An enhanced dynamic-id-based remote user authentication protocol with smart card

Size: px
Start display at page:

Download "An enhanced dynamic-id-based remote user authentication protocol with smart card"

Transcription

1 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen Janhna Chen an Shen Abstract Wth the bloomng development of network technologes remote user dentty authentcaton s becomng more more mportant to ensure that only the legal user can consume the servces of the system Recently Sh et al presented an mproved remote user authentcaton scheme wth key agreement that attempts to resst varous attacks to acheve perfect user anonymty owever n ths paper we shall show that ther scheme s prone to smart card loss attack offlne password guessng attack mpersonaton attack server spoofng attack What s more Sh et al scheme fals to provde user anonymty as they clamed Then we put forward an enhanced protocol whch s more secure sutable for the applcaton envronment Index Terms dynamc dentty; mutual authentcaton; protocol; smart card I INTRODCTION Owng to the rapd progress n wreless network technology t s becomng more more convenent for users to enjoy desred servces from servce provder servers At the same tme t rases securty concern about a system s protected servces mght be utlzed by llegal users n a fraudulent manner As a result how to dentfy a remote user n the open network becomes a crucal ssue To solve ths problem n 98 Lamport [] proposed the frst password-based scheme by employng a one-way hash functon Due to ts smplcty that the password s easy to memorze password-based authentcaton schemes have been wdely used to valdate the remote user Snce then numerous [2-5] password-based protocols were proposed owever n these schemes the server has to store a senstve verfer table that contans the passwords of all the regstered users One securty threat of ths knd of schemes s that once ths password-verfer table s leaked all the regstered users password wll be at rsk Thus some [6-] user authentcaton schemes are desgned wth no verfer table Owng ts portablty low cost cryptographc computatonal capacty nature the smart card s wdely used n these protocols owever based on fxed dentty schemes [-] may leak the regstered users nformaton to malcous attackers further damage users prvacy To preserve users prvacy Das et al [4] proposed the frst dynamc ID-based two-factor authentcaton scheme n 2004 whch they clamed s secure aganst ID-theft can resst the reply attacks forgery attacks guessng attacks nsder attacks stolen verfer attacksnfortunately n 2009 Wang et al [5] ponted out that Das et al s scheme s completely nsecure for ts ndependence of usng passwords Moreover ther protocol suffers from mpersonaton attack fals to provde mutual authentcaton user anonymty To ncrease securty they presented an mproved verson whch was revealed by Chang et al [6] not a true dynamc-dentty based scheme n fact possesses securty holes n the password change phase because an attacker can update the password n a user s smart card at hs wll Then they proposed an untraceable remote user authentcaton scheme wth verfable password update nfortunately Kumar et al [7] found that the scheme of Chang et al s completely nsecure So Kumar et al also put up wth ther mproved scheme In 205 Sh et al [8] presented an mprovement scheme of Kumar et al s protocol they clam that ther scheme can resst varous attacks acheve user anonymty owever based on the securty analyss we fnd that ther scheme s vulnerable to smart card loss attack offlne guessng attack user mpersonaton attack server spoofng attack Besdes ther protocol cannot provde user anonymty In ths paper an enhanced dynamc-id-based remote user authentcaton scheme wth smart card s proposed We wll llustrate that wth lttle computatonal cost our protocol can not only wthst varous attacks but also acheve truly user anonymty The rest of ths paper s organzed as follows: n secton 2 we revew Sh et al s scheme brefly Then ther scheme s analyzed n detal n secton Next we proposed an enhanced dynamc-id-based remote user authentcaton scheme wth smart card n secton 4 In secton 5 we dscuss the securty of our protocol provde detals of the proof Secton 6 descrbes performance evaluaton Fnally we draw a concluson n secton 7 II REVIEW OF SI ET AL S SCEME We wll brefly revew Sh et al s protocol n ths secton It conssts of the followng four phase: regstraton phase logn phase authentcaton phase password change phase The notatons used throughout ths paper are descrbed as follows: / / S : ser/attacker/server; ID : Identty of ; PW : Password of ; CID : Dynamc dentty of ; SC : Smart card of ; r : nque rom number assgned to by S ; r : A rom number selected by the smart card; T T2 T : Current tmestamps; h() : One way hash functon; Ek () : A symmetrc key encrypton algorthm k s the secret key; : Bt-wse exclusve-or () operaton; 49 wwwjeartcom

