Showing 381 - 400 results of 4,308 for search 'Provexis~', query time: 2.53s Refine Results
  1. 381
  2. 382
  3. 383
  4. 384
  5. 385
  6. 386
  7. 387

    Sensing-Based Spectrum Sharing Method in Satellite-Terrestrial Network by Jing HU, Dongming BIAN, Xiang TIAN, Yinxia ZHU, Jian ZHANG

    Published 2021-12-01
    “…Considering the spatial possibility of opportunistic spectrum sharing, sensing-based spectrum sharing method ws applied in the satellite-terrestrial network.The sensing-throughput tradeoff problem was studied, and the throughput is a concave function of the sensing duration was proved.In order to further improved the satellite uplink throughput, the multi-slots sensing method and the cooperative sensing method were proposed.Computer simulations showed that the optimal sensing duration could maximized the uplink throughput, and the multi-slot sensing method or the cooperative sensing method could further improved the throughput of satellite network.…”
    Get full text
    Article
  8. 388
  9. 389
  10. 390
  11. 391

    Analiza ispunjenosti uslova za mernu nesigurnost sistema za kontrolu pametnih brojila i smanjenje vremena provere registra by Đorđe Dukanac

    Published 2024-06-01
    “…Prvi cilj ovog rada je da se proveri da li je ovaj prvi uslov najkritičniji za cosφ=0,25 induktivno ili cosφ=0,5 kapacitivno, koji se zadaju na poseban zahtev korisnika brojila. …”
    Get full text
    Article
  12. 392
  13. 393
  14. 394

    New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO

    Published 2014-11-01
    “…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
    Get full text
    Article
  15. 395
  16. 396
  17. 397
  18. 398

    Study on enhancing integrity for BLP model by LIU Yan-ming, DONG Qing-kuan, LI Xiao-ping

    Published 2010-01-01
    “…A model which enhances the integrity of BLP model was presented based on the BLP model.This model was called as EIBLP model.Some necessary restraints to upward information flow were appended in EIBLP without chang-ing the information flow direction(down-read and up-write) of BLP model and the security axiom,access labels of sub-ject and object,access control operation mode,and state transition policy of BLP model were improved.And then,ana-lyzes the security of EIBLP was analyzed and proved.It shows that the improved EIBLP model not only satisfies com-pletely the basic security of BLP,but also enhances the integrity of BLP with improving the upward restraints,the subject and object access labels,the model operation mode,and the model state translation rules.At the same time,the improved EIBLP raises the confidentiality of BLP at a certain extent.…”
    Get full text
    Article
  19. 399

    Design of efficient anonymous identity authentication protocol for lightweight IoT devices by Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG

    Published 2022-07-01
    “…Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.…”
    Get full text
    Article
  20. 400