Related-Mode Attacks on CTR Encryption Mode

Size: px
Start display at page:

Download "Related-Mode Attacks on CTR Encryption Mode"

Transcription

1 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences Bejng , Chna. (Emal: {wdy, ddln, (Receved Dec. 9, 2005; revsed and accepted Jan. 3, 2006) Abstract In ths paper, we dscuss usng CTR mode, another standard encrypton mode, to attack other standard encrypton modes and usng other standard encrypton modes to attack CTR mode under the related-mode attack model. In partcular, we pont out that when the adversary has access to an oracle under one proper mode, then almost all other related-cpher modes, whether they are encrypton modes or authentcaton modes or authentcated encrypton modes, can be attacked wth ease under the relatedmode attack model. Keywords: Block cpher, modes of operaton, relatedcpher attack, related-mode attack 1 Introducton Block cphers are often proposed wth several varants, n terms of a dfferent secret key sze and correspondng number of rounds. Wu [9] presented the related-cpher attack model applcable to related cphers n the sense that they are exactly dentcal to each other, dfferng only n the key sze and most often also n the total number of rounds. In [7], the authors generalze the concept of the related-cpher attack model to apply to a larger class of related model, n partcular cpher encryptons wth dfferent block cpher modes of operaton, but wth the underlyng block cpher beng dentcal. They called t related mode attack and further show that when the adversary has access to an oracle for any one mode of operaton of ECB, CBC, OFB, CFB, then almost all other related cpher modes can be easly attacked. But they ddn t study another standard encrypton mode CTR. In ths paper, we wll dscuss how to use CTR mode to attack other modes and how to use other modes to attack CTR mode under the related-mode attack model. In Secton 2, we brefly descrbe the standard block cpher modes of operaton. In Secton 3 and 4, we dscuss how to use CTR mode to attack other modes and how to use other modes to attack CTR mode under the relatedmode attack model. We conclude n Secton 5. 1 Fgure 1: ECB mode encrypton 2 Standard Block Cpher Encrypton Modes When encryptng a plantext P, whch s longer than the block sze, n of the underlyng block cpher, ths plantext s dvded nto m number of n-bt blocks, and each one s encrypted at a tme usng a block cpher mode of operaton that ncludes the Electronc Code Book (ECB), the Cpher Block Channg (CBC), the Cpher FeedBack (CFB), the Output FeedBack (OFB) [4, 5] and Counter Mode (CTR) [1]. The ECB mode s the smplest, where each plantext block s ndependently encrypted to a correspondng cphertext block va the underlyng block cpher keyed by secret key K: = ( ). Fgure 1 llustrates the ECB mode encrypton on two consecutve plantext blocks 1 and. Meanwhle, the CBC mode uses the prevous cphertext block as the feedback component that s exclusve- ORed (XORed) to the current plantext block, before the resultng XOR s encrypted to obtan the current cphertext block. In partcular: = ( ) where C 0 = ntalzaton vector (IV ). Fgure 2 llustrates the CBC mode encrypton on two consecutve plantext blocks 1 and.

2 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May P 1 1 Fgure 2: CBC mode encrypton Fgure 4: OFB mode encrypton 1 ctr + ( 1) 1 ctr + Fgure 3: CFB mode encrypton Fgure 5: CTR mode encrypton The CFB mode also uses the prevous cphertext block as feedback, whch s frst encrypted and then XORed to the current plantext block to obtan the current cphertext block : = ( ) where C 0 = ntalsaton vector (IV). The CFB mode can also be vewed as a stream cpher mode by treatng X = ( ) as a keystream that s XORed to the plantext to obtan the cphertext. Fgure 3 shows the CFB mode. The OFB mode s smlar to the CFB n that a keystream s also generated to be XORed to the current plantext block to obtan the current cphertext block. The dfference s that the keystream s not a functon of the prevous cphertext block, but s the prevously encrypted feedback component X : X = (X 1 ) = (X ) where X 0 = ntalsaton vector (IV ). Note that the keystream s ndependent of prevous plantext and cphertext blocks. Fgure 4 llustrates the OFB mode. The CTR mode s smlar to the CFB n that a keystream s also generated to be XORed to the current plantext block to obtan the current cphertext block. The dfference s that the keystream s a functon of a counter, ctr, whch can also be looked on as an ntalsaton vector. Fgure 5 llustrates the CTR mode. = (ctr + ). There are two varants of the mode, one random and the other stateful. No matter whch varant s used, the ntalsaton vector, ctr, s ncluded n the cphertext as the frst block C 0 n order to enable decrypton. The counter s not allowed to wrap around. Thus the decrypton algorthm frst chops off the frst n bts C 0 and uses t as ctr, and then dvdes the rest of the strng nto n-bt blocks and decrypt cphertext usng the same method of encrypton. 3 Usng other Standard Modes to Attack CTR Throughout ths paper, we consder the case where the adversary has access to an oracle that s able to perform ether encrypton or decrypton for some fxed mode. Ths s smlar to havng access to known or chosen plantext/ cphertext queres under that mode. We show that ths oracle allows the adversary to attack other related-cpher modes, where the underlyng block cpher s the same. and respectvely denote the current plantext and cphertext block used n the nteracton wth the oracle beng exploted, whle and respectvely denote the current plantext and cphertext blocks of the related-cpher mode beng attacked. For the mode beng attacked, only the correspondng cphertext blocks, ( = 0, 1,, m) are known, where C 0 = IV s the ntalzaton vector. It s the adversary s objectve to drectly recover these unknown plantext blocks, ( = 0, 1,, m),.e. we assume a cphertext-only scenaro for the mode beng attacked. For the mode beng exploted, access to ts oracle

