Most of secure email systems adopt PKI and IBE encryption schemes to meet security demands in communications via emails, however, both PKI and IBE encryption schemes have their own shortcomings and flaws and consequen...
详细信息
Most of secure email systems adopt PKI and IBE encryption schemes to meet security demands in communications via emails, however, both PKI and IBE encryption schemes have their own shortcomings and flaws and consequently bring security problems to email systems. This paper proposes a new secure email system based on a fingerprint authentication scheme which combines fingerprint authentication technology with IBE scheme. The system perfectly solves the existing problems encountered in email security protection implementations.
To implement quantum-information processing, microwave fields are often used to manipulate superconducting qubits. We study how the coupling between superconducting charge qubits can be controlled by variable-frequenc...
详细信息
To implement quantum-information processing, microwave fields are often used to manipulate superconducting qubits. We study how the coupling between superconducting charge qubits can be controlled by variable-frequency magnetic fields. We also study the effects of the microwave fields on the readout of the charge-qubit states. The measurement of the charge-qubit states can be used to demonstrate the statistical properties of photons.
The eight papers in this special issue focus on networking, sensing, and control for networked control systems (NCS). The papers, which are briefly summarized, examine the architectures, algorithms and applications of...
详细信息
The eight papers in this special issue focus on networking, sensing, and control for networked control systems (NCS). The papers, which are briefly summarized, examine the architectures, algorithms and applications of NCS.
Current certificate-based information security technologies are facing a challenge of lacking the exact connection between cryptographic key and legitimate users and a problem of comprehensive management of certificat...
详细信息
Current certificate-based information security technologies are facing a challenge of lacking the exact connection between cryptographic key and legitimate users and a problem of comprehensive management of certificates. In this paper we propose a novel networking identity authentication scheme based on fingerprint coding method and Identity-based encryption (IBE). Fingerprint code is a dual-factor authenticator which combines a token, e.g. USB key, with user's fingerprint feature by direct mixing of pseudo-random number generated by token and fingerprint feature. IBE allows for a sender to encrypt a message to a receiver without access to a public key certificate. This scheme can improve the security of user authentication and simplify comprehensive management of certificates, in the meantime, protect against fingerprint data fabrication and stolen. The security and efficiency of our proposed scheme meet the requirements of practical applications.
Highly entangled states called cluster states are a universal resource for measurement-based quantum computing (QC). Here we propose an efficient method for producing large cluster states using superconducting quantum...
详细信息
Highly entangled states called cluster states are a universal resource for measurement-based quantum computing (QC). Here we propose an efficient method for producing large cluster states using superconducting quantum circuits. We show that a large cluster state can be efficiently generated in just one step by turning on the interqubit coupling for a short time. Because the interqubit coupling is only switched on during the time interval for generating the cluster state, our approach is also convenient for preparing the initial state for each qubit and for implementing one-way QC via single-qubit measurements. Moreover, the cluster state is robust against parameter variations.
In this note we show that the setting up of the "principle of material frame-indifference in the limit of two-dimensional turbulence" by Speziale in the 1980s, which has been applied to turbulence modelling ...
详细信息
The problem of deducing one-dimensional theory from two-dimensional the- ory for a homogeneous isotropic beam is investigated. Based on elasticity theory, the re- fined theory of rectangular beams is derived by using ...
详细信息
The problem of deducing one-dimensional theory from two-dimensional the- ory for a homogeneous isotropic beam is investigated. Based on elasticity theory, the re- fined theory of rectangular beams is derived by using Papkovich-Neuber solution and Lur’e method without ad hoc assumptions. It is shown that the displacements and stresses of the beam can be represented by the angle of rotation and the deflection of the neutral surface. Based on the refined beam theory, the exact equations for the beam without transverse surface loadings are derived and consist of two governing differential equations: the fourth-order equation and the transcendental equation. The approximate equations for the beam under transverse loadings are derived directly from the refined beam theory and are almost the same as the governing equations of Timoshenko beam theory. In two ex- amples, it is shown that the new theory provides better results than Levinson’s beam the- ory when compared with those obtained from the linear theory of elasticity.
From point of view of physics, especially of mechanics, we briefly introduce fractional operators (with emphasis on fractional calculus and fractional differential equa- tions) used for describing intermediate process...
详细信息
From point of view of physics, especially of mechanics, we briefly introduce fractional operators (with emphasis on fractional calculus and fractional differential equa- tions) used for describing intermediate processes and critical phenomena in physics and mechanics, their progress in theory and methods and their applications to modern me- chanics. Some authors’ researches in this area in recent years are included. Finally, prospects and evaluation for this subject are made.
The problem of deducing one-dimensional theory from two-dimensional theory for a transversely isotropic piezoelectric rectangular beam is investigated. Based on the piezoelasticity theory, the refined theory of piezoe...
详细信息
The problem of deducing one-dimensional theory from two-dimensional theory for a transversely isotropic piezoelectric rectangular beam is investigated. Based on the piezoelasticity theory, the refined theory of piezoelectric beams is derived by using the general solution of transversely isotropic piezoelasticity and Lur'e method without ad hoc assumptions. Based on the refined theory of piezoelectric beams, the exact equations for the beams without transverse surface loadings are derived, which consist of two governing differential equations: the fourth-order equation and the transcendental equation. The approximate equations for the beams under transverse loadings are derived directly from the refined beam theory. As a special case, the governing differential equations for transversely isotropic elastic beams are obtained from the corresponding equations of piezoelectric beams. To illustrate the application of the beam theory developed, a uniformly loaded and simply supported piezoelectric beam is examined.
Differentiation of syndromes is the kernel theory of Traditional Chinese Medicine (TCM). How to diagnose syndromes correctly with scientific means according to symptoms is the first problem in TCM. Several modern appr...
详细信息
暂无评论