An enhanced dynamic-id-based remote user authentication protocol with smart card
|
|
- Horatio Andrews
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen Janhna Chen an Shen Abstract Wth the bloomng development of network technologes remote user dentty authentcaton s becomng more more mportant to ensure that only the legal user can consume the servces of the system Recently Sh et al presented an mproved remote user authentcaton scheme wth key agreement that attempts to resst varous attacks to acheve perfect user anonymty owever n ths paper we shall show that ther scheme s prone to smart card loss attack offlne password guessng attack mpersonaton attack server spoofng attack What s more Sh et al scheme fals to provde user anonymty as they clamed Then we put forward an enhanced protocol whch s more secure sutable for the applcaton envronment Index Terms dynamc dentty; mutual authentcaton; protocol; smart card I INTRODCTION Owng to the rapd progress n wreless network technology t s becomng more more convenent for users to enjoy desred servces from servce provder servers At the same tme t rases securty concern about a system s protected servces mght be utlzed by llegal users n a fraudulent manner As a result how to dentfy a remote user n the open network becomes a crucal ssue To solve ths problem n 98 Lamport [] proposed the frst password-based scheme by employng a one-way hash functon Due to ts smplcty that the password s easy to memorze password-based authentcaton schemes have been wdely used to valdate the remote user Snce then numerous [2-5] password-based protocols were proposed owever n these schemes the server has to store a senstve verfer table that contans the passwords of all the regstered users One securty threat of ths knd of schemes s that once ths password-verfer table s leaked all the regstered users password wll be at rsk Thus some [6-] user authentcaton schemes are desgned wth no verfer table Owng ts portablty low cost cryptographc computatonal capacty nature the smart card s wdely used n these protocols owever based on fxed dentty schemes [-] may leak the regstered users nformaton to malcous attackers further damage users prvacy To preserve users prvacy Das et al [4] proposed the frst dynamc ID-based two-factor authentcaton scheme n 2004 whch they clamed s secure aganst ID-theft can resst the reply attacks forgery attacks guessng attacks nsder attacks stolen verfer attacksnfortunately n 2009 Wang et al [5] ponted out that Das et al s scheme s completely nsecure for ts ndependence of usng passwords Moreover ther protocol suffers from mpersonaton attack fals to provde mutual authentcaton user anonymty To ncrease securty they presented an mproved verson whch was revealed by Chang et al [6] not a true dynamc-dentty based scheme n fact possesses securty holes n the password change phase because an attacker can update the password n a user s smart card at hs wll Then they proposed an untraceable remote user authentcaton scheme wth verfable password update nfortunately Kumar et al [7] found that the scheme of Chang et al s completely nsecure So Kumar et al also put up wth ther mproved scheme In 205 Sh et al [8] presented an mprovement scheme of Kumar et al s protocol they clam that ther scheme can resst varous attacks acheve user anonymty owever based on the securty analyss we fnd that ther scheme s vulnerable to smart card loss attack offlne guessng attack user mpersonaton attack server spoofng attack Besdes ther protocol cannot provde user anonymty In ths paper an enhanced dynamc-id-based remote user authentcaton scheme wth smart card s proposed We wll llustrate that wth lttle computatonal cost our protocol can not only wthst varous attacks but also acheve truly user anonymty The rest of ths paper s organzed as follows: n secton 2 we revew Sh et al s scheme brefly Then ther scheme s analyzed n detal n secton Next we proposed an enhanced dynamc-id-based remote user authentcaton scheme wth smart card n secton 4 In secton 5 we dscuss the securty of our protocol provde detals of the proof Secton 6 descrbes performance evaluaton Fnally we draw a concluson n secton 7 II REVIEW OF SI ET AL S SCEME We wll brefly revew Sh et al s protocol n ths secton It conssts of the followng four phase: regstraton phase logn phase authentcaton phase password change phase The notatons used throughout ths paper are descrbed as follows: / / S : ser/attacker/server; ID : Identty of ; PW : Password of ; CID : Dynamc dentty of ; SC : Smart card of ; r : nque rom number assgned to by S ; r : A rom number selected by the smart card; T T2 T : Current tmestamps; h() : One way hash functon; Ek () : A symmetrc key encrypton algorthm k s the secret key; : Bt-wse exclusve-or () operaton; 49 wwwjeartcom
