Advanced Materials Research Vols. 734-737

Paper Title Page

Abstract: Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is proposed. Its security is based on the discrete logarithm problem. Compared with the existed certificateless proxy blind signature scheme, because without bilinear pairing, it have higher efficiency. According to the different attacker and all kinds of attacks, the scheme is proved to be correct and security under the hardness of discrete logarithm problem in the finite field.
3194
Abstract: Wavelet transform is of vital importance in face recognition. This paper studies key problems of wavelet transform of face recognition and analyzes some problems that affect on face recognition rate. Experiments are done based on the same face images using different decomposition levels and different DB. Experiments show that recognition rates can get better results when using DB2 and the decomposition level two.
3199
Abstract: A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly analyzes the routing attacks of mobile Ad hoc networking, then elaborates and compares some ad hoc secure routing protocols, at last points the future researches.
3203
Abstract: This paper focus on issues of distributed architecture, information integration and access control of manufacturing execution system (MES). A conceptual model of distributed MES is introduced to cover the shortages of traditional MES in this paper, and it is a promising solution for traditional MES to achieve flexibility, integration and interoperability. Information integration method of MES and other information systems based on Web service and ontology is defined and investigated, and an implementation process of integration with MES and ERP via application integration service management system is presented to demonstrate the feasibility and validity of the proposed information integration method. Fuzzy trustworthiness-involved role based access control model (FT-RBAC) was proposed for access control of MES. Formalization expression for fuzzy trustworthiness-involved role based access control model is analyzed in detail. An algorithm of fuzzy trustworthiness-involved role based access control is developed to implement fine-grained security management and access control of MES. Fuzzy trustworthiness-involved role based access control model proposed in this paper not only can solve the problem of uncertainty, risk and vulnerability coming from authorization, but also has high flexibility and security.
3207
Abstract: With the tremendous advances in mobile computing and communication capabilities, rapid proliferation of mobile devices, increasing powerful functions, and decreasing device costs, we are seeing a explosively growth in mobile e-commerce in various consumer and business markets. On the basis of analyzing demands of both buyers and seller in mobile e-commerce, the paper put forward a novel concept and technological framework of Location Based Services (LBS) driven mobile e-commerce. Some LBS related functions, in mobile device terminal, of the prototype system based on the architecture put forward are implemented. Also, some key issues of LBS based mobile e-commerce, such as positioning accuracy and new privacy and security risks, are discussed in detail.
3214
Abstract: Cloud computing is high scalability, high reliability, high resource utilization Characteristics. In this paper, according to the characteristics of the logistics information, combined with cloud computing technology to build the model of logistics information sharing platform based on cloud computing. On cloud computing technology application of key technologies in the logistics information sharing platform is analyzed. Finally, this paper has carried on the design of logistics information sharing platform based on cloud technology. With the use of logistics information sharing platform, the logistics information development play a powerful role in promoting.
3220
Abstract: The distribution problem of a sum analogous to Dedekind sums is studied by using the mean value theorem of the Dirichlet L-functions and the property of Dedekind sums , and an interesting mean square value formula is given.
3224
Abstract: In order to guarantee the secure transmission and efficient authentication of electronic official document paper, this paper puts forward the design plan of the electronic seal system with the technologies of CAPICOM, SHA-1 and USBKey. The design plan implements document protection function with major forms of electronic signature, handwritten signature and keyboard notation. Examination result and analysis proves that the system can ensure the security of the seal and guaranteed the integrality, authentication and non-repudiation of the documents. The system has broad application potential in electronic commerce, electronic government and other electronic official field.
3228
Abstract: Covariance is a symmetric bilinear function on random variable inner product space,therefore we applied the methods and results of bilinear functions to the covariance matrix.
3234
Abstract: Retracted paper: Since AB SLC500 PLC does not support the Profibus protocol, it can not communicate with Profibus network. In order to realize the fast and accurate communication between these two, this thesis studies the Profibus protocol and develops the Profibus application program in the Flex I/O module. Thus the communication between SLC500 PLC and Profibus network is realized. Compared with the applying of SLC500 to control the other equipments and network, the applying of the Flex I/O module promotes the controlling efficiency and responding rate and realizes the complete control of the controlling system. The result of this research shows that this plan can ensure the accuracy, reliability and efficiency of the data transported.
3238

Showing 641 to 650 of 678 Paper Titles