2 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card : Connecton operaton; 2 Regstraton Phase If a user would lke to regster as a legal user of the system he would perform the followng procedures: ) The user frst chooses hs dentty ID password PW freely chooses a rom number a to computes the value R h( a PW ) transmts server va a secure channel 2) On recevng the message ID R ID R to the the server chooses a rom number r for every regstered user then computes the value of TN h( h( ID ) x) R TY r h( h( ID ) x) R TD h( ID r R ) TE r h( y x) he stores TY TD TE nto SC send t together wth the value TN to over a secure channel ) When the user receves the message form the server S he computes the value of A h( ID pw ) a TM TN a keeps the values 22 Logn Phase A TM n SC After executng the regstraton phase becomes the legal user of the system In order to communcate wth the server nputs hs dentty ID password PW nto the smart card then SC performs the followng steps: ) Frst smart card computes a A h( ID PW ) R h( a PW ) then he further calculates the value of h( h( ID ) x) TM a R r TY h( h( ID ) x) R 2) Next smart card SC TD h( ID r R ) computes checks whether the equaton TD TD holds or not f t holds then the smart card SC contnues to calculate h( y x) r TE TN TM a Otherwse SC termnates the sesson ) At last smart card SC gets the current tmestamp T computes user s dynamc dentty CID h( ID ) h( TN r ) then SC further calculates the value of TG TN h( r ) TB TN R After that SC romly choose a number b to calculate the value of Q h( h( ID ) b) then SC cam obtan the value of DS TB Q TC h( TN r Q ) TF r ( h( y x) ) After that SC transmts the logn request CID TG TC TF DS T to S 2 Authentcatone Phase In ths phase both the user the server start to take the followng steps to authentcate the legtmacy of each other further consult the common sesson key ) pon recevng the logn request S obtan the CID TG TC TF DS T from current tmestamp T2 examnes the valdty of T That s f T2 T T holds T s vald S contnues to execute the next step If not so the procedure wll be aborted 2) Next S retreves the values r TF h( y x) T TN TG h( r T ) by usng hs prvate key x then the server contnues to compute h( ID ) CID h( TN r T ) TB h( h( ID ) x) Q TB DS Next the server checks whether the equaton TC? h( TN r Q ) holds or not If not S termnates the sesson Otherwse s authentcated as a legal user by S At last S gets the current tme T to compute sends the response message mmedately V h( TB r T ) V T to ) pon recevng V T from freshness of T If T s fresh V h( TB r T ) S compares valuev f they are equal then server by Otherwse examnes the contnues to compute V wth the stored S s authentcated as a vald drops the message termnates the sesson 4) Fnally computes hs sesson key SK h( TB r T T h( y x) Q ) u S calculates SKs h TB r T T h y x Q ( ( ) ) From the dscusson above we know that TB TB Q Q Thus the server S user generate the same to encrypt or decrypt the sesson key SK SKu SKs messages transmtted between them 24 Password Change Phase Ths phase s carred out when the user wants to update hs password wthout connectng the server Then he should execute the followng steps: ) nserts hs smart card SC nto the card reader nputs hs dentty ID password PW so as to request for password changng 2) Next SC verfes the correctness of TD n the way the 50 wwwjeartcom

