Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications between elements can be represented as reaction rules. RFID untraceability can be represented as behavioral congruences. We take a RFID air interface protocol as a case study and show the usability of this approach.
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac...
详细信息
ISBN:
(纸本)9781601321916
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system;and use phase correlation method to obtain rotation angle, scaling size and position offset;and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copy-paste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.
Max Restricted Path Consistency (maxRPC) is a promising domain filtering consistency for binary constraints. In existing algorithms, the process of searching for PC-witnesses requires most constraint checks. And the c...
详细信息
Topological relations between spatial objects have played important roles in spatial representing and reasoning. Various models for expressing topological relations have been put forward. The Region Connection Calculu...
详细信息
作者:
LI YONGXU LUCollege of Mathematics
Key Laboratory of Symbolic computation and Knowledge Engineering of Ministry of EducationJilin UniversityChangchun130012
In this paper,we study the persistence of lower dimensional tori for random Hamiltonian systems,which shows that majority of the unperturbed tori persist as Cantor fragments of lower dimensional ones under small *** t...
详细信息
In this paper,we study the persistence of lower dimensional tori for random Hamiltonian systems,which shows that majority of the unperturbed tori persist as Cantor fragments of lower dimensional ones under small *** this result,we can describe the stability of the non-autonomous dynamic systems.
We focus on a special class of ideal projectors, subspaces, which possesses two classes of D -invariant polynomial subspaces. The first is a classical type, while the second is a new class. With matrix computation, we...
We focus on a special class of ideal projectors, subspaces, which possesses two classes of D -invariant polynomial subspaces. The first is a classical type, while the second is a new class. With matrix computation, we discretize this class of ideal projectors into a sequence of Lagrange projectors.
Functions and call relations are extracted into nodes and edges,respectively,by which a novel topological model is *** directional edges and the corresponding weight values express the call relations and tightness ***...
详细信息
Functions and call relations are extracted into nodes and edges,respectively,by which a novel topological model is *** directional edges and the corresponding weight values express the call relations and tightness *** introducing two concepts of function fault-tolerant capability and software fault intensity and by designing a allocation rule on fault-tolerant capability,a cascading fault model is built to explore fault propagation *** on practical software networks show that a weak fault intensity,a small number of initial faults,and a strong fault-tolerant capability can slow down the spreading *** functions with more call relations and more closer tightness contribute more to the stability of the whole system.
Wireless communication, signal broadcasting, strictly limited resources in tags make RFID systems being confronted with many security attacks and privacy disclosure threats. In this paper, an efficient lightweight RFI...
详细信息
Wireless communication, signal broadcasting, strictly limited resources in tags make RFID systems being confronted with many security attacks and privacy disclosure threats. In this paper, an efficient lightweight RFID mutual authentication protocol is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the backend server and is particularly suitable for the low-cost RFID systems because only one-way hash function, XOR operation and concatenation operation are needed in tags. The security and performance of this protocol are analyzed as well by comparing with the related RFID authentication protocols.
This paper addresses the problem of failure diagnosis in component-based discrete event systems. In this paper we propose a method to obtain the set of components when dealing with diagnosis in large complex discrete ...
详细信息
This paper addresses the problem of failure diagnosis in component-based discrete event systems. In this paper we propose a method to obtain the set of components when dealing with diagnosis in large complex discrete event systems. In the new method, before disassembling the system into components, we need to identify whether insert communication events into the system or not. When analyzing the diagnosability, we treat the system containing communication events as a distributed discrete event system. Otherwise we treat the system as a decentralized discrete event system. For the components which are not diagnosable, we propose a method to reconstruct them by utilizing some other components sharing the same communication events with them. This algorithm provides more accurate information of the diagnosability of the system.
We have studied the AC-4 algorithm and then present ordering heuristic forming the new solving algorithm based on the data structure used in the AC-4 algorithm. These algorithms take full advantage of the state inform...
详细信息
暂无评论