2 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card : Connecton operaton; 2 Regstraton Phase If a user would lke to regster as a legal user of the system he would perform the followng procedures: ) The user frst chooses hs dentty ID password PW freely chooses a rom number a to computes the value R h( a PW ) transmts server va a secure channel 2) On recevng the message ID R ID R to the the server chooses a rom number r for every regstered user then computes the value of TN h( h( ID ) x) R TY r h( h( ID ) x) R TD h( ID r R ) TE r h( y x) he stores TY TD TE nto SC send t together wth the value TN to over a secure channel ) When the user receves the message form the server S he computes the value of A h( ID pw ) a TM TN a keeps the values 22 Logn Phase A TM n SC After executng the regstraton phase becomes the legal user of the system In order to communcate wth the server nputs hs dentty ID password PW nto the smart card then SC performs the followng steps: ) Frst smart card computes a A h( ID PW ) R h( a PW ) then he further calculates the value of h( h( ID ) x) TM a R r TY h( h( ID ) x) R 2) Next smart card SC TD h( ID r R ) computes checks whether the equaton TD TD holds or not f t holds then the smart card SC contnues to calculate h( y x) r TE TN TM a Otherwse SC termnates the sesson ) At last smart card SC gets the current tmestamp T computes user s dynamc dentty CID h( ID ) h( TN r ) then SC further calculates the value of TG TN h( r ) TB TN R After that SC romly choose a number b to calculate the value of Q h( h( ID ) b) then SC cam obtan the value of DS TB Q TC h( TN r Q ) TF r ( h( y x) ) After that SC transmts the logn request CID TG TC TF DS T to S 2 Authentcatone Phase In ths phase both the user the server start to take the followng steps to authentcate the legtmacy of each other further consult the common sesson key ) pon recevng the logn request S obtan the CID TG TC TF DS T from current tmestamp T2 examnes the valdty of T That s f T2 T T holds T s vald S contnues to execute the next step If not so the procedure wll be aborted 2) Next S retreves the values r TF h( y x) T TN TG h( r T ) by usng hs prvate key x then the server contnues to compute h( ID ) CID h( TN r T ) TB h( h( ID ) x) Q TB DS Next the server checks whether the equaton TC? h( TN r Q ) holds or not If not S termnates the sesson Otherwse s authentcated as a legal user by S At last S gets the current tme T to compute sends the response message mmedately V h( TB r T ) V T to ) pon recevng V T from freshness of T If T s fresh V h( TB r T ) S compares valuev f they are equal then server by Otherwse examnes the contnues to compute V wth the stored S s authentcated as a vald drops the message termnates the sesson 4) Fnally computes hs sesson key SK h( TB r T T h( y x) Q ) u S calculates SKs h TB r T T h y x Q ( ( ) ) From the dscusson above we know that TB TB Q Q Thus the server S user generate the same to encrypt or decrypt the sesson key SK SKu SKs messages transmtted between them 24 Password Change Phase Ths phase s carred out when the user wants to update hs password wthout connectng the server Then he should execute the followng steps: ) nserts hs smart card SC nto the card reader nputs hs dentty ID password PW so as to request for password changng 2) Next SC verfes the correctness of TD n the way the 50 wwwjeartcom
3 logn phase performs IfTD the password change request Only f TD proceeds on ) Fnally SC remnds the user password Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 SC rejects TD smart card TD wll SC to nput the PW computes the value of A h( ID PW ) a R h( a PW ) nd compute SC contnues to TM TM R R TD h( ID r R ) Then SC replaces the stored values A TD TM TY wtha TD TM TY III SECRITY ANALYSIS OF SI ET AL S PROTOCOL Before analyzng of Sh et al s protocol we frst pont out that smart card can no longer be deemed as fully tamper-proof devcewhen a user lost hs smart card the adversary can extract the nformaton stored n the smart card by means of analyzng the power consumpton whch has proposed by Kocher et al [9] Messerges et al [20] In ths phase we llustrate that there exsts many securty holes n Sh et al s scheme descrbe them n detals Smart Card Loss Attack Off-lne Password Guessng Attack If the smart card of the user was stolen by an adversary who s also a legal user of the system has hs own smart card SC suppose can ntercept the logn request CID TG TC TF DS