简介:Twosignaturesystemsbasedonsmartcardsandfingerprintfeaturesareproposed.Inonesignaturesystem,thecryptographickeyisstoredinthesmartcardandisonlyaccessiblewhenthesigner'sextractedfingerprintfeaturesmatchhisstoredtemplate.Toresistbeingtamperedonpublicchannel,theuser'smessageandthesignedmessageareencryptedbythesigner'spublickeyandtheuser'spublickey,respectively.Intheothersignaturesystem,thekeysaregeneratedbycombiningthesigner'sfingerprintfeatures,checkbits,andarememberablekey,andtherearenomatchingprocessandkeysstoredonthesmartcard.Additionally,thereisgenerallymorethanonepublickeyinthissystem,thatis,thereexistsomepseudopublickeysexceptarealone.
简介:在上面提到的由消费明星做的那些广告中,明星做广告,由消费明星把消费伦理宣扬得赤裸裸的莫过于王志文做的"派"牌服装广告
简介:在上面提到的由消费明星做的那些广告中,明星做广告,由消费明星把消费伦理宣扬得赤裸裸的莫过于王志文做的"派"牌服装广告
简介:在上面提到的由消费明星做的那些广告中,明星做广告,由消费明星把消费伦理宣扬得赤裸裸的莫过于王志文做的"派"牌服装广告
简介:Duringthelastfewdecades,photothermalradiometry(PTR)hasbeengreatlydevelopedandwidelyappliedinthefieldofnondestructivetesting.However,thetraditionalPTRsystememploysanexpensivelock-inamplifiertodetecttheweakphotothermalsignal,whichleadstohighcostandlongtesttime.Inthispaper,afasttransmissionPTRsystembasedonsamplingbyusinganinternalcomputersoundcardwasdevelopedtolowerthesystemcostandshorterthetesttime.Apieceofamorphoussilicon(a:Si)thinfilmsolarcellswithartificialdefectswaspreparedandtestedbythesystem.Theresultsshowthatthesharpeneddefectscanbeidentifiedeasilyandquicklyaccordingtothesignificantpeaksoftheoriginalinfraredsignalsampledbytheinternalcomputersoundcard.Furthermore,moredetaileddefectscanbeinvestigatedbyprocessingtheinfraredsignal.ThesevalidatetheeffectivenessoftheproposedtransmissionPTRsystemasalowcostandefficientnon-destructivetesttechnique.
简介:Nowadays,thepassword-basedremoteuserauthenticationmechanismusingsmartcardisoneofthesimplestandconvenientauthenticationwaystoensuresecurecommunicationsoverthepublicnetworkenvironments.Recently,Liuetal.proposedanefficientandsecuresmartcardbasedpasswordauthenticationscheme.However,wefindthatLiuetal.’sschemeisvulnerabletotheoff-linepasswordguessingattackanduserimpersonationattack.Furthermore,italsocannotprovideuseranonymity.Inthispaper,wecryptanalyzeLiuetal.’sschemeandproposeasecurityenhanceduserauthenticationschemetoovercometheaforementionedproblems.Especially,inordertopreservetheuseranonymityandpreventtheguessingattack,weusethedynamicidentitytechnique.Theanalysisshowsthattheproposedschemeismoresecureandefficientthanotherrelatedauthenticationschemes.
简介:
简介:Purpose:Acuteexercisehasbeenlinkedtothefacilitationofexecutivefunction,butlittleisknownregardingexecutivefunctionassessedbytheWisconsinCardSortingTest(WCST).ThepresentresearchconsistedoftwoexperimentsaimedtodeterminewhetheracuteaerobicexerciseinfluencessuccessiveWCSTperformance.Methods:InStudy1,27youngadultswererandomlyassignedtotheexerciseorreadingcontrolgroupandtheninstructedtoperformtheWCSTbeforeandafterassignedtreatment.Inexercisegroup,participantscompletedasingleboutaerobicexercisewithmoderateintensityfor20minonastationarybike.AsimilarexperimentalprotocolwasreplicatedinStudy2with24latemiddle-agedadultstolookforagedifferencesduringadulthoodandcontrolforapotentialceilingeffectatyoungadultage.Results:Althoughasignificanttimeeffectwasobservedinyoungadults,bothstudiesrevealedthattherewasnomaineffectfortreatmentoraninteractionbetweentreatmentandtimeonanyoftheWCSTindices.Conclusion:AcuteaerobicexercisefailedtoinfluenceexecutivefunctionasassessedbytheWCST,revealingthatthisclassicalneuropsychologicaltesttappingexecutivefunctionmaynotbesensitivetoacuteexercise.Ourfindingssuggestthatacuteexercisedoesnotbroadlyaffecttheentirefamilyofexecutivefunctions,oritseffectonaspecificaspectofexecutivefunctionmaybetask-dependent,asproposedbyEtnierandChang(2009).
简介:In2010,Hwang,etal.proposeda'DoS-resistantID-basedpasswordauthenticationschemeusingsmartcards'asanimprovementofKim-Lee-Yoo's'ID-basedpasswordauthenticationscheme'.Inthispaper,wecryptanalyzeHwang,etal.'sschemeandpointoutthattherevealedsessionkeycouldthreatthesecurityofthescheme.Wedemonstratethatextractinginformationfromsmartcardsisequaltoknowingthesessionkey.Thusknownsessionkeyattacksarealsoeffectiveundertheas-sumptionthattheadversarycouldobtaintheinformationstoredinthesmartcards.WeproposedanimprovedschemewithsecurityanalysistoremedytheweaknessesofHwang,etal.'sscheme.Thenewschemedoesnotonlykeepallthemeritsoftheoriginal,butalsoprovidesseveraladditionalphasestoimprovetheflexibility.Finally,theimprovedschemeismoresecure,efficient,practical,andconvenient,becauseellipticcurvecryptosystemisintroduced,theexpensivesmartcardsandsynchronizedclocksystemarereplacedbymobiledevicesandnonces.