3 logn phase performs IfTD the password change request Only f TD proceeds on ) Fnally SC remnds the user password Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 SC rejects TD smart card TD wll SC to nput the PW computes the value of A h( ID PW ) a R h( a PW ) nd compute SC contnues to TM TM R R TD h( ID r R ) Then SC replaces the stored values A TD TM TY wtha TD TM TY III SECRITY ANALYSIS OF SI ET AL S PROTOCOL Before analyzng of Sh et al s protocol we frst pont out that smart card can no longer be deemed as fully tamper-proof devcewhen a user lost hs smart card the adversary can extract the nformaton stored n the smart card by means of analyzng the power consumpton whch has proposed by Kocher et al [9] Messerges et al [20] In ths phase we llustrate that there exsts many securty holes n Sh et al s scheme descrbe them n detals Smart Card Loss Attack Off-lne Password Guessng Attack If the smart card of the user was stolen by an adversary who s also a legal user of the system has hs own smart card SC suppose can ntercept the logn request CID TG TC TF DS T of We pont out that Sh et al s scheme s vulnerable to offlne password guessng attack owng to smart card loss the procedure s as follows: Step : extractsa TM TY TD TE from hs smart card SC computes a A h( ID PW ) R h( a PW ) r TY h( h( ID ) x) R thus can obtan the system constant value h( y x) by computng h( y x) TE r Step 2: As the attacker obtans the logn request CID TG TC TF DS T of values together wth the value h( y ) he can use these x obtaned n Step to compute r TF h( y x) T TN TG h( r T ) TN TG h( r T ) Step : When the user s smart card SC was stolen by an adversary he can extract the a messages A TM TY TD TE h( ) stored n SC Then he can obtan the value of a by usng the extracted value TM the value TN whch was computed n Step 2 ths s because a TM TN Consequently the attacker can obtan the hashed value h( ID PW ) by calculatng h( ID PW ) A a Step 4: Now launches offlne password guessng attack usng the mportant value h( ID PW ) Frst chooses the cdate dentty ID password PW from two ndependent dctonares respectvely Step 5: The attacker further computes the value of h( ID PW ) compare t wth h( ID PW ) f they are equal t ndcates that the attacker has successfully guessed the rght dentty password of Otherwse returns to Step 4 untl he fnally seek out the true dentty password of In ths way the attacker can eventually obtan the dentty password of the system s arbtrary user ence Sh et al s protocol suffers from smart card loss attack offlne password guessng attack 2 ser Impersonaton Attack When the smart card of the legal user was stolen or obtaned by the attacker he had ntercepted the logn request from the open network then he can launch offlne password guessng attack to obtan the dentty password of the user as we explaned n secton In ths case the attacker possess the followng prvate values: ID PW a mpersonate R r TM TN We show that he can n the followng manner wthout a smart card: ) The attacker acqures the current tmestamp T computes the followng values: CID h( ID ) h( TN r T ) TG TN h( r T ) TB TN R n order to compute DS TC TF he frst compute Q h( h( ID ) x) next the attacker can obtan these values by computng DS TB Q TC h( TN r Q T ) TF r h( y x) T transmts the logn request CID TG TC TF DS T to the server 2) Obvously the attacker s logn request CID TG TC TF DS T wll be accepted by the server because t s computed by usng the vald dentty ID password PW So n Sh et al s protocol the attacker 5 wwwjeartcom

