The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a two-party key agreement protocol, which is secure in standard model. By using the Goldreich-Levin hardcore predicate, we reduce the security of our scheme to Computational Bilinear Diffie-Hellman assumption, and a proof is given. Furthermore, with the consistency of messages exchanged publicly verifiable, our scheme achieves most of the known security attributes.
Constrained optimization problems (COPs) are converted into a bi-objective optimization problem first, and a novel fitness function based on achievement scalarizing function (ASF) is presented. The fitness function adopts the valuable properties of ASF and can measure the merits of individuals by the weighting distance from the ndividuals to the reference point, where the reference point and the weighting...
At Eurocrypt'02, Horwitz and Lynn first introduced the concept of HIBS. Till now, many HIBS schemes have been proposed. Recently (2011), Yang et al.'s proposed a hierarchical identity based signature (HIBS) scheme based on computational Diffie-Hellman (CDH) assumption in the standard model. They claimed that their scheme has more secure and more efficient than the existing HIBS schemes. However, we...
This paper proposes a practical public key encryption scheme which is provable chosen cipher text(CCA) secure based on the gap computational linear Diffie-Hellman assumption in the standard model. This is the first CCA secure scheme based on the gap computational linear Diffie-Hellman assumption. This scheme is efficient and the proof of the security is tight. We also reduce the size of the public...
In a RFID (Radio Frequency Identification)-enabled system, RFID tags often need to change hands from one owner to another during their lifetime, which makes the design of excellent RFID tag ownership transfer schemes more urgent than ever before. In this paper, we propose a lightweight mutual authentication and ownership transfer scheme, which conforms to the standard EPC Class-1 Generation-2 (EPC-C1G2)...
In order to study the interval multiple attribute decision making problem with triangular fussy number and uncertain weight, this paper presents a new method based on cosines similar degree. The detailed procedure of the proposed algorithm and numerical experiment are given. The proposed algorithm is also compared with an existed algorithm. Compared results show that the proposed algorithm are effective...
With regard to the analysis of Web portable technology in the application of E-Learning teaching system, this paper studied the specific application process and provided a comprehensive evaluation result. It fully demonstrated that the Web portable technology based on B/S has high value in the development and application of teaching system.
In many application fields, an appropriate high-quality fast image up sampling method is required. Although many interpolation-based up sampling methods have been proposed, the quality of result images is not satisfactory. Some of them are very fast, but produce poor quality images, the others can produce high quality images, but the methods in them are slow. In our paper, we proposed a fast statistical...
A new fire station location planning method based on travel time of fire vehicles is demonstrated. In contrast to traditional circle-drawing method, it is quite easy to operate and make better balance between fire protection response performance and construction cost. The application in a city at the central part of China is also demonstrated. It is shown a 140% increase on the fire protection response...
Evolutionary Multi-objective Optimization (EMO) approaches have been amply applied to find a representative set of Pareto-optimal solutions in the past decades. Although there are advantages of getting the range of each objective and the shape of the entire Pareto front for an adequate decision-making, the task of choosing a preferred set of Pareto-optimal solutions is also important. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.