3 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May P 1 P C 0 + ( 1) C C 1 C Fgure 6: Explotng ECB to attack CTR P 1 P C 0 + ( 1) C C 1 C Fgure 7: Explotng CBC to attack CTR allows the adversary to obtan known or chosen plantext/cphertext queres, and as necessary known or chosen IV queres - though we assume for more concrete and nterestng results that he can only access ether a mode encrypton or mode decrypton oracle, and not both at the same tme. Havng sad ths, note that a standard mode of operaton s expected to be secure aganst attacks where both encrypton and decrypton oracles are possble [2]. 3.1 Explotng an ECB Oracle Consder that the adversary has access to ether an encrypton or decrypton oracle under ECB mode. We wll show how ths oracle can be exploted to obtan the unknown plantext blocks encrypted under the CTR mode. In our current case, the adversary has access to the ECB encrypton oracle, and s explotng t to attack another related cpher n the CTR mode. In partcular, gven that he desres to know the unknown plantext block correspondng to an ntercepted cphertext block of the CTR mode, he chooses = C 0 + to feed to the ECB encrypton oracle and hence obtans the correspondng cphertext. Snce = (C 0 + ), we can get =. Ths s llustrated n Fgure 6, where the exploted oracle and the mode beng attacked are on the left and rght, respectvely, and where the rectangular boxes delmt the parts naccessble to the adversary. In summary, we requre just one chosen plantext(cp) query encrypted under ECB to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.2 Explotng a CBC Oracle When the adversary has access to a CBC oracle, he can smlarly use ths to attack CTR mode. Attackng ths requres a CBC encrypton oracle. Frst the adversary queres the encrypton oracle and get the cphertext of plantext 1, then he chooses = (C 0 + ) and queres the oracle to obtan the correspondng cphertext. Snce = ( 1 ) = (C 0 + ) s drectly related to an ntermedate state n CTR, namely that =. Therefore, we can computer =. Ths s llustrated n Fgure 7. In summary, we requre two chosen plantext(cp) queres encrypted under CBC to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.3 Explotng a CFB Oracle The adversary accesses a CFB decrypton oracle and chooses = C 0 +, and hence ( ) = (C 0 + ) = X can be drectly related to a smlar ntermedate state wthn CTR, namely X =. He then computes = X. See Fgure 8. Repeatng ths attack wll allow hm to other plantext blocks of the CTR. In summary, we requre just one chosen cphertext (CC) query encrypted under CFB to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.4 Explotng an OFB Oracle In ths secton, We wll dscuss how to explot OFB oracle to attack the CTR mode.

