Anti-counterfeiting, Security, and Identification最新文献

筛选
英文 中文
On the security of key derivation functions in office 浅谈办公中密钥派生功能的安全性
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325279
Jun Zhou, Jing Chen, Kun Pan, Cuicui Zhao, Xiaochao Li
{"title":"On the security of key derivation functions in office","authors":"Jun Zhou, Jing Chen, Kun Pan, Cuicui Zhao, Xiaochao Li","doi":"10.1109/ICASID.2012.6325279","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325279","url":null,"abstract":"In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys are usually derived from a password. Thus, password based key derivation function (PBKDF) is the core of the security scheme. However, the security of the PBKDF of Office is not yet ensured. In this paper, the PBKDF algorithm is analyzed through the game-playing approach and upper bounded of the Adversary's Advantage over the KDF and random function. Based on that, we discussed the practical safety of the Office encrypted files, and show that Office is secure when the user password is longer than 6 characters.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An overview of Physical layers on wireless body area network 无线体域网络物理层概述
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325342
Miaoxin Li, Mingjie Zhuang
{"title":"An overview of Physical layers on wireless body area network","authors":"Miaoxin Li, Mingjie Zhuang","doi":"10.1109/ICASID.2012.6325342","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325342","url":null,"abstract":"As a branch of WSN and an important part of the internet of things (IOT), the wireless body area network (WBAN) was originally created to improve the level of personal health care. And with the development of wireless technologies, the application of the WBAN has expanded to entertainment, leisure, military and other fields. So far, IEEE 802 Task Group has published a new IEEE 802.15.6 standard. The standard defines a Medium Access Control (MAC) layer supporting three Physical (PRY) layers. The three PRY layers are narrowband (NB) PRY, ultra wideband (UWB) PRY and human body communication (RBC) PRY. In this paper, the concept and applications of WBAN are introduced; comparisons between 802.11, 802.15.1, 802.15.4 and 802.15.6 are made; and a brief description about the three PRY layers specifications is given. Some existing questions and challenges the WBAN confronts are also analyzed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An improved IEEE 802.11 DCF protocol based on TCP/UDP hybrid stream 基于TCP/UDP混合流的改进IEEE 802.11 DCF协议
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325337
Yong Zhang, Yongtao Hu, Bin Wu
{"title":"An improved IEEE 802.11 DCF protocol based on TCP/UDP hybrid stream","authors":"Yong Zhang, Yongtao Hu, Bin Wu","doi":"10.1109/ICASID.2012.6325337","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325337","url":null,"abstract":"As a conventional MAC control protocol for wireless networks, IEEE 802.11 DCF hasn't taken account into the requirement, which TCP/UDP hybrid stream access needs for MAC frame length. The TCP/UDP hybrid stream's transmission delay would increase significantly, that always generate failure of TCP stream transmitting. This paper proposes an improved IEEE 802.11 DCF protocol and theory model based on TCP/UDP hybrid streams. The improved protocol mentioned differentiates length between TCP package and UDP package, and adaptively adjusts MAC frame length, which avoids lost packages retransmission and delay from TCP/UDP hybrid stream. The simulation we made to verify that prior estimate for TCP/UDP packages quantities in sole channel can promote throughput of network more than 10% with transmission delay elimination.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diffusion and wave propagation patterns in computational verb cellular networks 计算动词细胞网络中的扩散和波传播模式
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325330
Kun Wen, Xuezhi Wu, Tao Yang
{"title":"Diffusion and wave propagation patterns in computational verb cellular networks","authors":"Kun Wen, Xuezhi Wu, Tao Yang","doi":"10.1109/ICASID.2012.6325330","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325330","url":null,"abstract":"In this paper, on the basis of the computational verb theory, we set special local verb rules and specific initial conditions to try to simulate some phenomena in two dimensional computational verb cellular networks then we get some diffusion and wave propagation patterns. We pick up three typical types to be shown in this paper, that is, ripple propagation patterns, target wave propagation patterns and diamond propagation patterns. And we use ripple propagation patterns to model raindrops ripple. Compared to the traditional physical methods of water wave modeling, the 2D CVCNs could model the phenomena by an easier way. The models which are based on the 2D CVCN reveal that computational verb cellular networks have good capabilities for physical modeling.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The design of ideal diode 理想二极管的设计
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325307
D. Ma, J. Xing
{"title":"The design of ideal diode","authors":"D. Ma, J. Xing","doi":"10.1109/ICASID.2012.6325307","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325307","url":null,"abstract":"This article describes a P-channel MOSFET ideal diode circuit. The P-channel MOSFET on-resistance that connects the input and output is only 100mΩ in the circuit. In order to ensure the drop voltage from the input to the output is equal to V1(when I1 = 2A, V1 = 256mV), the circuit uses a high-gain amplifier to adjust the gate voltage of the P-channel MOS transistor(MP0). And the circuit also uses a high side current sensing comparator to limit the current that flows through the P-channel MOSFET. The maximum forward current achieves 2A, and the maximum reverse leakage current is 2μA. Simulation results using a 0.5μm BCD process are presented and discussed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The design of multi-channel temperature detecting system 多通道温度检测系统的设计