T of We pont out that Sh et al s scheme s vulnerable to offlne password guessng attack owng to smart card loss the procedure s as follows: Step : extractsa TM TY TD TE from hs smart card SC computes a A h( ID PW ) R h( a PW ) r TY h( h( ID ) x) R thus can obtan the system constant value h( y x) by computng h( y x) TE r Step 2: As the attacker obtans the logn request CID TG TC TF DS T of values together wth the value h( y ) he can use these x obtaned n Step to compute r TF h( y x) T TN TG h( r T ) TN TG h( r T ) Step : When the user s smart card SC was stolen by an adversary he can extract the a messages A TM TY TD TE h( ) stored n SC Then he can obtan the value of a by usng the extracted value TM the value TN whch was computed n Step 2 ths s because a TM TN Consequently the attacker can obtan the hashed value h( ID PW ) by calculatng h( ID PW ) A a Step 4: Now launches offlne password guessng attack usng the mportant value h( ID PW ) Frst chooses the cdate dentty ID password PW from two ndependent dctonares respectvely Step 5: The attacker further computes the value of h( ID PW ) compare t wth h( ID PW ) f they are equal t ndcates that the attacker has successfully guessed the rght dentty password of Otherwse returns to Step 4 untl he fnally seek out the true dentty password of In ths way the attacker can eventually obtan the dentty password of the system s arbtrary user ence Sh et al s protocol suffers from smart card loss attack offlne password guessng attack 2 ser Impersonaton Attack When the smart card of the legal user was stolen or obtaned by the attacker he had ntercepted the logn request from the open network then he can launch offlne password guessng attack to obtan the dentty password of the user as we explaned n secton In ths case the attacker possess the followng prvate values: ID PW a mpersonate R r TM TN We show that he can n the followng manner wthout a smart card: ) The attacker acqures the current tmestamp T computes the followng values: CID h( ID ) h( TN r T ) TG TN h( r T ) TB TN R n order to compute DS TC TF he frst compute Q h( h( ID ) x) next the attacker can obtan these values by computng DS TB Q TC h( TN r Q T ) TF r h( y x) T transmts the logn request CID TG TC TF DS T to the server 2) Obvously the attacker s logn request CID TG TC TF DS T wll be accepted by the server because t s computed by usng the vald dentty ID password PW So n Sh et al s protocol the attacker 5 wwwjeartcom
4 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card can mpersonate the legal user of the system Therefore ther scheme s vulnerable to user mpersonaton attack Server Spoofng Attack As descrbed n secton secton 2 the attacker can obtan the system value h( y x ) whch s common for all users Subsequently he can get the dentty ID password PW of the user by launchng offlne password guessng attack then he computes the value of a A h( ID PW ) R h( a PW ) n order to get the value of h( h( ID ) x) TM a R Wth these values n h can masquerade the legal server smply n the followng procedures ) At frst ntercepts the logn request then computes CID TG TC TF DS T of r TF h( y x) T TN TG h( r T ) TB h( h( ID ) x) 2) After that acqures the current tme T A h( TB r T ) calculates messageatto send the response ) Snce the tmestamp T s fresh that had successfully guessed the dentty ID password PW of the response message AT wll certanly pass the authentcaton test at the user s sde In ths way the attacker can trck the user mtatng the legal server 4 ser s Identty s Traceable by Based on the dscusson n secton the attacker has the ablty to obtan the dentty password of the system s legal user f he has the smart card of the user ntercepted all messages transmtted n a logn-authentcaton sesson That s the adversary can obtan the dentty of the arbtrary user so we can see that the user s dentty s traceable So Sh et al s scheme could not protect user s prvacy as they clamed IV OR ENANCED PROTOCOL A fresh protocol s proposed n ths secton whch can resst the attacks descrbed n the prevous sectons The proposed scheme has the same four phases lke Sh et al s scheme The detals of the proposed scheme are shown below 4 Regstraton Phase Before a user logn n the remote server become the legal user of the system he should execute the followng steps as shown n Fgure 2: ) Frstly chooses hs ID PW a rom number a computes the value of R h( PW a) next transmts the message S va a secure channel ID R to 2) pon recevng the message ID R from generates a rom number r for the correspondng user contnues to compute the value of TN h( ID x) R TY r h( ID x) TD h( ID r R ) TE Ex( y ID ) r Then the server S keeps TY TD TE h( ) nto the smart card SC delvers SC TN to Fgure 2 The Regstraton Phase of The Proposed Scheme 42 Logn Phase When a regstered user would lke to logn nto the server S access the servces nserts smart card SC nto a termnal devce nputs hs dentty ID password PW then SC performs the followng steps whch are shown n Fgure : ) Frstly the smart card SC successvely computes the followng values: a A h( ID PW ) R h( a PW ) h( ID x) TM a R computes the value of r TY h( ID x) TD h( ID r R ) 2) If TD TD SC contnues to calculate the value Ex ( y ID ) TE r we wrte TF Ex( y ID ) for smplcty Otherwse SC drops the sesson ) Then SC acqures the current tmestamp T computes the user s dynamc dentty CID h( ID ) r TG TN h( r ) TB TN R After that the smart card SC generates a rom number r further computes the value of Q h( ID r) DS TB Q TC h( TN r Q ) then SC sends the S 52 wwwjeartcom
5 logn request 4 Authentcaton Phase Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 TF CID TG DS TC T to S In ths phase the user server take the followng steps to acheve mutual authentcaton further consult the common sesson key ) On recevng the logn request TF CID TG DS TC T S obtans the current tme T 2 verfes the valdty of T Only when T s fresh wll the server S contnue further Otherwse S rejects all the logn requests Subsequently S decrypts TF wth the secret key x then he can obtan the user s dentty SKs h( TB r T Q ) ( ) ( ) ( ) computes SKs h( TB r T Q ) S can compute the value of ( ) key SK SKu SKs h TB r T T Q r CID h ID T TN TG h r T TB h ID x Q DS TB so TC h TN r Q T 2) Next S checks whether the computed TC the stored TC are equal or not If not S drops the sesson Only f TC TC wll the user be authentcated the sesson proceeds further ) S acqures the current tme T to calculates V h( TB r T ) delvers the message VT to 4) pon recevng the response message VT SC checks T for freshness If T s fresh SC computes V h( TB r T ) verfes whether the equaton V V holds or not If so authentcates S as a legal server or else SC stops the procedure neglect the response message Fnally S computes hs sesson key smart card SC ence they have negotated the common sesson ( ) Fgure Logn Authentcaton Phase 44 Password Change Phase When the user wants to update hs password wthout connectng the server Then he should perform the followng steps: ) Frstly nserts hs smart card nto the card reader nputs hs dentty password to request for changng hs password 2) Next SC verfes the correctness of TD n the way the logn phase performs If TD TD SC drops the password change request But after thrce falures SC wll get blocked the user must enter the prvate unblockng key to re-actvate hs smart card Only f TD TD wll SC proceed on ) Then SC remnds to nput the password PW computes the value of ( ) h( a PW ) ( ) A h ID PW a R TM TM R R computes TD h ID r R Fnally SC stores A TD TM n place of A TD TM respectvely 5 wwwjeartcom
6 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card ser Smart card SC Inserts ID PW ID PW Inserts PW PW Compute a A h( ID PW ) R h( a PW ) h( ID x) TM a R r TY h( ID x) Check TD? h( ID r R ) For TD TD Allow to nput password Compute A h( ID PW ) a R h( a PW ) TM TM R R TD h( ID r R ) ReplaceA TD TM wtha TD TM Fgure 4 Password Change Phase V SECRITY ANALYSIS In ths secton we wll demonstrate that our enhanced protocol s secure aganst varous attacks dscussed n the prevous sectons the detals are shown n the followng content: 5 Ressts repay attack Replay attack s an offensve acton through whch an attacker may mpersonate the legal user or the server by repayng the prevous message In our protocol we assume that the attacker had ntercepted the prevous authentcaton nformaton we use tmestamp T to prevent the attacker from repayng the request message lkewse T s used to resst the attacker reusng the response message to mtate the vald serverths s because both the request response message undergo the tmestamp freshness check through the smlar freshness verfcaton process at each other s sde Therefore our protocol can wthst repay attack 52 Ressts offlne password guessng attack Off-lne password guessng attack means that the attacker can use user s smart card the nteractve nformaton between the legal user the server to successfully guess the user s password off-lne In ths scheme consder that an attacker obtans a user s smart card ether by stealng or lost by the user Then he can extract all secret values SC Among these A TM TY TD TE stored n values: A h( ID PW ) a TM h( ID x) R a TY r h( ID x) TD h( ID r R ) TE E ( y ID ) r due x to the property