68 research outputs found

    RFID Product Authentication in EPCglobal Network

    Get PDF

    Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems

    Get PDF
    Singapore A*Star SER

    Efficient Energy Conversion through Vortex Arrays in the Turbulent Magnetosheath

    Get PDF
    Turbulence is often enhanced when transmitted through a collisionless plasma shock. We investigate how the enhanced turbulent energy in the Earth's magnetosheath effectively dissipates via vortex arrays. This research topic is of great importance as it relates to particle energization at astrophysical shocks across the universe. Wave modes and intermittent coherent structures are the key candidate mechanisms for energy conversion in turbulent plasmas. Here, by comparing in-situ measurements in the Earth's magnetosheath with a theoretical model, we find the existence of vortex arrays at the transition between the downstream regions of the Earth's bow shock. Vortex arrays consist of quasi-orthogonal kinetic waves and exhibit both high volumetric filling factors and strong local energy conversion, thereby showing a greater dissipative energization than traditional waves and coherent structures. Therefore, we propose that vortex arrays are a promising mechanism for efficient energy conversion in the sheath regions downstream of astrophysical shocks

    Time cost evaluation for executing RFID authentication protocols

    Get PDF
    Singapore A*STAR SER

    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

    Get PDF
    Abstract. The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels. However, by fixing the packets in transmission, any packet manipulation will cause authentication failure. In p2p content delivery network where a proxy-in-the-middle is able to store, forward, transcode and transform the stream, previous schemes are simply unapplicable. To address the problem, we propose a flexible verification scheme that relies on special stream formats (i.e. Unequal Loss Protection ULP scheme [7]). We apply the so called Unequal Loss Verification ULV scheme into MPEG-4 framework. The encoding, packing, amortizing and verifying methods are elaborated in this paper. Our analysis shows that the scheme is secure and cost effective. The scheme is indeed content aware and ensures the verification rate intuitively reflecting a meaningful stream. Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.
    • …
    corecore