Learn More
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before(More)
Previously, we demonstrated that ethanol potentiates glycine current (I(Gly)) in 35% of neurons freshly isolated from the ventral tegmental area (VTA) of rats (J. Pharmacol. Exp. Ther. 296 (2001) 77). In the present study, we examined the role of protein kinase C (PKC) in this action of ethanol on VTA neurons from young rats. Extracellular ethanol and(More)
(2014). A new payment system for enhancing location privacy of electric vehicles. Abstract An electric vehicle (EV) is a promising and futuristic automobile propelled by electric motors, using electrical energy stored in batteries or another energy storage device. Due to the need for the battery to be recharged, the cars will be required to visit a(More)
In this paper, we describe the problem of checking the integrity of a hard disk for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the(More)
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in China. These pirated phones, referred to as " Shanzhai phones, " are often used by criminals because they are inexpensive and easy to obtain.(More)
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. However, since one or more sectors, with some probability, may become a bad sector after some time, this scheme fails to prove the integrity of all other sectors that are still good.(More)
The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad during storage, making it impossible to compute their hash values. This paper presents a k-dimension hashing scheme, which computes and stores multiple(More)
Confidentiality is often one of the primary requirements for electronic documents. Often, encryption is used for achieving these confidential documents. From the perspective of an electronic document system, key management for long-term encrypted documents could become problematic, especially for big organizations. There are a number of non-trivial issues(More)
To enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as legal professional privilege (TPP) documents, can be excluded as evidence for prosecution. In physical world, protection of TPP information is well addressed and proper procedure for handling TPP articles has been(More)