Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
WU Kaifan, YIN Xinchun
Journal of Computer Applications    2021, 41 (6): 1621-1630.   DOI: 10.11772/j.issn.1001-9081.2020121947
Abstract234)      PDF (1437KB)(179)       Save
The Radio Frequency Identification (RFID) system is vulnerable to malicious attacks in the wireless channel and the privacy of the tag owners is often violated. In order to solve the problems, a lightweight RFID authentication protocol supporting anonymity was proposed. Firstly, the random number generator was used to generate the unpredictable sequence for specifying the lightweight operators participating in the protocol. Then, the seed was specified to achieve the key negotiation between the reader and the tag. Finally, the mutual authentication and information updating were achieved. The comparison results with some representative lightweight schemes show that the proposed scheme saves the the tag storage overhead by up to 42% compared with the similar lightweight protocols, and the has the communication overhead also maintained at the low level of similar schemes at the same time, and is able to support the multiple security requirements. The proposed scheme is suitable for low-cost RFID systems.
Reference | Related Articles | Metrics
Influence optimization model based on community structure
GUO Jinshi TANG Hongbo WU Kai YANG Sen
Journal of Computer Applications    2013, 33 (09): 2436-2439.   DOI: 10.11772/j.issn.1001-9081.2013.09.2436
Abstract687)      PDF (782KB)(648)       Save
The relatively large time cost of the existing influence algorithms does not fit the social networks of which the scale keeps expanding. An influence optimization model was proposed based on the network community structure for solving problem of large time cost. Firstly evaluate nodes influence in each community and dig core members, and then find a small subset of nodes in the set composed of the core nodes and linking community nodes to get the maximization diffusion with minimization cost. The experimental results demonstrate that our model achieves the subset with more abroad influence diffusion and reduces running time compared with traditional methods. Its influence coverage is up to 90%.
Related Articles | Metrics
Influence maximization algorithm for micro-blog network
WU Kai JI Xinsheng GUO Jinshi LIU Caixia
Journal of Computer Applications    2013, 33 (08): 2091-2094.   DOI: 10.11772/j.issn.1001-9081.2013.08.2091
Abstract1044)      PDF (648KB)(1535)       Save
Influence maximization problem in micro-blog cannot be solved by simple user rank algorithm. To solve this problem, a greedy algorithm based on Extended Linear Threshold Model (ELTM) was proposed to solve Top-K problem in microblog. A concept of influence rate and a WIR (Weibo Influence Rank) algorithm were established to determine the user's influence by summarizing the key factors. Then, based on WIR values, an influence propagation model was proposed. After using greedy algorithm, the Top-K nodes were excavated. A simulation test based on Sina micro-blog was performed to validate the effectiveness of the proposed method. The result shows that the method outperforms the traditional algorithm.
Reference | Related Articles | Metrics
New method of correcting barrel distortion on lattice model
WU Kai-xing DUAN Ma-li
Journal of Computer Applications    2012, 32 (04): 1113-1115.   DOI: 10.3724/SP.J.1087.2012.01113
Abstract1723)      PDF (454KB)(616)       Save
In order to correct the barrel distortion of wide-angle lens, a new method for distortion correction for barrel distortion was proposed. Adopting the lattice model calibration method, according to the location relation of dots between distortion image and ideal figure, the offset surfaces in X-and Y-axis direction about distorted pixels were got. Then, the cubic B-spline interpolation function was adopted to interpolate the surface. Thus, the offsets of each pixel were obtained in the distorted image. Furthermore, the pixels shift was rectified to achieve an undistorted image by coordinate conversion. And then the bilinear interpolation was used to reconstruct the gray level of pixels. The simulation results show that the proposed method can make a good correction of the coordinate position and gray value.
Reference | Related Articles | Metrics