RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Novel Fault Diagnosis Framework Based on Reliability Analysis and Arithmetic Circuit

        Rongxing Duan,Du Chen,Jinghui Fan 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7

        To meet the real-time diagnosis requirements of complex systems, this paper presents a novel fault diagnosis framework based on dynamic fault tree and arithmetic circuit. It pays attention to meeting two challenges: model development and real-time reasoning. Specifically, we use a dynamic fault tree to model dynamic fault modes and calculate some quantitative parameters using algebraic technique and Bayesian network (BN) in order to avoid the state space explosion problem. Furthermore, we compile a BN into an arithmetic circuit to obtain answers to probabilistic queries by evaluating and differentiating the arithmetic circuit. In addition, we incorporate sensors information into diagnosis process and propose the schemes on how to update the diagnostic importance factor and the minimal cut sequences. Finally, the example of a train-ground communication system is used to demonstrate the proposed method.

      • KCI등재후보

        Cultural Similarity and International Trade in a Panel of Nations

        Rongxing Guo,황의각 한국동북아경제학회 2005 동북아경제연구 Vol.12 No.2

        Using a gravity model and the data of a panel of eight nations, we present evidence that supports the views that geographical influence on trade had increased from 1985 to 1997. In both years, linguistic influence on trade is found to exist in export but not in import. The estimated results show a positive relation between religious similarity and international trade for the year 1985 but not for the year 1997. However, there is an indication that, for 1997, the religious dissimilarity tends to retard international trade with low-income countries and regions and to encourage international trade with high-income places. We also find that, for low-income trade partners, religious dissimilarity retards imports more than exports; by contrast, for high-income trade partners, it encourages exports more than imports.

      • KCI등재

        PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

        Xiaohui Liang,Rongxing Lu,Le Chen,Xiaodong Lin,Xuemin (Sherman) Shen 한국통신학회 2011 Journal of communications and networks Vol.13 No.2

        In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA)of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient’s neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover,the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

      • KCI등재

        A New Public Key Encryption Scheme based on Layered Cellular Automata

        ( Xing Zhang ),( Rongxing Lu ),( Hong Zhang ),( Chungen Xu ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.10

        Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.

      • SCIESCOPUSKCI등재

        PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

        Liang, Xiaohui,Lu, Rongxing,Chen, Le,Lin, Xiaodong,Shen, Xuemin (Sherman) The Korea Institute of Information and Commucation 2011 Journal of communications and networks Vol.13 No.2

        In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient's neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover, the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

      • Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid

        Saxena, Neetesh,Bong Jun Choi,Rongxing Lu IEEE 2016 IEEE transactions on information forensics and sec Vol.11 No.5

        <P>The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices, such as intelligent electronic devices located at substations, smart meters positioned in the home area network, and outdoor field equipment deployed in the fields. In addition, there are various users in the smart grid network, including customers, operators, maintenance personnel, and so on, who use these devices for various purposes. Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices. In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication together whenever a user accesses the devices. The proposed scheme computes each user role dynamically using an attribute-based access control and verifies the identity of the user together with the device. Security and performance analysis show that the proposed scheme resists various insider as well as outsider attacks, and is more efficient in terms of communication and computation costs in comparison with the existing schemes. The correctness of the proposed scheme is also proved using BAN-Logic and Proverif.</P>

      • KCI등재

        EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market

        ( Hongwei Li ),( Yi Yang ),( Mi Wen ),( Hongwei Luo ),( Rongxing Lu ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.11

        With the increasing electricity consumption and the wide application of renewable energy sources, energy auction attracts a lot of attention due to its economic benefits. Many schemes have been proposed to support energy auction in smart grid. However, few of them can achieve range query, ranked search and personalized search. In this paper, we propose an efficient multi-keyword range query (EMRQ) scheme, which can support range query, ranked search and personalized search simultaneously. Based on the homomorphic Paillier cryptosystem, we use two super-increasing sequences to aggregate multidimensional keywords. The first one is used to aggregate one buyer`s or seller`s multidimensional keywords to an aggregated number. The second one is used to create a summary number by aggregating the aggregated numbers of all sellers. As a result, the comparison between the keywords of all sellers and those of one buyer can be achieved with only one calculation. Security analysis demonstrates that EMRQ can achieve confidentiality of keywords, authentication, data integrity and query privacy. Extensive experiments show that EMRQ is more efficient compared with the scheme in [3] in terms of computation and communication overhead.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