The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the authors propose a new multisignature scheme with pairing-based cryptography, which can describe the tree structure of signers. In order to denote the relationship among a parent and its child signers, a dedicated middle key is generated on our scheme. In addition, we prove that our scheme is provably secure under the Gap-Diffie-Hellman assumption. Based on our proposal, we also...
We present the design of an apparatus that creates a personal private communication channel over computer-embedded devices. The prototype implementation of the apparatus demonstrated that it can securely and intuitively link devices with no contact with an online server while imposing low overhead.
In this paper, two-layered wave absorber using short carbon fibers is proposed. The absorber is composed of short carbon fibers, which is attached to polyester fibers on a surface of polystyrene foam, and a metal plate as a reflector. Absorption characteristics of the absorber with one-layer showed that matching frequencies could controlled by the thickness of spacer and the length of carbon fibers...
This paper proposes a formal model of the Android permission scheme. We describe the scheme specifying entities and relationships, and provide a state-based model which includes the behavior specification of permission authorization and the interactions between application components. We also show how we can logically confirm the security of the specified system. Utilizing a theorem prover, we can...
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. We proposed a security verification method (OKT method) for authentication and key exchange protocols based on Bellare et al.'s model (BPR model). However, there is an estrangement between the security of the OKT method and the BPR model. In this paper,...
This paper presents a flaw in the permission scheme of Android. The Android framework enforces a permission-based security policy where an application can access the other parts of the system only when the application is explicitly permitted. The security of the framework depends to a large extent on the owner of a device since the authorization decisions are mainly made by the user. As a result,...
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss...
PURPOSE: The purpose of this study was to analyze the effects of the vibratory feedback system between the force plate and vibratory stimulation device for maintaining good standing balance as a training technique. PARTICIPANTS: Sixty elderly subjects (mean age of 74.6 years) participated in the study. METHODS: The vibratory feedback system has three units, a vibratory device unit, a force plate unit,...
We designed a simultaneous analysis system to measure eye and head-neck movement in the evaluation of unilateral spatial neglect (USN). Analysis was performed in one healthy subject and one USN patient with left homonymous hemianopsia. Synchronization of eye and head-neck movement enabled quantitative and qualitative analysis of these movements. Future studies are required to enhance the accuracy...
Hospital inpatients and elderly healthcare facility residents are often at risk of falling in the toilet room. Quickly finding fallen persons makes it possible to prompt rescue them. Thermal imaging sensors can provide a method for fall detection in toilet rooms that is superior to other detection techniques. The present study used a thermal imaging sensor to differentiate between normal toilet room...
A bedside and home rehabilitation system for people with motor disabilities due to stroke or the aging process requires a human-compatible actuator with softness, low noise and a high power-to-weight ratio. To achieve these types of joint motor rehabilitation systems, we designed a wearable metal hydride (MH) actuator using a soft bellows. The purpose of the current study is the development the soft...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.