修车大队一品楼qm论坛51一品茶楼论坛,栖凤楼品茶全国楼凤app软件 ,栖凤阁全国论坛入口,广州百花丛bhc论坛杭州百花坊妃子阁

oe1(光电查) - 科学论文

39 条数据
?? 中文(中国)
  • [IEEE 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) - Takayama, Japan (2018.11.27-2018.11.30)] 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) - Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer

    摘要: With the advancement of wireless short-range technology, the number of mobile devices is also increasing. Consequently, devices often exchange information using wireless communications, but this communication has vulnerabilities, such as eavesdropping and man-in-the-middle attack. Therefore, it is necessary to perform secure pairing between devices before wireless communication begin. In this paper, we assume that devices are securely paired in limited space, such as a room using wireless communication. The method for secure pairing using Received signal strength (RSS) is simple, but RSS is easy to change due to environmental factors. Recently, pairing method using camera and accelerometer is studied. However, these methods do not directly detect inclination of the device. We propose the one of secure device pairing method using camera and accelerometer. Our proposed method makes the camera read a marker on the display of the device. The marker’s inclination is corresponds to the device’s inclination, hence, we assume that the accuracy is higher than that of existing methods.

    关键词: camera-based authentication,device accelerometer,device authentication,secure device pairing

    更新于2025-09-23 15:23:52

  • An optical asymmetric encryption scheme with biometric keys

    摘要: In this paper, an asymmetric cryptosystem for optical image encryption using biometric keys is proposed based on the phase retrieval algorithm and the phase-truncated Fourier transforms (PTFT) scheme which addresses the issue of key distribution with enhanced security in the optical encryption process. In the proposed system, the encryption keys include optically generated biometric keys and the random phase mask keys of the PTFT scheme, while the decryption keys are kept as the private key in terms of the binary key and the generated phase-only mask of the PTFT scheme. If a person is authorized to retrieve the biometric keys by providing the fingerprint hologram and reconstruction parameters at the receiver stage, then the proposed system satisfies the criteria of asymmetric cryptography with information authentication approach. The biometric key features, by using the digital holography are kept secure and is utilized in both the encryption and decryption operations so that the authenticity of the ciphertext by using the biometric keys can be verified during the decryption process. Numerical simulations are carried out to test the effectiveness and validity of the proposed system.

    关键词: Authentication,Fingerprint biometric key,Asymmetric cryptosystem,Digital holography,Optical encryption and decryption

    更新于2025-09-23 15:23:52

  • Resonant-Tunnelling Diodes as PUF Building Blocks

    摘要: Resonant-Tunnelling Diodes (RTDs) have been proposed as building blocks for Physical Unclonable Functions (PUFs). In this paper we show how the unique RTD current-voltage (I-V) spectrum can be translated into a robust digital representation. We analyse 130 devices and show that RTDs are a viable PUF building block.

    关键词: Authentication,Physical Security,Identification,Physical Unclonable Functions

    更新于2025-09-23 15:22:29

  • [IEEE 2018 IEEE International Conference on Imaging Systems and Techniques (IST) - Krakow, Poland (2018.10.16-2018.10.18)] 2018 IEEE International Conference on Imaging Systems and Techniques (IST) - A low-cost Multi-Fingervein Verification System

    摘要: Fingervein based biometric verification systems are widely used in various access control applications due to their accuracy and reliability. However, almost all existing fingervein systems scan only one finger at a time and this may not be a reliable solution for more secured applications demanding higher accuracy in verification and reliability. In this work, we propose a new multi-fingervein capture system that can simultaneously capture three different fingers in a single capture instance. The developed fingervein sensor is validated for operational purposes through images captured from 20 unique identities(subjects) with 600 fingervein images. The suitability of captured images for biometric applications is vetted through the use of four different state-of-the-art verification algorithms. The results are benchmarked and compared using individual fingervein data and in addition the employability of score level fusion is presented to improve the performance. The reported results in this article support the anticipated increase in performance of the multi-fingervein verification.

    关键词: authentication,identification,fingervein,Biometrics,person verification

    更新于2025-09-23 15:22:29

  • A Restricted Quantum Deniable Authentication Protocol Based on GHZ States

    摘要: Utilizing the property of unitary transformation and Greenberger-Horne-Zeilinger (GHZ) states, a restricted quantum deniable authentication protocol is proposed. The protocol can provide that the sender can deny the content of the sent message, but cannot deny taking part in a certain communication. Security analysis results show that this protocol can satisfy known key security and the basic security requirements of restricted deniable authentication protocol such as completeness, restricted deniability, no-counterfeiting and can withstand impersonation attack, intercept-resend attack.