4 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May C 0 + ( 1) C 0 + P 1 C 1 X C P X P 1 P Fgure 8: Explotng CFB to attack CTR IV = C 0 + C 0 + ( 1) C 0 + X P 1 P 2 C 1 C 2 X P 1 P Fgure 9: Explotng OFB to attack CTR Ths s so far the hardest attack to mount, and requres a chosen-iv (CIV ) scenaro [8]. In partcular, the adversary chooses IV = C 0 +, and hence (IV ) = (C 0 +) = X. Ths ntermedate state relates between the two modes, OFB and CTR, namely X = P 1 C 1, and so he can compute = X = P 1 C 1. Ths s shown n Fgure 9. Note that n ths case the plantext and cphertext blocks of the exploted oracle do not need to be chosen but are merely known. 4 Explotng a CTR Oracle K In ths case, the adversary has access to a CTR oracle, and uses ths to attack other related-cpher modes. The CTR, CFB and OFB modes are sometmes called stream-cpher modes snce despte startng wth an underlyng block cpher,, usng t n these modes essentally results n a stream cpher. A stream-cpher mode uses the underlyng n both ts mode encrypton and decrypton, n contrast to other non-stream-cpher modes such as the ECB and CBC that use for mode encrypton and correspondngly E 1 for mode decrypton. Because of ths, t appears that stream-cpher mode oracles can only be used to construct encrypton oracles for other non-stream-cpher modes. Ths means that t wll not be possble to explot a stream-cpher mode oracle (such as CTR CFB and OFB) to attack non-stream-cpher modes (such as ECB and CBC). Instead, we consder only how stream-cpher modes can be exploted to attack other stream-cpher modes. Attackng CFB: The adversary accesses CTR decrypton oracle and chooses C 0 = 1, snce C 1 = (C 0 + 1) P 1 = ( ) P 1, and hence ( ) = C 1 P 1 = X can be drectly related to a smlar ntermedate state wthn CFB, namely X = P 1 C 1 =. He then computes = X. See Fgure 10. Repeatng ths attack wll allow hm to obtan other plantext blocks of the CFB. Attackng OFB: The adversary accesses a CTR decrypton oracle and chooses C 0 = IV 1, snce C 1 = (C 0 +1) P 1 = (IV ) P 1, and hence (IV ) = X can be drectly related to a smlar ntermedate state wthn OFB, namely X = P 1 C 1 = P 1 C 1. He then computes P 1 = X C 1. Ths s llustrated n Fgure 11. Repeatng ths attack wll allow hm to teratvely obtan the next plantext blocks of the OFB. 5 Conclusons In ths paper we dscuss how access to chosen plantexts/cphertexts n other standard encrypton modes allows related-cpher CTR mode to be attacked and how access to chosen cphertexts n the CTR mode allows almost all other related-cpher standard encrypton modes to be attacked. In Table 1, we lst our attacks and the correspondng text complextes, whle computatonal complexty s neglgble. The fve modes dscussed above are all standard encrypton modes. There are a lot of standard authentcaton modes and authentcated encrypton modes usng

5 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May C C X C 1 C 2 P 1 P 2 X P 1 P Fgure 10: Explotng CTR to attack CFB C C X C 1 C 2 P 1 P 2 IV X P 1 P 2 C 1 C 2 Fgure 11: Explotng CTR to attack OFB Table 1: Related-mode attacks on standard encrypton modes Oracle Exploted Cpher Mode Text Complexty Attacked ECB CTR 1 CP CBC CTR 2 CP CFB CTR 1 CC OFB CTR 1 CP, 1 CIV CTR CFB 1 CC OFB 1 CC block cphers, such as authentcaton mode CMAC [6], authentcated encrypton mode GCM [3]. We further study the securty of those modes of operaton under relatedmode attack model and fnd they all are nsecure f the adversary can access to an oracle under one proper mode. So when we have the same cpher beng used as the underlyng component n dfferent block cpher modes of operaton, we should avod usng the same key n those modes n practcal applcatons. Acknowledge Ths research s supported by the Natonal Natural Scence Foundaton of Chna under Grant No and No ; the Natonal Basc Research 973 Program of Chna under Grant No.2004CB References [1] proposedmodes/ctr/ [2] A. Joux, Cryptanalyss of the EMD mode of operton, Advances n Cryptology-Eurocrypt 03, LNCS 2656, pp. 1-16, Sprnger-Verlag, [3] D. McGrew and J. Vega, The Galos/Counter Mode of Operaton (GCM), Submsson to NIST Modes of Operaton Process, 2004, Avalable at proposedmodes/ [4] Natonal Insttute of Standards and Technology (NIST), Federal Informaton Processng Standards Publcaton 81 (FIPS PUB 81): DES Modes of Operaton, Dec [5] Natonal Insttute of Standards and Technology (NIST), NIST Specal Publcaton A, Recommendaton for Block Cpher Modes of Operaton: Methods and Technques, Dec [6] Natonal Insttute of Standards and Technology (NIST), NIST Specal Publcaton B, Recommendaton for Block Cpher Modes of Operaton: The CMAC Mode for Authentcaton, May [7] R. C. W. Phan and M. U. Sddq, Related-mode attacks on block cpher modes of operaton, ICCSA 2005, LNCS 3482, pp , Sprnger-Verlag, [8] D. Wagner, Cryptanalyss of some recentlyproposed multple modes of operaton, FSE 98, LNCS 1372, pp , Sprnger-Verlag, [9] H. Wu, Related-Cpher attacks, ICICS 02, LNCS 2513, pp , Sprnger-Verlag, 2002.