of one way hash functon we cannot retreve the values TD And n order to obtan ID r R out of the value h( ID x ) from TM the attacker should know the rom number a the password PW of But he cannot guess the two values a PW at the same tme And as A contans another unknown value ID could not retreve these values from A ether As a result s unable to compute the value : r TY h( ID x) In a word cannot obtan these values x r h( ID x) wthout knowng these values t s mpossble for hm to guess an arbtrary password PW verfy hs guess usng these fve values: A TM TY TD TE Next suppose that have eavesdropped the logn request TF CID TG DS TC T of we show that he stll cannot usng these values to verfy hs guess From the logn phase we can obtan the value TF Ex( y ID ) CID h( ID ) r TG TN h( r ) TB TN R Q h( ID r) successvely we can get by calculatng the value of: DS TB Q TC h( TN r Q ) Smlarly TN h( ID x) R R h( a PW ) can be obtaned from the regstraton 54 wwwjeartcom
7 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 phase So we have TG h( ID x) h( a PW ) h( r ) TB h( ID x) lkewse we have DS h( ID x) h( ID r) TC h( TN r h( ID r) T ) In each tem of TF CID TG DS TC T t contans at least two unknown values for the attacker t s not possble for hm to guess two unknown values n polynomal tme Thus the proposed protocol s secure aganst the most damagng attack: offlne password guessng attack 5 Ressts prvleged nsder attack Prvleged nsder attack happens when an nsder of the system lke the admnstrator obtans the password of the legal user by montorng the regstraton message transmtted from the user to the server through a secure channel In the proposed scheme the user use a romly selected number a submts hashed value R h( a PW ) to protect hs password nstead of sendng t n a plan text As the attacker doesn t know the rom number a the password PW t s mpossble for hm to smultaneously guess two values n polynomal tme Thus t s not hard to see that the proposed protocol s secure aganst prvleged nsder attack 54 Ressts user mpersonaton server masqueradng attack In the proposed scheme f an attacker would lke to mpersonate he should compute the logn request TF CID TG DS TC T to pass the server s verfcaton Wthout knowng the dentty ID password PW of cannot calculate the rom number a not to menton R h( ID x ) even f he has the smart card of And he cannot synchronously guess the possble dentty password of the user because he has no opton to verfy hs guessthus t s not feasble for to launch user mpersonaton attack Smlarly assume that the attacker ntercepted the logn requesttf CID TG DS TC T of In order to successfully mpersonate a legal server he should compute a vald response message rt as an answer to the logn request From the dscusson above cannot compute h( ID x ) he doesnt know the secret key x of the server so he cannot decrypt TF to get ID therefore he cannot calculate r CID h( ID ) Based on the dscusson above t s not feasble for an attacker to launch server masqueradng attack on the proposed scheme 55 Ressts smart card loss attack Suppose an attacker obtans the smart card of the user eavesdrops the nformaton transmtted between the two sdes from the open network Secton 42 shows that the attacker cannot obtan any useful nformaton such as x r h( ID x ) even f he has stolen the smart card of ntercepted all messages transmtted n a logn-authentcaton sesson ence a lost or stolen smart card s helpless for to obtan the prvate nformaton of the user Consequently the securty of the proposed protocol remans unaffected to smart card loss attack 56 Mutual authentcaton In our protocol the server ensures that the logn request s from the legal user by means of checkng whether TC s h( TN r Q T ) equal to or not after acceptng the logn request dependng upon the freshness of the tmestampt Lkewse the user authentcate the server by means of verfyng whether the equaton V V holds or not after acceptng the response request dependng on the freshness of the tmestamp T Thereforethe proposed protocol provdes secure mutual authentcaton between the legal user the vald server VI PERFORMANCE COMPARISON AND FNCTIONALITY ANALYSIS Effcency functonalty comparsons among the proposed protocol the related three protocols: Sh et at s [8] Kumar et al s [9] Chang et al s [20] are shown n ths secton Table shows the effcency comparson among the four protocols Table 2 shows the functonalty comparson among these schemes In Table each scheme conssts of fve parts: regstraton phase logn phase authentcaton phase password change phase the sum of computatonal complexty For convenence some notatons whch wll be used n the effcency comparson are gve n the followng: t : the tme complexty for one way hash functon ; t E : the tme complexty for symmetrc encrypton; t : the tme complexty for operaton ; Table Computatonal Cost Computatonal cost comparson Ours Sh et al Kumar et al Chang et al Regstraton phase 55 wwwjeartcom