4 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card can mpersonate the legal user of the system Therefore ther scheme s vulnerable to user mpersonaton attack Server Spoofng Attack As descrbed n secton secton 2 the attacker can obtan the system value h( y x ) whch s common for all users Subsequently he can get the dentty ID password PW of the user by launchng offlne password guessng attack then he computes the value of a A h( ID PW ) R h( a PW ) n order to get the value of h( h( ID ) x) TM a R Wth these values n h can masquerade the legal server smply n the followng procedures ) At frst ntercepts the logn request then computes CID TG TC TF DS T of r TF h( y x) T TN TG h( r T ) TB h( h( ID ) x) 2) After that acqures the current tme T A h( TB r T ) calculates messageatto send the response ) Snce the tmestamp T s fresh that had successfully guessed the dentty ID password PW of the response message AT wll certanly pass the authentcaton test at the user s sde In ths way the attacker can trck the user mtatng the legal server 4 ser s Identty s Traceable by Based on the dscusson n secton the attacker has the ablty to obtan the dentty password of the system s legal user f he has the smart card of the user ntercepted all messages transmtted n a logn-authentcaton sesson That s the adversary can obtan the dentty of the arbtrary user so we can see that the user s dentty s traceable So Sh et al s scheme could not protect user s prvacy as they clamed IV OR ENANCED PROTOCOL A fresh protocol s proposed n ths secton whch can resst the attacks descrbed n the prevous sectons The proposed scheme has the same four phases lke Sh et al s scheme The detals of the proposed scheme are shown below 4 Regstraton Phase Before a user logn n the remote server become the legal user of the system he should execute the followng steps as shown n Fgure 2: ) Frstly chooses hs ID PW a rom number a computes the value of R h( PW a) next transmts the message S va a secure channel ID R to 2) pon recevng the message ID R from generates a rom number r for the correspondng user contnues to compute the value of TN h( ID x) R TY r h( ID x) TD h( ID r R ) TE Ex( y ID ) r Then the server S keeps TY TD TE h( ) nto the smart card SC delvers SC TN to Fgure 2 The Regstraton Phase of The Proposed Scheme 42 Logn Phase When a regstered user would lke to logn nto the server S access the servces nserts smart card SC nto a termnal devce nputs hs dentty ID password PW then SC performs the followng steps whch are shown n Fgure : ) Frstly the smart card SC successvely computes the followng values: a A h( ID PW ) R h( a PW ) h( ID x) TM a R computes the value of r TY h( ID x) TD h( ID r R ) 2) If TD TD SC contnues to calculate the value Ex ( y ID ) TE r we wrte TF Ex( y ID ) for smplcty Otherwse SC drops the sesson ) Then SC acqures the current tmestamp T computes the user s dynamc dentty CID h( ID ) r TG TN h( r ) TB TN R After that the smart card SC generates a rom number r further computes the value of Q h( ID r) DS TB Q TC h( TN r Q ) then SC sends the S 52 wwwjeartcom

5 logn request 4 Authentcaton Phase Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 TF CID TG DS TC T to S In ths phase the user server take the followng steps to acheve mutual authentcaton further consult the common sesson key ) On recevng the logn request TF CID TG DS TC T S obtans the current tme T 2 verfes the valdty of T Only when T s fresh wll the server S contnue further Otherwse S rejects all the logn requests Subsequently S decrypts TF wth the secret key x then he can obtan the user s dentty SKs h( TB r T Q ) ( ) ( ) ( ) computes SKs h( TB r T Q ) S can compute the value of ( ) key SK SKu SKs h TB r T T Q r CID h ID T TN TG h r T TB h ID x Q DS TB so TC h TN r Q T 2) Next S checks whether the computed TC the stored TC are equal or not If not S drops the sesson Only f TC TC wll the user be authentcated the sesson proceeds further ) S acqures the current tme T to calculates V h( TB r T ) delvers the message VT to 4) pon recevng the response message VT SC checks T for freshness If T s fresh SC computes V h( TB r T ) verfes whether the equaton V V holds or not If so authentcates S as a legal server or else SC stops the procedure neglect the response message Fnally S computes hs sesson key smart card SC ence they have negotated the common sesson ( ) Fgure Logn Authentcaton Phase 44 Password Change Phase When the user wants to update hs password wthout connectng the server Then he should perform the followng steps: ) Frstly nserts hs smart card nto the card reader nputs hs dentty password to request for changng hs password 2) Next SC verfes the correctness of TD n the way the logn phase performs If TD TD SC drops the password change request But after thrce falures SC wll get blocked the user must enter the prvate unblockng key to re-actvate hs smart card Only f TD TD wll SC proceed on ) Then SC remnds to nput the password PW computes the value of ( ) h( a PW ) ( ) A h ID PW a R TM TM R R computes TD h ID r R Fnally SC stores A TD TM n place of A TD TM respectvely 5 wwwjeartcom

