Learn More
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before(More)
Previously, we demonstrated that ethanol potentiates glycine current (I(Gly)) in 35% of neurons freshly isolated from the ventral tegmental area (VTA) of rats (J. Pharmacol. Exp. Ther. 296 (2001) 77). In the present study, we examined the role of protein kinase C (PKC) in this action of ethanol on VTA neurons from young rats. Extracellular ethanol and(More)
A large cohort of 74,828 benzene-exposed and 35,805 nonexposed workers employed between 1972 and 1987 in 12 cities in China was followed to determine mortality from all causes. Benzene-exposed study subjects were employed in a variety of occupations including coating applications, and rubber, chemical, and shoe production. Mortality was slightly increased(More)
(2014). A new payment system for enhancing location privacy of electric vehicles. Abstract An electric vehicle (EV) is a promising and futuristic automobile propelled by electric motors, using electrical energy stored in batteries or another energy storage device. Due to the need for the battery to be recharged, the cars will be required to visit a(More)
We present a validation study of a quantitative retrospective exposure assessment method used in a follow-up study of workers exposed to benzene. Assessment of exposure to benzene was carried out in 672 factories in 12 cities in China. Historical exposure data were collected for 3179 unique job titles. The basic unit for exposure assessment was a(More)
In this paper, we describe the problem of checking the integrity of a hard disk for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the(More)
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in China. These pirated phones, referred to as " Shanzhai phones, " are often used by criminals because they are inexpensive and easy to obtain.(More)
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. However, since one or more sectors, with some probability, may become a bad sector after some time, this scheme fails to prove the integrity of all other sectors that are still good.(More)
The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad during storage, making it impossible to compute their hash values. This paper presents a k-dimension hashing scheme, which computes and stores multiple(More)