8 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card 6t 5t t 6t 8t 5t 5t E Logn phase 0t 9t t t 2t 0t 8t t 4t E t t Authentcaton phase Password change phase Sum of computatonal complexty t 6t t 4t 8t t 7t 6t 0t E 7t 6t 0t 7t 6t 6t 8t 2t 26t 26t t t 5t 24t 26t 8t 27t E Table shows that the proposed agreement takes more computatons cost than those of others due to the applcaton of the symmetrcal encrypton technque But f merely hash arthmetc operaton are ntroduced n a scheme t s unable to guarantee the safety of the scheme As we can clearly see from the Table that the other three protocols whch are desgned only wth one way hash functon the operaton are prone to varous attack such as smart card loss attack offlne password guessng attack user mpersonaton attack server masqueradng attack Thanks to the adopton of symmetrcal encrypton algorthm the proposed scheme can resst the above attacks provde perfect user anonymty ence our protocol s sutable for the applcaton envronment Table 2 Securty Comparsonom Securty comparson Ours Sh et al Kumar et al Chang et al Resstng nsder attack Y Y Y N Resstng smart card loss attack Y N N N Resstng mpersonaton attack Y N N N Resstng server spoofng attack Y N N N Offlne password guessng attack Y N N N Offlne password guessng attack Y N N N Resstng repay attack Y Y Y Y Provdng mutual authentcaton Y N N N Provdng mutual authentcaton Y N N N From Table 2 t s obvous to see that our protocol has many mportant secure propertes Compared wth the other three related works our scheme s secure aganst nsder attack smart card loss attack mpersonaton attack server spoofng attack password guessng attack repay attack Furthermore the proposed scheme can provde mutual authentcaton user anonymty VII CONCLSION In ths paper we frst brefly revewed an mproved anonymous remote user authentcaton scheme based on dynamc dentty But after basc secure analyss of Sh et al s protocol we found that ther scheme s stll subject to varous attacks lack of user anonymty To overcome the weakness of Sh et al protocol we presented an enhanced dynamc-id-based remote user authentcaton scheme wth smart card Through securty analyss performance comparson we have llustrated that wth lttle ncrease n computatonal cost the proposed key agreement can resst varous attacks provde perfect user anonymty REFERENCES [] Lamport L (98) Password authentcaton wth nsecure communcaton Communcatons of the ACM [2] N aller The S/KEY one-tme password system Proceedngs of the ISOC Symposum on Network Dstrbuted System Securty 994 pp 5 57 [] Peyravan M (2000)Methods for protectng password transmsson Computers & Securty 9(5) [4] Y L Tang M S wang C C Lee A smple remote user authentcaton scheme Mathematcal Computer Modelng vol 6 Issues -2(2002) pp wwwjeartcom
9 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 [5] Ln C (200)A password authentcaton scheme wth secure password updatng Computers & Securty22() [6] C L su Securty of Chen et al Remote user authentcaton scheme usng smart cards Computer Stards Interfaces vol 26 no (2004) pp [7] W C Ku S M Chen Weaknesses mprovements of an effcent password based remote user authentcaton scheme usng smart cards IEEE Transactons on Consumer Electroncs vol 50 no (2004) pp [8] Y F Chang C C Chang Authentcaton schemes wth no verfcaton Table Appled Mathematcs Computaton vol 67 no 2 (2005) pp [9] ed Chen J & u J (20)Further mprovement of Juang et al s password-authentcated key agreement scheme usng smart cards Kuwat Journal of Scence Engneerng 8(2A) [0] Juang W Chen S & Law (2008)Robust effcent password-authentcated key agreement usng smart cardsieee Transactons on Industral Electroncs 55(6) [] Yang G et al (2008)Two-factor mutual authentcaton based on smart cards passwords Journalof Computer System Scences 74(7) [2] Xu J Zhu W & Feng D (2009) An mproved smart card based password authentcaton schemewth provable securty Computer Stards & Interfaces (4) [] Yeh K et al (200)Two robust remote user authentcaton protocols usng smart cards Journal of Systems Software 8(2) [4] M Das A Saxena V Gulat A dynamc d-based remote user authentcaton scheme IEEE Trans ConsumElectron 50 (2) (2004) [5] Y Wang J Lu F Xao J DanA more effcent secure dynamc d-based remote user authentcaton scheme Comp CommunSyst 2 (4) (2009) [6] Chang