6 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card ser Smart card SC Inserts ID PW ID PW Inserts PW PW Compute a A h( ID PW ) R h( a PW ) h( ID x) TM a R r TY h( ID x) Check TD? h( ID r R ) For TD TD Allow to nput password Compute A h( ID PW ) a R h( a PW ) TM TM R R TD h( ID r R ) ReplaceA TD TM wtha TD TM Fgure 4 Password Change Phase V SECRITY ANALYSIS In ths secton we wll demonstrate that our enhanced protocol s secure aganst varous attacks dscussed n the prevous sectons the detals are shown n the followng content: 5 Ressts repay attack Replay attack s an offensve acton through whch an attacker may mpersonate the legal user or the server by repayng the prevous message In our protocol we assume that the attacker had ntercepted the prevous authentcaton nformaton we use tmestamp T to prevent the attacker from repayng the request message lkewse T s used to resst the attacker reusng the response message to mtate the vald serverths s because both the request response message undergo the tmestamp freshness check through the smlar freshness verfcaton process at each other s sde Therefore our protocol can wthst repay attack 52 Ressts offlne password guessng attack Off-lne password guessng attack means that the attacker can use user s smart card the nteractve nformaton between the legal user the server to successfully guess the user s password off-lne In ths scheme consder that an attacker obtans a user s smart card ether by stealng or lost by the user Then he can extract all secret values SC Among these A TM TY TD TE stored n values: A h( ID PW ) a TM h( ID x) R a TY r h( ID x) TD h( ID r R ) TE E ( y ID ) r due x to the property of one way hash functon we cannot retreve the values TD And n order to obtan ID r R out of the value h( ID x ) from TM the attacker should know the rom number a the password PW of But he cannot guess the two values a PW at the same tme And as A contans another unknown value ID could not retreve these values from A ether As a result s unable to compute the value : r TY h( ID x) In a word cannot obtan these values x r h( ID x) wthout knowng these values t s mpossble for hm to guess an arbtrary password PW verfy hs guess usng these fve values: A TM TY TD TE Next suppose that have eavesdropped the logn request TF CID TG DS TC T of we show that he stll cannot usng these values to verfy hs guess From the logn phase we can obtan the value TF Ex( y ID ) CID h( ID ) r TG TN h( r ) TB TN R Q h( ID r) successvely we can get by calculatng the value of: DS TB Q TC h( TN r Q ) Smlarly TN h( ID x) R R h( a PW ) can be obtaned from the regstraton 54 wwwjeartcom

7 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 phase So we have TG h( ID x) h( a PW ) h( r ) TB h( ID x) lkewse we have DS h( ID x) h( ID r) TC h( TN r h( ID r) T ) In each tem of TF CID TG DS TC T t contans at least two unknown values for the attacker t s not possble for hm to guess two unknown values n polynomal tme Thus the proposed protocol s secure aganst the most damagng attack: offlne password guessng attack 5 Ressts prvleged nsder attack Prvleged nsder attack happens when an nsder of the system lke the admnstrator obtans the password of the legal user by montorng the regstraton message transmtted from the user to the server through a secure channel In the proposed scheme the user use a romly selected number a submts hashed value R h( a PW ) to protect hs password nstead of sendng t n a plan text As the attacker doesn t know the rom number a the password PW t s mpossble for hm to smultaneously guess two values n polynomal tme Thus t s not hard to see that the proposed protocol s secure aganst prvleged nsder attack 54 Ressts user mpersonaton server masqueradng attack In the proposed scheme f an attacker would lke to mpersonate he should compute the logn request TF CID TG DS TC T to pass the server s verfcaton Wthout knowng the dentty ID password PW of cannot calculate the rom number a not to menton R h( ID x ) even f he has the smart card of And he cannot synchronously guess the possble dentty password of the user because he has no opton to verfy hs guessthus t s not feasble for to launch user mpersonaton attack Smlarly assume that the attacker ntercepted the logn requesttf CID TG DS TC T of In order to successfully mpersonate a legal server he should compute a vald response message rt as an answer to the logn request From the dscusson above cannot compute h( ID x ) he doesnt know the secret key x of the server so he cannot decrypt TF to get ID therefore he cannot calculate r CID h( ID ) Based on the dscusson above t s not feasble for an attacker to launch server masqueradng attack on the proposed scheme 55 Ressts smart card loss attack Suppose an attacker obtans the smart card of the user eavesdrops the nformaton transmtted between the two sdes from the open network Secton 42 shows that the attacker cannot obtan any useful nformaton such as x r h( ID x ) even f he has stolen the smart card of ntercepted all messages transmtted n a logn-authentcaton sesson ence a lost or stolen smart card s helpless for to obtan the prvate nformaton of the user Consequently the securty of the proposed protocol remans unaffected to smart card loss attack 56 Mutual authentcaton In our protocol the server ensures that the logn request s from the legal user by means of checkng whether TC s h( TN r Q T ) equal to or not after acceptng the logn request dependng upon the freshness of the tmestampt Lkewse the user authentcate the server by means of verfyng whether the equaton V V holds or not after acceptng the response request dependng on the freshness of the tmestamp T Thereforethe proposed protocol provdes secure mutual authentcaton between the legal user the vald server VI PERFORMANCE COMPARISON AND FNCTIONALITY ANALYSIS Effcency functonalty comparsons among the proposed protocol the related three protocols: Sh et at s [8] Kumar et al s [9] Chang et al s [20] are shown n ths secton Table shows the effcency comparson among the four protocols Table 2 shows the functonalty comparson among these schemes In Table each scheme conssts of fve parts: regstraton phase logn phase authentcaton phase password change phase the sum of computatonal complexty For convenence some notatons whch wll be used n the effcency comparson are gve n the followng: t : the tme complexty for one way hash functon ; t E : the tme complexty for symmetrc encrypton; t : the tme complexty for operaton ; Table Computatonal Cost Computatonal cost comparson Ours Sh et al Kumar et al Chang et al Regstraton phase 55 wwwjeartcom

