Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials
Vols. 416-417
Vols. 416-417
Applied Mechanics and Materials
Vol. 415
Vol. 415
Applied Mechanics and Materials
Vols. 411-414
Vols. 411-414
Applied Mechanics and Materials
Vols. 409-410
Vols. 409-410
Applied Mechanics and Materials
Vols. 405-408
Vols. 405-408
Applied Mechanics and Materials
Vol. 404
Vol. 404
Applied Mechanics and Materials
Vols. 401-403
Vols. 401-403
Applied Mechanics and Materials
Vols. 397-400
Vols. 397-400
Applied Mechanics and Materials
Vols. 395-396
Vols. 395-396
Applied Mechanics and Materials Vols. 411-414
Paper Title Page
Abstract: Based on preimage sampleable functions and hard problems for lattices, we propose two lattice-based multi-signature schemes, which include the trivial broadcasting multi-signature scheme and the sequential multi-signature scheme. In the broadcasting multi-signature scheme, the length of the multi-signature varies linearly with the number of the signers. In the sequential multi-signature scheme, the length of the multi-signature is fixed and independent of the number of the signers. These two multi-signature schemes can allow multiple signers to sign the same message cooperatively.
3
Abstract: Email services are among the services most frequently utilized by smartphone users. However, setting up a smartphone email service is very frustrating for ordinary users as the process requires knowledge of complicated email server protocols and types of security. To eliminate the inconvenience, a method in which web mail setting information is preconfigured within an app has been applied to representative smartphone email accounts. However, it is not practical nor realistic to store all web mail setting information in the app; furthermore, private server setting information for schools, working areas and so on, has to be separately established by users. In this paper, we propose a system that removes these inconveniences faced when setting up smartphone email services. The proposed system automatically downloads setting information preconfigured on the email server for users.
7
Abstract: With the development of RFID technology , RFID middleware is gradually being taken seriously.RFID middleware can provide strong support for the RFID system, to make it more widely available. This paper introduces the MD5 and SHA-two kinds of hash algorithm.The design of RFID middleware software implementation based on the Hash link protocol, laid the foundation for the programming and Realization of software.
12
Abstract: RFID is a key technology that can be used to create the ubiquitous society. Owing to the characteristics of RFID systems, it may pose a serious threat to privacy and security. In order to solve these problems we proposed a novel mutual authentication protocol based on NTRU which can prevent tracing, eavesdropping, replay attack, and backward traceability effectively. This protocol uses less computing and memory resources, and it is very suitable to some low-cost RFID systems.
16
Abstract: The research of improvisation has been become an emerging management area in recent years, the purpose of this study is to explore the hot topics of this research domain. Co-word analysis was performed by using the keywords of relevant publications in the improvisational field included by Web of Knowledge database from 1997 to 2012. The results of multivariate statistical techniques show that the improvisation research involves many fields including organizational theory, innovation, learning, entrepreneurship, strategy and change. The social network analysis was used to trace the dynamic changes of the improvisation research, and results show that improvisation field has some established research themes and it also changes rapidly to embrace new themes.
21
Abstract: With the wide application of computer and network technology, authentication, intrusion detection, virus detection, etc. have become the research hotspots in network security research. Starting from the intrusion detection problems, this paper presents and analyzes a classification method based on Support Vector Machine (SVM). Simulation results show that the proposed method has high reliability and good stability.
25
Abstract: The paper presents the developing trend of telemetry system, summarizes the principle of multi-symbol detection (MSD) and Turbo Product Code (TPC), discuss the combination performance-enhancing technology for PCM-FM telemetry system based on MSD and TPC by analyzing the key parameters in the simulation test. As test result indicated, the performance-enhancing combination technology can improve the performance and signal-to-noise ratio gain of the PCM-FM telemetry system significantly both in theoretical analysis and practical application.
30
Abstract: RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about generating roles for application.
35
Abstract: The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.
40