The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
A two stages cryogenic Silicon-Germanium heterojunction-bipolar-transistor (SiGe HBT) low-nose-amplifier (LNA) for 0.2–4GHz frequency range has been designed, fabricated and measured with the temperature range from 300K to 4K. Both of the stages of the amplifier utilize the commercially available plastic packaged SiGe transistors NXP BFU725F. The temperature dependent DC characteristics, namely β...
This research aims to represent the ZigBee mesh routing and the performance under simulation environment for smart home. In the realistic smart home, researcher does not get some of the analysis and results. Hence, we designed and developed ZigBee best virtual smart home environment on Qualnet simulator. Finally, we suggest mixed-mode simulation methodology that integrates the smart home environment...
Following rising demands in positioning with GPS, low-cost receivers are becoming widely available; but their energy demands are still too high. For energy efficient GPS sensing in delay-tolerant applications, the possibility of offloading a few milliseconds of raw signal samples and leveraging the greater processing power of the cloud for obtaining a position fix is being actively investigated. In...
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
In real-time playing of network audio-video, because of delay and dithering, effective data caches processing and audio-video synchronization control must be carried out to resume time connection among data. A scheme of using DataSet to process data in caches is proposed. Synchronous control method of thread and arithmetic of audio-video synchronization playing are discussed in detail. The new scheme...
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped with some message formatting mechanisms, such as using hash functions or padding redundancies. In 2004, Chang et al. proposed a new digital signature scheme, and claimed the scheme without using any hash function or padding any redundancy can resist forgery attacks. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.