8 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card 6t 5t t 6t 8t 5t 5t E Logn phase 0t 9t t t 2t 0t 8t t 4t E t t Authentcaton phase Password change phase Sum of computatonal complexty t 6t t 4t 8t t 7t 6t 0t E 7t 6t 0t 7t 6t 6t 8t 2t 26t 26t t t 5t 24t 26t 8t 27t E Table shows that the proposed agreement takes more computatons cost than those of others due to the applcaton of the symmetrcal encrypton technque But f merely hash arthmetc operaton are ntroduced n a scheme t s unable to guarantee the safety of the scheme As we can clearly see from the Table that the other three protocols whch are desgned only wth one way hash functon the operaton are prone to varous attack such as smart card loss attack offlne password guessng attack user mpersonaton attack server masqueradng attack Thanks to the adopton of symmetrcal encrypton algorthm the proposed scheme can resst the above attacks provde perfect user anonymty ence our protocol s sutable for the applcaton envronment Table 2 Securty Comparsonom Securty comparson Ours Sh et al Kumar et al Chang et al Resstng nsder attack Y Y Y N Resstng smart card loss attack Y N N N Resstng mpersonaton attack Y N N N Resstng server spoofng attack Y N N N Offlne password guessng attack Y N N N Offlne password guessng attack Y N N N Resstng repay attack Y Y Y Y Provdng mutual authentcaton Y N N N Provdng mutual authentcaton Y N N N From Table 2 t s obvous to see that our protocol has many mportant secure propertes Compared wth the other three related works our scheme s secure aganst nsder attack smart card loss attack mpersonaton attack server spoofng attack password guessng attack repay attack Furthermore the proposed scheme can provde mutual authentcaton user anonymty VII CONCLSION In ths paper we frst brefly revewed an mproved anonymous remote user authentcaton scheme based on dynamc dentty But after basc secure analyss of Sh et al s protocol we found that ther scheme s stll subject to varous attacks lack of user anonymty To overcome the weakness of Sh et al protocol we presented an enhanced dynamc-id-based remote user authentcaton scheme wth smart card Through securty analyss performance comparson we have llustrated that wth lttle ncrease n computatonal cost the proposed key agreement can resst varous attacks provde perfect user anonymty REFERENCES [] Lamport L (98) Password authentcaton wth nsecure communcaton Communcatons of the ACM [2] N aller The S/KEY one-tme password system Proceedngs of the ISOC Symposum on Network Dstrbuted System Securty 994 pp 5 57 [] Peyravan M (2000)Methods for protectng password transmsson Computers & Securty 9(5) [4] Y L Tang M S wang C C Lee A smple remote user authentcaton scheme Mathematcal Computer Modelng vol 6 Issues -2(2002) pp wwwjeartcom