6 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May Dayn Wang s now a Ph.D canddate at the State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences. Hs research nterests nclude Message Authentcaton codes and mode of operaton. E-mal address: wdy@s.scas.ac.cn. Dongda Ln s now a full tme research professor and deputy drector of State Key Labortory of Informaton Securty, Insttute of Software of the Chnese Academy of Scences. He receved hs B.S. degree n mathematcs from Shandong Unversty n 1984, and the M.S. degree and Ph. D degree n codng theory and cryptology at Insttute of Systems Scence of the Chnese Academy of Scences n 1987 and 1990 respectvely. Hs current research nterests nclude cryptology, nformaton securty, grd computng, mathematcs mechanzaton and symbolc computatons. Wenlng Wu s now a professor at the State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences. She receved her B.S. degree and M.S. degree nmaths from Northwest Unversty n 1987 and 1990, respectvely. She receved her Ph.D degree n Cryptography from Xdan Unversty n From 1998 to 1999 she was a postdoctoral fellow n the Insttute of Software, Chnese Academy of Scence. Her current research nterests nclude theory of cryptography, mode of operaton, block cpher, stream cpher and hash functon.

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Practical Attack on KeeLoq

A Practical Attack on KeeLoq Introducton Our Attacks Practce Conclusons A Practcal Attack on KeeLoq Sebastaan Indesteege 1 Nathan Keller 2 Orr Dunkelman 1 El Bham 3 Bart Preneel 1 1 Dept. ESAT/SCD-COSIC, K.U.Leuven, Belgum. 2 Ensten

More information

Miss in the Middle Attacks on IDEA and Khufu

Miss in the Middle Attacks on IDEA and Khufu Mss n the Mddle Attacks on IDEA and Khufu El Bham Alex Bryukov Ad Shamr Abstract. In a recent paper we developed a new cryptanalytc technque based on mpossble dfferentals, and used t to attack the Skpjack

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A Star-based Independent Biclique Attack on Full Rounds SQUARE

A Star-based Independent Biclique Attack on Full Rounds SQUARE A Star-based Independent Bclque Attack on Full Rounds SQUARE Zheng Yuan,, Zhen Peng,, Mng Mao,. Beng Electronc Scence &Technology Insttute, Beng 00070,Chna. Xdan Unversty, X an, Chna yuanzheng@best.edu.cn,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Genetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE)

Genetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE) Genetc Key Guded Neural Deep Learnng based Encrypton for Onlne Wreless Communcaton (GKNDLE) Arndam Sarkar Department of Computer Scence & Electroncs, Ramakrshna Msson Vdyamandra, Belur Math-711202, West

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

A Comparative Analysis of Encryption Algorithms for Better Utilization

A Comparative Analysis of Encryption Algorithms for Better Utilization A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Paper style and format for the Sixth International Symposium on Turbulence, Heat and Mass Transfer

Paper style and format for the Sixth International Symposium on Turbulence, Heat and Mass Transfer K. Hanjalć, Y. Nagano and S. Jakrlć (Edtors) 2009 Begell House, Inc. Paper style and format for the Sxth Internatonal Symposum on Turbulence, Heat and Mass Transfer K. Hanjalć 1, Y. Nagano 2 and S. Jakrlć

More information

Biclique Cryptanalysis Of PRESENT, LED, And KLEIN

Biclique Cryptanalysis Of PRESENT, LED, And KLEIN Bclque Cryptanalyss Of PREENT, LED, And KLEIN Reson 2013-05-20 Farzaneh Abed, Chrstan Forler, Ek Lst, tefan Lucks, Jakob Wenzel Bauhaus-Unerstät Wemar, Germany {frstname.lastname}@un-wemar.de Abstract.

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information