Learn More
Recently, an intrusion detection system which named CONFIDANT was proposed, which utilized file integrity analyzers and mobile agent for intrusion detection and aimed to detection of malicious activity by insiders. But CONFIDANT has vulnerabilities in security aspect, the sensor agents in the lowest echelon are easily compromised by malicious platforms.(More)
With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients’ privacy and medial data’s security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic(More)
PURPOSE To identify biochemical markers in men with idiopathic infertility and normal sperm counts. EXPERIMENTAL DESIGN We obtained proteomic profiling proteins in human spermatozoa following successful or unsuccessful pregnancy via assisted reproductive technology (ART) using 6-plex tandem mass tag (TMT) isobaric mass spectrometry. Our study design(More)
It is found that phenol can react with potassium permanganate in the acidic medium and produce chemiluminescence, which is greatly enhanced by formaldehyde. The optimum conditions for this chemiluminescent reaction are in detail studied using a flow injection system. The experiments indicate that under optimum conditions, the chemiluminescence intensity is(More)
—The vehicle-to-grid (V2G) system enables energy flow from the electric vehicles (EVs) to the grid. The distributed power of the EVs can either be sold to the grid or be used to provide frequency regulation service when V2G is implemented. A V2G control algorithm is necessary to decide whether the EV should be charged, discharged, or provide frequency(More)
As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the(More)
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public key cryptography (ID-based PKC). To satisfy requirements of different applications, many certificateless(More)
—Demand response (DR) enables customers to adjust their electricity usage to balance supply and demand. Most previous works on DR consider the supply–demand matching in an abstract way without taking into account the underlying power distribution network and the associated power flow and system operational constraints. As a result, the schemes proposed by(More)
In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al's scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption algorithm, the number of MaptoPoint hash function and the length of ciphertext from O(n) to O(1). Furthermore, we proved(More)
—Energy management in microgrids is typically formulated as a non-linear optimization problem. Solving it in a centralized manner does not only require high computational capabilities at the microgrid central controller (MGCC) but may also infringe customer privacy. Existing distributed approaches, on the other hand, assume that all generations and loads(More)