are obtained. We extract the coefficient of every term to construct a 16x16 real number matrix. And the inverse kinematics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.