YF Ta WL Chang C ntraceable dynamc-dentty-based remote user authentcaton scheme wth verfable password updateint J CommunSyst 20 [7] S Kumar M K Khan X L An mproved remote user authentcaton scheme wth key agreement Computers Electrcal Engneerng vol 40 no 6 (204) pp [8] Y Sh Shen Y Y Z J Chen An mproved anonymous remote user authentcaton scheme wth key agreement based on dynamc dentty InternatonalJournal of Securty Its ApplcatonsVol9No5(205) pp [9] P Kocher J Jaffe B Jun Dfferental power analyss Proceedngs of advances n cryptology CRYPTO 99 (999) pp [20] T S Messerges E A Dabbsh R Sloan Examnng smart-card securty under the threat of power analyss attacks IEEE Trans Comp vol 5 no 5 (2002) pp wwwjeartcom
Two-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationNew Remote Mutual Authentication Scheme using Smart Cards
141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **
More informationA Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO
More informationarxiv: v1 [cs.cr] 20 Jun 2013
arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationAn efficient biometrics-based authentication scheme for telecare medicine information systems
Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationarxiv: v1 [cs.cr] 28 May 2013
arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang
More informationInternational Conference on Materials Engineering and Information Technology Applications (MEITA 2015)
Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng
More informationAnalysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)
Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer
More informationSecurity analysis and design of an efficient ECC-based two-factor password authentication scheme
SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA lightweight password-based authentication protocol using smart card
Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA software agent enabled biometric security algorithm for secure file access in consumer storage devices
A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software
More informationResearch Article Robust and Efficient Authentication Scheme for Session Initiation Protocol
Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationPrivacy Models for RFID Authentication Protocols
Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationCryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag
IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016
Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationConformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection
Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationA New Security Model for Cross-Realm C2C-PAKE Protocol
A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationTime-Assisted Authentication Protocol
Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationSecure Distributed Cluster Formation in Wireless Sensor Networks
Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationResource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationImproving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky
Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract
More informationA Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers
62626262621 Journal of Uncertan Systems Vol.5, No.1, pp.62-71, 211 Onlne at: www.us.org.u A Smple and Effcent Goal Programmng Model for Computng of Fuzzy Lnear Regresson Parameters wth Consderng Outlers
More informationEnsuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN
Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationCE 221 Data Structures and Algorithms
CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationProviding Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework
2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationReport on On-line Graph Coloring
2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationSetup and Use. For events not using AuctionMaestro Pro. Version /7/2013
Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationHybrid Protocol For Password-based Key Exchange in Three-party Setting
Hybrd Protocol For Password-based Key Exchange n Three-party Settng TngMao Chang, Jn Zhou, YaJuan Zhang, YueFe Zhu Abstract Modular desgn s a common approach for dealng wth complex tasks n modern cryptology.
More informationan assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han
UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16
More informationSecurity Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards
Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More information