9 Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: Volume-2 Issue-4 Aprl 206 [5] Ln C (200)A password authentcaton scheme wth secure password updatng Computers & Securty22() [6] C L su Securty of Chen et al Remote user authentcaton scheme usng smart cards Computer Stards Interfaces vol 26 no (2004) pp [7] W C Ku S M Chen Weaknesses mprovements of an effcent password based remote user authentcaton scheme usng smart cards IEEE Transactons on Consumer Electroncs vol 50 no (2004) pp [8] Y F Chang C C Chang Authentcaton schemes wth no verfcaton Table Appled Mathematcs Computaton vol 67 no 2 (2005) pp [9] ed Chen J & u J (20)Further mprovement of Juang et al s password-authentcated key agreement scheme usng smart cards Kuwat Journal of Scence Engneerng 8(2A) [0] Juang W Chen S & Law (2008)Robust effcent password-authentcated key agreement usng smart cardsieee Transactons on Industral Electroncs 55(6) [] Yang G et al (2008)Two-factor mutual authentcaton based on smart cards passwords Journalof Computer System Scences 74(7) [2] Xu J Zhu W & Feng D (2009) An mproved smart card based password authentcaton schemewth provable securty Computer Stards & Interfaces (4) [] Yeh K et al (200)Two robust remote user authentcaton protocols usng smart cards Journal of Systems Software 8(2) [4] M Das A Saxena V Gulat A dynamc d-based remote user authentcaton scheme IEEE Trans ConsumElectron 50 (2) (2004) [5] Y Wang J Lu F Xao J DanA more effcent secure dynamc d-based remote user authentcaton scheme Comp CommunSyst 2 (4) (2009) [6] Chang YF Ta WL Chang C ntraceable dynamc-dentty-based remote user authentcaton scheme wth verfable password updateint J CommunSyst 20 [7] S Kumar M K Khan X L An mproved remote user authentcaton scheme wth key agreement Computers Electrcal Engneerng vol 40 no 6 (204) pp [8] Y Sh Shen Y Y Z J Chen An mproved anonymous remote user authentcaton scheme wth key agreement based on dynamc dentty InternatonalJournal of Securty Its ApplcatonsVol9No5(205) pp [9] P Kocher J Jaffe B Jun Dfferental power analyss Proceedngs of advances n cryptology CRYPTO 99 (999) pp [20] T S Messerges E A Dabbsh R Sloan Examnng smart-card securty under the threat of power analyss attacks IEEE Trans Comp vol 5 no 5 (2002) pp wwwjeartcom

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

An efficient biometrics-based authentication scheme for telecare medicine information systems

An efficient biometrics-based authentication scheme for telecare medicine information systems Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A lightweight password-based authentication protocol using smart card

A lightweight password-based authentication protocol using smart card Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

A New Security Model for Cross-Realm C2C-PAKE Protocol

A New Security Model for Cross-Realm C2C-PAKE Protocol A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Time-Assisted Authentication Protocol

Time-Assisted Authentication Protocol Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers 62626262621 Journal of Uncertan Systems Vol.5, No.1, pp.62-71, 211 Onlne at: www.us.org.u A Smple and Effcent Goal Programmng Model for Computng of Fuzzy Lnear Regresson Parameters wth Consderng Outlers

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Hybrid Protocol For Password-based Key Exchange in Three-party Setting

Hybrid Protocol For Password-based Key Exchange in Three-party Setting Hybrd Protocol For Password-based Key Exchange n Three-party Settng TngMao Chang, Jn Zhou, YaJuan Zhang, YueFe Zhu Abstract Modular desgn s a common approach for dealng wth complex tasks n modern cryptology.

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information