    关键词: Quantum deniable authentication,Restricted,Greenberger-Horne-Zeilinger (GHZ) states

    更新于2025-09-23 15:21:21

  • [IEEE 2019 Compound Semiconductor Week (CSW) - Nara, Japan (2019.5.19-2019.5.23)] 2019 Compound Semiconductor Week (CSW) - Numerical Investigation of Topological Edge States in a GaAs-Based Three-Dimensional Chiral Photonic Crystal

    摘要: Massive expansion of wireless body area networks (WBANs) in the field of health monitoring applications has given rise to the generation of huge amount of biomedical data. Ensuring privacy and security of this very personal data serves as a major hurdle in the development of these systems. An effective and energy friendly authentication algorithm is, therefore, a necessary requirement for current WBANs. Conventional authentication algorithms are often implemented on higher levels of the Open System Interconnection model and require advanced software or major hardware upgradation. This paper investigates the implementation of a physical layer security algorithm as an alternative. The algorithm is based on the behavior fingerprint developed using the wireless channel characteristics. The usability of the algorithm is established through experimental results, which show that this authentication method is not only effective, but also very suitable for the energy-, resource-, and interface-limited WBAN medical applications.

    关键词: Wireless body area networks,physical layer security,wireless channel characteristics,authentication

    更新于2025-09-23 15:21:01

  • Vein detection with near-infrared organic photodetectors for biometric authentication

    摘要: We combine a low dark current and high-detectivity near-infrared (NIR)-sensitive organic photodetector with a high-resolution 508 pixels per inch (ppi) oxide thin-film transistor (TFT) backplane to create a large-area thin NIR detector, using processes that are compatible with flat-panel display fabrication. The detector is characterized showing high uniformity and linearity. With the use of a NIR light source, the detector is capable of imaging the (pattern of) veins under the skin in reflection, leading to improved biometric authentication.

    关键词: near-infrared organic photodiodes,vein detection,biometric authentication,large-area photodetector arrays

    更新于2025-09-23 15:21:01

  • RAGuard

    摘要: Control-flow integrity (CFI) is a general method for preventing code-reuse attacks, which utilize benign code sequences to achieve arbitrary code execution. CFI ensures that the execution of a program follows the edges of its predefined static Control-Flow Graph: any deviation that constitutes a CFI violation terminates the application. Despite decades of research effort, there are still several implementation challenges in efficiently protecting the control flow of function returns (Return-Oriented Programming attacks). The set of valid return addresses of frequently called functions can be large and thus an attacker could bend the backward-edge CFI by modifying an indirect branch target to another within the valid return set. This article proposes RAGuard, an efficient and user-transparent hardware-based approach to prevent Return-Oriented Programming attacks. RAGuard binds a message authentication code (MAC) to each return address to protect its integrity. To guarantee the security of the MAC and reduce runtime overhead: RAGuard (1) computes the RAMAC by encrypting the signature of the return address with AES-128 to raise the complexity of brute force attacks to 2128; (2) develops a key management module based on a Physical Unclonable Function (PUF) and a True Random Number Generator (TRNG), and (3) uses a dedicated register to reduce MACs’ load and store operations of leaf functions. We have evaluated our mechanism based on the open-source LEON3 processor and the results show that RAGuard incurs acceptable performance overhead and occupies reasonable area.

    关键词: PUF,key management,return-oriented programming attacks,AES-128,Code-reuse attacks,message authentication code

    更新于2025-09-23 15:21:01

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Oxygen Concentration Dependence of Photovoltaic Properties of Intermediate Band Solar Cells based on Cl-doped ZnTeO

    摘要: We present a large-scale study exploring the capability of temporal deep neural networks to interpret natural human kinematics and introduce the first method for active biometric authentication with mobile inertial sensors. At Google, we have created a first-of-its-kind data set of human movements, passively collected by 1500 volunteers using their smartphones daily over several months. We compare several neural architectures for efficient learning of temporal multi-modal data representations, propose an optimized shift-invariant dense convolutional mechanism, and incorporate the discriminatively trained dynamic features in a probabilistic generative framework taking into account temporal characteristics. Our results demonstrate that human kinematics convey important information about user identity and can serve as a valuable component of multi-modal authentication systems. Finally, we demonstrate that the proposed model can also be successfully applied in a visual context.

    关键词: recurrent neural networks,mobile computing,biometrics (access control),Authentication,learning

    更新于2025-09-23 15:19:57

  • Theoretical investigation of pulse temporal compression by graphene-silicon hybrid waveguide

    摘要: Massive expansion of wireless body area networks (WBANs) in the field of health monitoring applications has given rise to the generation of huge amount of biomedical data. Ensuring privacy and security of this very personal data serves as a major hurdle in the development of these systems. An effective and energy friendly authentication algorithm is, therefore, a necessary requirement for current WBANs. Conventional authentication algorithms are often implemented on higher levels of the Open System Interconnection model and require advanced software or major hardware upgradation. This paper investigates the implementation of a physical layer security algorithm as an alternative. The algorithm is based on the behavior fingerprint developed using the wireless channel characteristics. The usability of the algorithm is established through experimental results, which show that this authentication method is not only effective, but also very suitable for the energy-, resource-, and interface-limited WBAN medical applications.

    关键词: wireless channel characteristics,authentication,physical layer security,Wireless body area networks

    更新于2025-09-23 15:19:57