Virtualization technology is the basis of cloud computing, and the most important property of virtualization is isolation. Isolation guarantees security between virtual machines. However, covert channel breaks the iso...
详细信息
Multi-type objects with multi-type relations are ubiquitous in real-world networks, e.g. bibliographic networks. Such networks are also called heterogeneous information networks. However, the research on clustering fo...
详细信息
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message passing protocols can achieve satisfacto...
详细信息
This paper presents an automatic line-drawing method designed for building images. The fast line segment detector with a false detection control and detects the outline and the door, or window edge features detected, ...
详细信息
In study of Petri net systems, the approach of synthesis process is playing an increasingly significant role. In a synthesis process, the properties of subsystems must be preserved in the global system in order to red...
详细信息
Service-oriented Architecture (SOA) is a leading paradigm that can be used to address the challenges of both cross-organisational and inter-organisational systems integration. This approach makes it necessary to inves...
详细信息
Many machine learning classification technologies such as boosting, support vector machine or neural networks have been applied to the ranking problem in information retrieval. However, since the purpose of these lear...
详细信息
We present a new particle-based method for high viscosity fluid simulation. In the method, a new elastic stress term, which is derived from a modified form of the Hooke's law, is included in the traditional Navier...
详细信息
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and...
详细信息
ISBN:
(纸本)9781849195058
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and encryption hash. A process of formal analysis is presented by using BAN logic;the security and the complexity of this protocol are compared with other typical ones. The messages in the protocol are encrypted by key, it makes the protocol can prevent from illegal reading, tracking, eavesdropping, spoofing and replay attack. Both theory and analysis show that this new protocol can ensure the security of RFID systems and keep low-cost.
暂无评论