A new method and apparatus is proposed to improve the precision and reduce the cost of photoelectric encoder measurements. The method is based on highest resolution measurement and completely statistical analysis. The...
详细信息
A new method and apparatus is proposed to improve the precision and reduce the cost of photoelectric encoder measurements. The method is based on highest resolution measurement and completely statistical analysis. The system includes a stepping motor, a high precision worm reduction gear, a high speed single chip microcomputer, a low cost incremental optical electric encoder and some multi interfaces of communication protocols. The single chip microcomputer as the lower system can test and collect the optical electric encoder. The PC computer as host-computer can deal with the test data. The precision of the system can reach 18 binary digits. Results of application in practice showed that the method and apparatus is efficient and effective, the cost of the apparatus is less than the some kind of system.
In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of ...
详细信息
ISBN:
(纸本)9781424413973;1424413974
In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. We construct two ID-based ring proxy signature schemes. The security analysis is provided as well.
The concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS can be used in the circumstances where the capability of the signer and that of the confirmer are both needed to...
详细信息
The concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS can be used in the circumstances where the capability of the signer and that of the confirmer are both needed to be shared among groups of individuals. The ways to share the signing capability and the confirming capability are different due to the different stabilities of the signer group and the confirmer group. Based on the techniques of threshold cryptography, a concrete SDCS scheme is proposed and its security is analyzed. Our scheme can also be converted into an ordinary signature scheme or a designated verifier signature scheme.
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public...
详细信息
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public-key encryption scheme (MCL-PKE for short) without using bilinear pairing. The proposed MCL-PKE scheme solves the inherent key escrow problem of traditional identity-based cryptosystems and provides instantaneous revocation property simultaneously. In addition, our scheme is IND-CCA secure against two types of adversaries in random oracle based on the hardness of the computational Diffie-Hellman problem.
In the web environment, there is a novel algorithm of electronic documents falsification, which uses the document whole characteristics getting to certify the reliability of the information. To avoid malicious attacks...
详细信息
In the web environment, there is a novel algorithm of electronic documents falsification, which uses the document whole characteristics getting to certify the reliability of the information. To avoid malicious attacks, the algorithm extracts various statistic characteristics of the document, and utilizes the characteristics getting for security and falsification. The results show that the method can differentiate all kinds of electronic documents truthfulness.
Ant-based clustering as a nature-inspired heuristic algorithm has been applied in a data-mining context to perform both clustering and topographic mapping. It is derived from a basic model of behavior observed in real...
详细信息
Ant-based clustering as a nature-inspired heuristic algorithm has been applied in a data-mining context to perform both clustering and topographic mapping. It is derived from a basic model of behavior observed in real ant colonies. Early works demonstrated some promising characteristics of the ant-based clustering, but they did not extend to improve its performance, stability, convergence, and other key features. In this paper, we describe an improved version, called CACAS, adopting an important strategy of using chaotic perturbation to improve individual quality and utilized chaos perturbation to avoid the search being trapped in local optimum. We compare its performance with the K-means approach and ant-based clustering by evaluation functions and topographic mapping using a set of analytical data. Our results demonstrate CACAS is a robust and viable approach.
A new family of p-phase low-correlation sequences with large family size, where p is an odd prime,is constructed by using the highest coordinate of linear recurrence sequences over the ring Zp1, for l ≥2. Utilizing G...
详细信息
A new family of p-phase low-correlation sequences with large family size, where p is an odd prime,is constructed by using the highest coordinate of linear recurrence sequences over the ring Zp1, for l ≥2. Utilizing Galois ring theory (the local Weil bound) and spectral analysis over the additive group of Zp1, we derive an estimate of the correlation of the sequences.
The objective of private authentication for radio frequency identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information. To ach...
详细信息
The objective of private authentication for radio frequency identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information. To achieve this goal, RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to locate the tags. Due to the lack of efficient key updating algorithms, previous schemes are vulnerable to many active attacks, especially the compromising attack. In this paper, we propose a strong and lightweight RFID private authentication protocol, SPA. By designing a novel key updating method, we achieve the forward secrecy in SPA with an efficient key search algorithm. We also show that, compared with existing designs, SPA is able to effectively defend against both passive and active attacks, including compromising attacks. Through prototype implementation, we observe that SPA is practical and scalable in current RFID infrastructures
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especiall...
详细信息
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especially when the user rating data are extremely sparse. Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a novel similarity measuring method, namely the likeness comparing method based on cloud model (LICM) is proposed in this paper. LICM compares the similarity of two users on knowledge level, which can overcome the drawback of attributes' strictly matching. This work analysis traditional methods throughly and puts forward a novel collaborative filtering algorithm, which is based on the LICM method. Experiments on typical data set show the excellent performance of the present collaborative filtering algorithm based on LICM, even with extremely sparsity of data.
To achieve the multilevel security goal some models bad been developed such as BLP since *** models can't successfully work in network environment nowadays due to the difficulty to make the labels of subjects and ...
详细信息
To achieve the multilevel security goal some models bad been developed such as BLP since *** models can't successfully work in network environment nowadays due to the difficulty to make the labels of subjects and objects unaltered across different *** years many researchers put forward cryptographic solutions to address multilevel security *** the key management schemes in real systems were always difficult problems that made those solutions *** trusted computing technologies are great advancement in computer architecture and should be a powerful tool to securely manage the *** paper proposes a new approach on the base of the capabilities provided by TPM (Trusted Platform Module) to implement a sound cryptographic *** new approach enforces a mandatory access control policy in network environment and is especially suited for classified organizations.
暂无评论