http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
( Ling Xiong ),( Daiyuan Peng ),( Tu Peng ),( Hongbin Liang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.12
With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.’s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.
New family of hopping sequences for time/frequency-hopping CDMA systems
Fan, Pingzhi,Lee, Moon Ho,Peng, Daiyuan IEEE 2005 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS Vol.4 No.6
In this paper, a new family of hopping sequences with very large family size suitable for use in time/frequency-hopping (TH/FH) code-division multiple-access (CDMA) systems is proposed and investigated. The construction of the new hopping sequences is based upon the polynomial theory over the finite field, and the new hopping sequences are called the polynomial hopping sequences. It is shown that the new time/frequency-hopping sequences include the well-known cubic hopping sequences, quadratic hopping sequences, and linear hopping sequences as special cases, and are good candidates for the large-capacity ultrawide-bandwidth (UWB) radio systems.
Zhao Yanwei,Luo Xujia,Qin Kemian,Liu Guorui,Chen Daiyuan,Augusto R.S.,Zhang Weixiong,Luo Xiaogang,Liu Chunxian,Liu Juntao,Liu Zhiyi 한국원자력학회 2023 Nuclear Engineering and Technology Vol.55 No.2
Purpose: Muons are characterized by a strong penetrating ability and can travel through thousands of meters of rock, making them ideal to image large volumes and substances typically impenetrable to, for example, electrons and photons. The feasibility of 3D image reconstruction and material identification based on a cosmic ray muons tomography (MT) system with triangular bar plastic scintillator detectors has been verified in this paper. Our prototype shows potential application value and the authors wish to apply this prototype system to 3D imaging. In addition, an MT experiment with the same detector system is also in progress. Methods: A simulation based on GEANT4 was developed to study cosmic ray muons' physical processes and motion trails. The yield and transportation of optical photons scintillated in each triangular bar of the detector system were reproduced. An image reconstruction algorithm and correction method based on muon scattering, which differs from the conventional PoCA algorithm, has been developed based on simulation data and verified by experimental data. Results: According to the simulation result, the detector system’s position resolution is below 1 ~ mm in simulation and 2 mm in the experiment. A relatively legible 3D image of lead bricks in size of 20 cm 5 cm 10 cm used our inversion algorithm can be presented below 1 104 effective events, which takes 16 h of acquisition time experimentally. Conclusion: The proposed method is a potential candidate to monitor the cosmic ray MT accurately. Monte Carlo simulations have been performed to discuss the application of the detector and the simulation results have indicated that the detector can be used in cosmic ray MT. The cosmic ray MT experiment is currently underway. Furthermore, the proposal also has the potential to scan the earth, buildings, and other structures of interest including for instance computerized imaging in an archaeological framework.