http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Towards an Analysis of Verifiable Mix Network Properties
Tianbo Lu,Jiaxi Lin,Xiaofeng Du,Yang Li 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.7
With the development of mix-net, the basic properties of mix-net cannot satisfy all the requirements of people. The verifiable mix-net raised in response to the proper time and conditions. In this paper, we study the problem of simultaneously achieving several security properties, for mix-nets and verifiability mix-nets. More precisely, under different assumptions and requirements, verifiability mix-nets have more extra security properties than mix-nets. The basic properties of mix-nets contain correctness, privacy, robustness, availability and efficient. The extra properties of verifiability mix-nets contain universal verifiability, unconditional anonymous, receipt-freeness. This paper summarizes all of the security properties, and defines them explicitly and systematically.
Tianbo Lu,Jiaxi Lin,Lingling Zhao,Yang Li,Yong Peng 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7
Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper put forward a CPS security model, which contains security objectives, basic theories, simulation, and CPS framework, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber–physical systems and to provide useful security defense. Based on the cyber-physical systems framework, the paper classifies attacks for the execution layer, transport layer and control layer. The execution layer attacks include security attacks for nodes such as sensors and actuators. Transport layer attacks include data leakage or damage and security issues during massive data integration. Control layer attacks include the loss of user privacy, incorrect access control policies and inadequate security standards. This paper gives security defenses and recommendations for all types of security attacks. Finally, this paper introduces categorizations of CPS application fields and explores their relationships.
Exploring the Fuel Economy Potential of ISG Hybrid Electric Vehicles through Dynamic Programming
Guoqiang Ao,Hu Zhong,Jiaxi Qiang,Lin Yang,Bin Zhuo 한국자동차공학회 2007 International journal of automotive technology Vol.8 No.6
Hybrid electric vehicles (HEV) combined with more than one power sources have great potential to improve fuel economy and reduce pollutant emissions. The Integrated Starter Generator (ISG) HEV researched in this paper is a two energy sources vehicle, with a conventional internal combustion engine (ICE) and an energy storage system (batteries). In order to investigate the potential of diesel engine hybrid electric vehicles in fuel economy improvement and emissions reduction, a Dynamic Programming (DP) based supervisory controller is developed to allocate the power requirement between ICE and batteries with the objective of minimizing a weighted cost function over given drive cycles. A fuel-economy-only case and a fuel & emissions case can be achieved by changing specific weighting factors. The simulation results of the fuel-economy-only case show that there is a 45.1% fuel saving potential for this ISG HEV compared to a conventional transit bus. The test results present a 39.6% improvement in fuel economy which validates the simulation results. Compared to the fuel-economy-only case, the fuel & emissions case further reduces the pollutant emissions at a cost of 3.2% and 4.5% of fuel consumption with respect to the simulation and test result respectively.