Applied Mechanics and Materials
Vols. 157-158
Vols. 157-158
Applied Mechanics and Materials
Vols. 155-156
Vols. 155-156
Applied Mechanics and Materials
Vols. 152-154
Vols. 152-154
Applied Mechanics and Materials
Vol. 151
Vol. 151
Applied Mechanics and Materials
Vol. 150
Vol. 150
Applied Mechanics and Materials
Vols. 148-149
Vols. 148-149
Applied Mechanics and Materials
Vol. 147
Vol. 147
Applied Mechanics and Materials
Vol. 146
Vol. 146
Applied Mechanics and Materials
Vol. 145
Vol. 145
Applied Mechanics and Materials
Vols. 143-144
Vols. 143-144
Applied Mechanics and Materials
Vol. 142
Vol. 142
Applied Mechanics and Materials
Vol. 141
Vol. 141
Applied Mechanics and Materials
Vol. 140
Vol. 140
Applied Mechanics and Materials Vol. 147
Paper Title Page
Abstract: Through analyzing the typical damage characteristic of bridges and corresponding earthquake disaster data in several destructive earthquakes at home and abroad, the law of earthquake damage on bridges has been summarized. Aiming at current aseismatic research and design of highway bridges, further research direction in the field of bridge seismic has been pointed out. In order to improve the seismic behavior of future bridges, some design points to attention have been proposed based on seismic conceptual design and aseismic measures of bridges.
315
Abstract: Nowadays, Wireless sensor networks (WSNs) are appeared to be new and promising solutions for next generation real-time wireless monitoring applications. These WSNs could become a threat if suitable security is not considered before the deployment. However, if there is any loophole in security, that might opens the door to attackers and hence, endanger for the applications. So, user authentication is one of the core requirements to protect WSNs data access from the unauthorized users. In this regard, we propose an efficient two-factor user authentication for WSNs, which is based on password and smart card (two-factors). Our scheme provides mutual authentication, enables the user to choose and change their password frequently. Moreover, they provides strong protection against different kind of attacks at reasonable computation cost.
320