• 제목/요약/키워드: Key Curve

Search Result 524, Processing Time 0.021 seconds

The Effect of External DC Electric Field on the Atmospheric Corrosion Behaviour of Zinc under a Thin Electrolyte Layer

  • Liang, Qinqin;YanYang, YanYang;Zhang, Junxi;Yuan, Xujie;Chen, Qimeng
    • Corrosion Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.54-59
    • /
    • 2018
  • The effect of external DC electric field on atmospheric corrosion behavior of zinc under a thin electrolyte layer (TEL) was investigated by measuring open circuit potential (OCP), cathodic polarization curve, and electrochemical impedance spectroscopy (EIS). Results of OCP vs. time curves indicated that the application of external DC electric field resulted in a negative shift of OCP of zinc. Results of cathodic polarization curves measurement and EIS measurement showed that the reduction current of oxygen increased while charge transfer resistance ($R_{ct}$) decreased under the external DC electric field. Variation of OCP negative shift, reduction current of oxygen, and $R_{ct}$ increase with increasing of external DC electric field strength as well as the effect of external DC electric field on double-layer structure in the electrode/electrolyte interface and ions distribution in thin electrolyte layer were analyzed. All results showed that the external DC electric field could accelerate the corrosion of zinc under a thin electrolyte layer.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing

  • Li, Haoxing;Li, Fenghua;Song, Chenggen;Yan, Yalong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2719-2735
    • /
    • 2015
  • In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposed many mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few of them can resist from the smart card lost problem and provide both of the forward security and the backward security. In this paper, we propose a novel authentication scheme for cloud computing which can address these problems and also provide the anonymity for the user. The trick we use is using the password, the smart card and the public key technique to protect the processes of the user's authentication and key exchange. Under the Elliptic Curve Diffie-Hellman (ECDH) assumption, it is provably secure in the random oracle model. Compared with the existing smart card based authentication schemes in the cloud computing, the proposed scheme can provide better security degree.

Modeling time-dependent behavior of hard sandstone using the DEM method

  • Guo, Wen-Bin;Hu, Bo;Cheng, Jian-Long;Wang, Bei-Fang
    • Geomechanics and Engineering
    • /
    • v.20 no.6
    • /
    • pp.517-525
    • /
    • 2020
  • The long-term stability of rock engineering is significantly affected by the time-dependent deformation behavior of rock, which is an important mechanical property of rock for engineering design. Although the hard rocks show small creep deformation, it cannot be ignored under high-stress condition during deep excavation. The inner mechanism of creep is complicated, therefore, it is necessary to investigate the relationship between microscopic creep mechanism and the macro creep behavior of rock. Microscopic numerical modeling of sandstone creep was performed in the investigation. A numerical sandstone sample was generated and Parallel Bond contact and Burger's contact model were assigned to the contacts between particles in DEM simulation. Sensitivity analysis of the microscopic creep parameters was conducted to explore how microscopic parameters affect the macroscopic creep deformation. The results show that the microscopic creep parameters have linear correlations with the corresponding macroscopic creep parameters, whereas the friction coefficient shows power function with peak strength and Young's modulus, respectively. Moreover, the microscopic parameters were calibrated. The creep modeling curve is in good agreement with the verification test result. Finally, the creep curves under one-step loading and multi-step loading were compared. This investigation can act as a helpful reference for modeling rock creep behavior from a microscopic mechanism perspective.

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

Multiscale Simulation of Yield Strength in Reduced-Activation Ferritic/Martensitic Steel

  • Wang, Chenchong;Zhang, Chi;Yang, Zhigang;Zhao, Jijun
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.569-575
    • /
    • 2017
  • One of the important requirements for the application of reduced-activation ferritic/martensitic (RAFM) steel is to retain proper mechanical properties under irradiation and high-temperature conditions. To simulate the yield strength and stress-strain curve of steels during high-temperature and irradiation conditions, a multiscale simulation method consisting of both microstructure and strengthening simulations was established. The simulation results of microstructure parameters were added to a superposition strengthening model, which consisted of constitutive models of different strengthening methods. Based on the simulation results, the strength contribution for different strengthening methods at both room temperature and high-temperature conditions was analyzed. The simulation results of the yield strength in irradiation and high-temperature conditions were mainly consistent with the experimental results. The optimal application field of this multiscale model was 9Cr series (7-9 wt.%Cr) RAFM steels in a condition characterized by 0.1-5 dpa (or 0 dpa) and a temperature range of $25-500^{\circ}C$.

Simulation of impact toughness with the effect of temperature and irradiation in steels

  • Wang, Chenchong;Wang, Jinliang;Li, Yuhao;Zhang, Chi;Xu, Wei
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.221-227
    • /
    • 2019
  • One of the important requirements for the application of reduced activation ferritic/martensitic steel is to retain proper mechanical properties in irradiation and high temperature conditions. In order to simulate the impact toughness with the effect of temperature and irradiation, a simulation model based on energy balance method consisted of crack initiation, plastic propagation and cleavage propagation stages was established. The effect of temperature on impact toughness was analyzed by the model and the trend of the simulation results was basicly consistent with the previous experimental results of CLAM steels. The load-displacement curve was simulated to express the low temperature ductile-brittle transition. The effect of grain size and inclusion was analyzed by the model, which was consistent with classical experiment results. The transgranular-intergranular transformation in brittle materials was also simulated.

A quantitative method for detecting meat contamination based on specific polypeptides

  • Feng, Chaoyan;Xu, Daokun;Liu, Zhen;Hu, Wenyan;Yang, Jun;Li, Chunbao
    • Animal Bioscience
    • /
    • v.34 no.9
    • /
    • pp.1532-1543
    • /
    • 2021
  • Objective: This study was aimed to establish a quantitative detection method for meat contamination based on specific polypeptides. Methods: Thermally stable peptides with good responses were screened by high resolution liquid chromatography tandem mass spectrometry. Standard curves of specific polypeptide were established by triple quadrupole mass spectrometry. Finally, the adulteration of commercial samples was detected according to the standard curve. Results: Fifteen thermally stable peptides with good responses were screened. The selected specific peptides can be detected stably in raw meat and deep processed meat with the detection limit up to 1% and have a good linear relationship with the corresponding muscle composition. Conclusion: This method can be effectively used for quantitative analysis of commercial samples.

Cascaded-Hop For DeepFake Videos Detection

  • Zhang, Dengyong;Wu, Pengjie;Li, Feng;Zhu, Wenjie;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1671-1686
    • /
    • 2022
  • Face manipulation tools represented by Deepfake have threatened the security of people's biological identity information. Particularly, manipulation tools with deep learning technology have brought great challenges to Deepfake detection. There are many solutions for Deepfake detection based on traditional machine learning and advanced deep learning. However, those solutions of detectors almost have problems of poor performance when evaluated on different quality datasets. In this paper, for the sake of making high-quality Deepfake datasets, we provide a preprocessing method based on the image pixel matrix feature to eliminate similar images and the residual channel attention network (RCAN) to resize the scale of images. Significantly, we also describe a Deepfake detector named Cascaded-Hop which is based on the PixelHop++ system and the successive subspace learning (SSL) model. By feeding the preprocessed datasets, Cascaded-Hop achieves a good classification result on different manipulation types and multiple quality datasets. According to the experiment on FaceForensics++ and Celeb-DF, the AUC (area under curve) results of our proposed methods are comparable to the state-of-the-art models.