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325292
Yuanyuan Chen, Jing Chen
{"title":"The design of multi-channel temperature detecting system","authors":"Yuanyuan Chen, Jing Chen","doi":"10.1109/ICASID.2012.6325292","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325292","url":null,"abstract":"There are many occasions we need to test its temperature in real time, such as, grain storage, boilers, etc. The design is mainly studied the establishment and application of multi-channel temperature measurement system. Besides, it has chosen the STC89C52 as the core control chip, and the DS18B20 chips as sensors, also uses Shift register that called 74HC595 to drive the LED, and uses the chip LM7805 to make the voltage of system more stable. Finally, uses the MAX232 chip to convert the level, and to download the program to the microcontroller. The system is so rapid, accurate, reliable, economic, simple that finally realized the multi-channel temperature measurement. The results show that by laboratory test. The temperature ranges from - 55 ° C to 125 ° C, In - 10 ~ + 85 ° C range, the precision of temperature is ±0.5°C. The system is suitable for common occasions of multichannel temperature measure, has great potential for development and practical significance.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121733535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of copy-move forgery image using Gabor descriptor 利用Gabor描述符检测复制-移动伪造图像
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325319
Hao-Chiang Hsu, Min Wang
{"title":"Detection of copy-move forgery image using Gabor descriptor","authors":"Hao-Chiang Hsu, Min Wang","doi":"10.1109/ICASID.2012.6325319","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325319","url":null,"abstract":"In this paper a new forgery detection system which uses a novel feature extraction and located algorithm is proposed. The Gabor feature of image is used to detect the forged image caused by copy and move operations. The Gabor filter with different scaling factors, rotation angles and frequencies are considered to generate the Gabor feature representation of an image. For comparing two images, their Gabor features are applied to find if there is any similarity between them. To reduce the processing time and detect the small copy and move area, an image is divided into small blocks. In each block, it extracts a new descriptor and key points from the Gabor feature of the block image. Furthermore, the proposed method can also locate the duplicated regions precisely and detects the rotation angles and scale factors of the forged image. Experimental result shows that the proposed method can achieve high correct rate, estimated rotation angle and scaling factor. The proposed method has robustness and reliability.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An improved DCT based zero-watermarking algorithm for text image 基于改进DCT的文本图像零水印算法
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325285
Gui Feng, X. Huang
{"title":"An improved DCT based zero-watermarking algorithm for text image","authors":"Gui Feng, X. Huang","doi":"10.1109/ICASID.2012.6325285","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325285","url":null,"abstract":"An improved zero-watermarking algorithm, which solving the contradiction between the watermark embedding capacity of and invisibility, was proposed. The zero-watermarking algorithm needn't to modify the carrier; so many watermarking methods can be used and without the need to consider the embedding capacity, and robustness is better than the normal watermarking algorithm. The steps of proposed zero-watermarking algorithm are as follows: first, the text carrier is translated into the corresponding binary image, then use DCT combined with the logistic mapping to construct zero-watermark, the similarity criteria was used for the watermark detection. After many attacking experiments, performance of the algorithm shows that the robustness, invisibility and the watermark capacity of the algorithm, can meet the requirements of practical need.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis and design of high-performance relaxation OSC 高性能松弛OSC的分析与设计
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325312
Y. Du, J. Xing
{"title":"Analysis and design of high-performance relaxation OSC","authors":"Y. Du, J. Xing","doi":"10.1109/ICASID.2012.6325312","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325312","url":null,"abstract":"A high PSRR, low temperature drift relaxation oscillator is proposed, which operates at a typical frequency of 167KHZ. Under all process Corners, and with the change of power supply from 3V to 6V and temperature from -45°C to 105 °C the frequency error is less than ±1.8%. Trimming circuit is used to guarantee the accuracy of frequency after taping out. Based on the TSMC 0.18μm BCD process, the circuit is simulated to verify the correctness of the design.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification persons-security components of ID card 身份识别——身份证的安全组件
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325277
R. Holy, J. Kalikova, M. Kalika
{"title":"Identification persons-security components of ID card","authors":"R. Holy, J. Kalikova, M. Kalika","doi":"10.1109/ICASID.2012.6325277","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325277","url":null,"abstract":"Personal identification is everyday struggle between each identified individual and the security personnel. This is equally important on academic grounds where unauthorized individuals could access university resources and university research. Even in case that every member of the academic staff is a holder of the university identification card used for access to restricted areas, computers, library or cafeterias, this identity card can be lost, stolen or borrowed to someone else. Therefore added security in form of combination of more complex chip card architecture and biometric is desired to ensure a proper level of protection.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信