http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System
( Tzong-sun Wu ),( Yih-sen Chen ),( Han-yu Lin ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.3
Convertible authenticated encryption (CAE) schemes enable the signer to send a confidential message and its corresponding signature to the designated recipient. The recipient can also convert the signature into a conventional one which can be verified by anyone. Integrating the properties of self-certified public key systems, this paper presents efficient and computationally indistinguishable self-certified CAE schemes for strengthening the security of E-Commerce applications. Additionally, we also adapt the proposed schemes to elliptic curve systems for facilitating the applications of limited computing power and insufficient storage space. The proposed schemes are secure against known existential active attacks, satisfy the semantic security requirement, and have the following advantages: (i) No extra certificate is required since the tasks of authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing computation efforts and communication overheads. (ii) In case of a later dispute, the recipient can convert the signature into an ordinary one for the public arbitration. (iii) The signature conversion can be solely performed by the recipient without additional computation efforts or communication overheads. (iv) The recipient of the signature can prove himself, if needed, to anyone that he is actually the designated recipient.
Probability Density Function for the Critical Current Asymmetry of a HTS dc SQUID
Jen-Tzong Jeng,C. H. Wu,H. C. Yang,H. E. Horng,J. C. Chen,K. H. Huang,K. L. Chen,S. H. Liao,Y. C. Lin 한국물리학회 2006 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.48 No.5I
A dc SQUID consisting of grain boundary Josephson junctions may often be asymmetric owing to the large critical-current spread. In this work, the probability density function (PDF) for the critical-current asymmetry of high-transition-temperature-superconductor (HTS) dc SQUID was investigated. To model the critical-current spread in the grain boundaries, we assumed that the barrier thickness of the Josephson junction fluctuated according to a log-Weibull distribution. The resultant PDF for the critical-current spread that fits the histogram data of critical currents reported in literature was the gamma distribution. With the proposed distribution function, the corresponding PDF for the critical-current asymmetry parameter of a HTS dc SQUID was derived and compared with the experimental result. The proposed gamma distribution function is useful in modeling devices, such as the SQUID array and the superconducting quantum interference grating, consisting of many grain-boundary Josephson junctions.
Resonant-Frequency-Dependent Flux Noise of a High-TC rf SQUID Coupled to a Substrate Resonator
Ji-Cheng Chen,Hong-Chang Yang,Chiu-Hsien Wu,Herng-Er Horng,Jen-Tzong Jeng,Kuen-Lin Chen 한국물리학회 2006 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.48 No.5I
In the recent development of a high-TC rf SQUID magnetometer, Zhang et al. used a SrTiO3 substrate resonator with a YBCO thin film flux concentrator on it. The effective area was improved by a flux concentrator. However, there was no study of the resonant frequency of the substrate resonator. In this work, the frequency-dependent flux noise of a high-TC rf SQUID coupled to a substrate resonator was investigated. The results were analyzed with the noise theory. The optimization of the SQUID with a substrate resonator and its flux noise are discussed.
Liu, Peter,Chen, Albert Y.,Huang, Yin-Nan,Han, Jen-Yu,Lai, Jihn-Sung,Kang, Shih-Chung,Wu, Tzong-Hann,Wen, Ming-Chang,Tsai, Meng-Han Techno-Press 2014 Smart Structures and Systems, An International Jou Vol.13 No.6
Civil engineers always face the challenge of uncertainty in planning, building, and maintaining infrastructure. These works rely heavily on a variety of surveying and monitoring techniques. Unmanned aerial vehicles (UAVs) are an effective approach to obtain information from an additional view, and potentially bring significant benefits to civil engineering. This paper gives an overview of the state of UAV developments and their possible applications in civil engineering. The paper begins with an introduction to UAV hardware, software, and control methodologies. It also reviews the latest developments in technologies related to UAVs, such as control theories, navigation methods, and image processing. Finally, the paper concludes with a summary of the potential applications of UAV to seismic risk assessment, transportation, disaster response, construction management, surveying and mapping, and flood monitoring and assessment.
Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks
Hung-Yu Chien,Tzong-Chen Wu 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.6
Applying Varying Pseudonym (VP) to design of Radio Frequency Identification (RFID) authentication protocol out-performs the other existing approaches in several respects. However, this approach is prone to the well-known denial-of-service (DOS) attack. In this paper, we examine the de-synchronization problems of VP-based RFID authentication protocols, and propose effective solutions to eliminate such weaknesses. We shall show that the proposed solutions indeed improve the security for these protocols, and moreover, these solutions require O(1) computational cost for identifying a tag and O(1) key space on the tag. These excellent performances make them very attractive to many RFID applications.
On the Design of the Latch Mechanism for Wafer Containers in a SMIF Environment
Lee, Jyh-Jone,Chen, Dar-Zen,Pai, Wei-Ming,Wu, Tzong-Ming The Korean Society of Mechanical Engineers 2006 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.20 No.12
This paper presents, the design of a latch mechanism for wafer containers in a standard mechanical interface environment. For an integrated circuits fabrication factory, the standard mechanical interfaced wafer container is an effective tool to prevent wafers from particle contamination during wafer storage, transporting or transferring. The latch mechanism inside the container door is used to latch and further seal the wafer container for safety and air quality. Kinematic characteristics of the mechanism are established by analyzing the required functions of the mechanisms. Based on these characteristics, a methodology for enumerating feasible latch mechanisms is developed. New mechanisms with one degree-of-freedom and up to five links are generated. An optimum design is also identified with respect to the criteria pertinent to the application. The computer-aided simulation is also built to verify the design.
Yun-Chieh Tsai,Yu-Chen Lin,Chun-Chih Huang,Oliver B. Villaflores,Tzong-Yuan Wu,Shih-Ming Huang,Ting-Yu Chin 한국식품영양과학회 2019 Journal of medicinal food Vol.22 No.5
Aging and lifestyle factors, including high-sugar and high-fat diets, promote a systemic metabolic imbalance that promotes neurodegeneration. Hericium erinaceus has long been used in traditional Chinese medicine. Recently, its functional activities, such as antimetabolic dysfunction, antineuroinflammatory activities, and stimulation of nerve growth factor (NGF) synthesis, have been revealed. This study demonstrated that Hericium erinaceus mycelium (HEM) and an isolated diterpenoid derivative, erinacine A (EA), may reverse spatial learning disabilities in aging mice (15 months old) fed with a high-fat and high-sucrose diet (HFSD). Aging mice were randomly assigned to one of four treatment groups: (1) a chow diet (control), (2) an HFSD, and an HFSD supplemented with either (3) HEM or (4) EA for 18 weeks. The Morris water maze (MWM) and Y-maze were used for behavioral assessments. Both HEM- and EA-treated mice had shorter mean daily escape latencies than HFSD-treated mice in the MWM. In addition, HEM-treated mice had a slightly increased exploratory time and frequency in the novel arm in the Y-maze. Quantitative PCR revealed that both HEM- and EA-treated mice exhibited reduced messenger RNA (mRNA) expression of tumor necrosis factor-α, interleukin-1β, and HEM-treated mice exhibited increased mRNA expression of NGF and NeuN in the hippocampus. Moreover, HEM and EA also decreased body weight, abdominal fat, plasma glucose, serum and liver total cholesterol, and liver triacylglycerol. Thus, HEM may be a potential health-promoting supplement for minimizing the progression of aging and obesity-induced neurodegeneration by reducing metabolic abnormalities and neuroinflammatory cytokines and increasing neurogenesis factors.
Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks
Hung-Yu Chien,Tzong-Chen Wu 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.b6
Applying Varying Pseudonym (VP) to design of Radio Frequency Identification (RFID) authentication protocol outperforms the other existing approaches in several respects. However, this approach is prone to the well-known denial-of-service (DOS) attack. In this paper, we examine the de-synchronization problems of VP-based RFID authentication protocols, and propose effective solutions to eliminate such weaknesses. We shall show that the proposed solutions indeed improve the security for these protocols, and moreover, these solutions require O(1) computational cost for identifying a tag and O(1) key space on the tag. These excellent performances make them very attractive to many RFID applications.