期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Efficient and provably secure identification scheme without random oracles 被引量:1
1
作者 LI Yan-ping WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第1期76-80,共5页
The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocol... The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocols by various methods. Based on the hardness assumption of the discrete logarithm problem in a gap Diffie-Hellman group and the difficulty of the collusion attack algorithm with k traitors, an efficient identification scheme is presented. Without random oracle models, the proposed scheme is then proved secure against impersonation and reset attacks in both concurrent and reset attack setting. Since the proposed scheme is simple, memory-saving, computation-efficient, and perfectly-secure, it is well suitable for use in smart cards. 展开更多
关键词 identification schemes RSA problem bilinear pairing random oracle model
原文传递
Analysis of identifiers in IoT platforms 被引量:1
2
作者 Haris Aftab Komal Gilani +3 位作者 JiEun Lee Lewis Nkenyereye SeungMyeong Jeong JaeSeung Song 《Digital Communications and Networks》 SCIE 2020年第3期333-340,共8页
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ... The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms. 展开更多
关键词 Internet of things Identifiers identification schemes IoT platforms IoT standards
在线阅读 下载PDF
Identification of Lagrangian coherent structures in the turbulent boundary layer 被引量:16
3
作者 PAN Chong WANG JinJun ZHANG Cao 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2009年第2期248-257,共10页
Using Finite-Time Lyapunov Exponents (FTLE) method, Lagrangian coherent structures (LCSs) in a fully developed flat-plate turbulent boundary layer are successfully identified from a two-dimensional (2D) velocity field... Using Finite-Time Lyapunov Exponents (FTLE) method, Lagrangian coherent structures (LCSs) in a fully developed flat-plate turbulent boundary layer are successfully identified from a two-dimensional (2D) velocity field obtained by time-resolved 2D PIV measurement. The typical LCSs in the turbulent boundary layer are hairpin-like structures, which are characterized as legs of quasi-streamwise vor- tices extending deep into the near wall region with an inclination angle θ to the wall, and heads of the transverse vortex tube located in the outer region. Statistical analysis on the characteristic shape of typical LCS reveals that the probability density distribution of θ accords well with t-distribution in the near wall region, but presents a bimodal distribution with two peaks in the outer region, corresponding to the hairpin head and the hairpin neck, respectively. Spatial correlation analysis of FTLE field is im- plemented to get the ensemble-averaged inclination angle θ R of typical LCS. θ R first increases and then decreases along the wall-normal direction, similar to that of the mean value of θ. Moreover, the most probable value of θ saturates at y+=100 with the maximum value of about 24°, suggesting that the most likely position where hairpins transit from the neck to the head is located around y+=100. The ensem- ble-averaged convection velocity Uc of typical LCS is finally calculated from temporal-spatial correla- tion analysis of FTLE field. It is found that the wall-normal profile of the convection velocity Uc(y) ac- cords well with the local mean velocity profile U(y) beyond the buffer layer, evidencing that the down- stream convection of hairpins determines the transportation properties of the turbulent boundary layer in the log-region and beyond. 展开更多
关键词 turbulent boundary layer coherent structures vortex identification scheme finite-time Lyapunov exponents hairpin-like
原文传递
A new scheme for identifying free surface particles in improved SPH 被引量:6
4
作者 ZHENG Xing DUAN WenYang MA QingWei 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第8期1454-1463,共10页
The present paper proposes a new scheme for identifying free surface particles in an improved SPH (Smoothed Particle Hydrodynamics). With the development of the SPH, free surface identification becomes a key challenge... The present paper proposes a new scheme for identifying free surface particles in an improved SPH (Smoothed Particle Hydrodynamics). With the development of the SPH, free surface identification becomes a key challenge in free surface flow simulations, especially for violent breaking water waves. According to numerical tests, existing free surface identified schemes are not reliable for weakly compressible SPH when violent waves are modeled. The new free surface identification scheme suggested here considers changes in density ratio and three auxiliary functions. Although this new scheme originates from a scheme for another meshfree method (MLPG_R method), it includes several improvements, especially developed for the improved SPH. The limited numerical tests have indicated that the scheme does not significantly increase CPU time required, but it considerably improves the identification of free surface particles. 展开更多
关键词 meshfree method SPH free surface identification scheme improved SPH
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部