Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video a...Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.展开更多
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient...Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.展开更多
Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol (SAP). The authentication process is very complicated, and therefore, the grid user is in a heavily loaded poi...Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol (SAP). The authentication process is very complicated, and therefore, the grid user is in a heavily loaded point both in computation and in communication. Based on identity-based architecture for grid (IBAG) and corresponding encryption and signature schemes, an identity-based authentication protocol for grid is proposed. Being certificate-free, the authentication protocol aligns well with the demands of grid computing. Through simulation testing, it is seen that the authentication protocol is more lightweight and efficient than SAP, especially the more lightweight user side. This contributes to the larger grid scalability.展开更多
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that...A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.展开更多
With the continuous development of society and city,the urban village has been born with time.The book Naked City:The Death and Life of Authentic Urban Places by Sharon Zukin is a reflection on the"authenticity&q...With the continuous development of society and city,the urban village has been born with time.The book Naked City:The Death and Life of Authentic Urban Places by Sharon Zukin is a reflection on the"authenticity"of urban village under the background of big city’s development.Through the study of this book,other four books and the field investigation of Nantou Ancient City and Baishizhou which are typical"urban village"in Shenzhen,we can understand the authenticity,and further explore how to construct the authentic places and how to find their own way of authenticity in the development of The Times.展开更多
As the agricultural heritage,Hani terrace is not only culturally authentic and non- renew able,but has its ow n characteristics. Firstly,it is a kind of economic and social mode of production. Secondly,it reflects the...As the agricultural heritage,Hani terrace is not only culturally authentic and non- renew able,but has its ow n characteristics. Firstly,it is a kind of economic and social mode of production. Secondly,it reflects the idea of harmonious and sustainable development betw een human beings and nature. T hirdly,the participation of human beings — or farmers is important. As a result,to exploit and protect the agricultural heritage,it is crucial to balance systematic protection and sustainable development in order to realize dynamic protection. In addition,the agricultural heritage shall be treated as the driving agent to coordinate the social and economic development. T hrough analyzing the characteristics of the agricultural heritage and the concept of protecting the agricultural heritage,this paper proposes to promote the protection of agricultural authenticity by alternative tourism development in order to balance the development and realize the sustainability of the agricultural dynamic system.展开更多
文摘Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.
文摘Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.
基金the Sichuan Provincial Youth Software Innovation Foundation (2004AA03692005AA0827).
文摘Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol (SAP). The authentication process is very complicated, and therefore, the grid user is in a heavily loaded point both in computation and in communication. Based on identity-based architecture for grid (IBAG) and corresponding encryption and signature schemes, an identity-based authentication protocol for grid is proposed. Being certificate-free, the authentication protocol aligns well with the demands of grid computing. Through simulation testing, it is seen that the authentication protocol is more lightweight and efficient than SAP, especially the more lightweight user side. This contributes to the larger grid scalability.
基金Project(2012BAH09B02) supported by the National Science and Technology Support Program,ChinaProjects(12JJ3068,12JJ2041) supported by the Natural Science Fundation of Hunan Province,China
文摘A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.
文摘With the continuous development of society and city,the urban village has been born with time.The book Naked City:The Death and Life of Authentic Urban Places by Sharon Zukin is a reflection on the"authenticity"of urban village under the background of big city’s development.Through the study of this book,other four books and the field investigation of Nantou Ancient City and Baishizhou which are typical"urban village"in Shenzhen,we can understand the authenticity,and further explore how to construct the authentic places and how to find their own way of authenticity in the development of The Times.
基金This paper is the phased achievement of the key program of the social science fund of the Education Department of Yunnan Province-R esearch on the Bridgehead Strategy of the Yunnan Frontier culture(N o.:2012Z059)
文摘As the agricultural heritage,Hani terrace is not only culturally authentic and non- renew able,but has its ow n characteristics. Firstly,it is a kind of economic and social mode of production. Secondly,it reflects the idea of harmonious and sustainable development betw een human beings and nature. T hirdly,the participation of human beings — or farmers is important. As a result,to exploit and protect the agricultural heritage,it is crucial to balance systematic protection and sustainable development in order to realize dynamic protection. In addition,the agricultural heritage shall be treated as the driving agent to coordinate the social and economic development. T hrough analyzing the characteristics of the agricultural heritage and the concept of protecting the agricultural heritage,this paper proposes to promote the protection of agricultural authenticity by alternative tourism development in order to balance the development and realize the sustainability of the agricultural dynamic system.