Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ...
详细信息
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty.
Mobile ad hoc networks (MANETs) are especially vulnerable to attacks for lacking infrastructure and data transfer using wireless communication, especial for denial of service (DoS) attacks. Black hole and gray hole at...
详细信息
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
Brain computer Interface (BCI) provides a direct communication channel from brain to peripheral equipment. Common Spatial Patterns (CSP) is wildly used to extract features for electroencephalogram (EEG). However, basi...
详细信息
Swarm intelligence is an umbrella for amount optimization algorithms. This discipline deals with natural and artificial systems composed of many individuals that coordinate their activities using decentralized control...
详细信息
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and *** this paper,we analyze two recently proposed RFID authentication ...
详细信息
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and *** this paper,we analyze two recently proposed RFID authentication *** protocols are vulnerable to tag information leakage and untraceability *** the attack on the first protocol,the adversary only needs to eavesdrop on the messages between reader and tag,and then perform an XOR *** attack the second protocol successfully,the adversary may execute a series of carefully designed challenges to determine the tag's identification.
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera...
详细信息
Approximate Entropy (ApEn) is a regularity statistic that quantifies the unpredictability of fluctuations in a time series and can classify complex systems. This study, ApEn is used to extract features from motor imag...
详细信息
Due to advances in low power micro-sensor technology, energy harvesting techniques, we can now build large scale solar-powered sensor networks to support long-running operations. Solar powered sensors often harvest va...
Due to advances in low power micro-sensor technology, energy harvesting techniques, we can now build large scale solar-powered sensor networks to support long-running operations. Solar powered sensors often harvest variable amounts of energy in different weather conditions. Then a primary requirement for an efficient and a long-running solar-powered sensor system is to adapt to changing environment conditions and resources, and to gather as much valuable data as possible. Sensing and collecting data at a constant rate, without taking into account energy availability or data deliverability, will either drain the battery or waste resources. In this work, we design and test a highly efficient and robust solar-powered system SmartMote; and we further present an energy and value of information (VoI) aware routing strategy, that balances the rates of sensing with packet delivery for SmartMote. SmartMote achieves fairness and near maximum utility across the network. We deploy SmartMote in a forest with 100 sensors in order to monitor the humidity, temperature and luminance intensity. Our experimental results corroborate our design.
The Artery Elasticity Index (AEI) is an important marker in the evaluation of the risk level of cardiovascular and cerebrovascular diseases. For calculating AEI, signals of arterial pulse wave should be acquired first...
详细信息
暂无评论