-
Article
A High Consistency Wireless Key Generation Scheme for Vehicular Communication Based on Wiener Filter Extrapolation
Secret key generation from wireless channel is an emerging technology for communication network security, which exploits the reciprocity and time variability of wireless channels to generate symmetrical keys b...
-
Chapter and Conference Paper
Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis
In the 5G network, the access method of IoT terminals is mainly wireless access. Aiming at the high authentication cost in massive access scenarios, this paper proposes a secondary authentication method based ...
-
Article
Open AccessGenerative adversarial network-based rogue device identification using differential constellation trace figure
With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent...
-
Chapter and Conference Paper
A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme
Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...
-
Chapter and Conference Paper
Neural Control Based Research of Endogenous Security Model
With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...
-
Chapter and Conference Paper
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection
Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...
-
Chapter
The Early Rise of Social Security in China: Ideas and Reforms, 1911–1949
Applying the editor’s “onion skin model” of social policy ideas, this chapter analyses the early rise of social security ideas and policies in Republican China (1911–1949). Facing imperialism, Chinese elites t...
-
Chapter and Conference Paper
LoRa Devices Identification Based on Differential Constellation Trace Figure
With the development of the Internet of Things, the application of LoRa devices is more and more extensive. However, the security access issues of LoRa terminals has not been paid enough attention yet. In this...
-
Article
Open AccessPhysical layer identification of LoRa devices using constellation trace figure
LoRa wireless technology is a revolutionary wireless network access technology with a wide application prospect. An identification method for Lora devices based on physical layer fingerprinting is proposed to ...
-
Article
A lightweight physical-layer based security strategy for Internet of things
Recently, most physical-layer based security strategies for Internet of thing tackle the two fundamental issues—authentication and communication key generation. However, the cost of such schemes is often high ...
-
Article
Importance-based entropy measures of complex networks’ robustness to attacks
Intentional attacks usually cause greater damage than random failures to complex networks, so it is important to study the networks’ resilience to attacks. Although various entropy measures have been available...
-
Article
Protective immunity elicited by measles vaccine exerts anti-tumor effects on measles virus hemagglutinin gene-modified cancer cells in a mouse model
Measles vaccine is widely used in China to prevent the measles virus (MV) infection. People immunized with measles vaccine can obtain long-term protective immunity. Measles virus surface glycoprotein hemagglut...
-
Article
Throughput and BER of wireless powered DF relaying in Nakagami-m fading
Energy harvesting provides a promising solution to the extra energy requirement at the relay due to relaying. In this paper, the throughput and bit error rate of a decode-and-forward relaying system are studie...
-
Article
Trusted mobile model based on DTE technology
Due to increasing demands for mobile security, the Trusted Computing Group organized a special group—Mobile Phone Working Group (MPWG) to deal with mobile security specification business. Though MPWG proposes ...
-
Chapter and Conference Paper
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme
Hardware Trojan has emerged as a major security concern for integrated circuits. This paper presents a novel design obfuscation scheme against hardware Trojan attacks based on chaos finite state machine (FSM) ...
-
Article
A novel artificial noise aided security scheme to resist blind source separation attacks
In this paper, we discuss the physical layer security from a new angle of view and propose a novel approach to resist some attacks in signal processing perspective. The scenario considered in this paper is tha...
-
Article
A novel point mutation in exon 20 of EGFR showed sensitivity to erlotinib
Mutations of epidermal growth factor receptor (EGFR) gene are good predictors of response to treatment with EGFR tyrosine kinase inhibitors (TKIs) for non-small cell lung cancer (NSCLC). It is well establishe...
-
Article
Two-Stage Channel Estimation Algorithm for TD-SCDMA System Employing Multi-Cell Joint Detection
The conventional Steiner channel estimator is inefficient for TD-SCDMA systems employing multi-cell joint detection because of its low estimation accuracy. A novel two-stage channel estimation algorithm was p...
-
Article
Multi-block chaining-based authentication mode
A fast authentication mode based on Multi-Block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of...
-
Article
A novel link adaptation scheme to enhance performance of IEEE 802.11g wireless LAN
A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can over...