Two-Factor User Authentication in Multi-Server Networks
|
|
- Gwen Reynolds
- 6 years ago
- Views:
Transcription
1 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan nversty of Technology 59 Zhongzheng Road, Tanan Cty 700, TAIWAN (R.O.C.) th0040@mal.tut.edu.tw Department of Computer cence and Engneerng, Natonal un Yat-sen nversty 70 Lenha Road, Kaohsung Cty 8044, TAIWAN (R.O.C.) * Correspondng author: cyweng@mal.cse.nsysu.edu.tw Abstract Recently, Chang and Cheng proposed a robust mechansm for smart card based remote logns n a mult-server archtecture. However, based on the securty analyzes conducted by us, we fnd ther mechansm s vulnerable aganst smart card lost problems, leak-of-verfer attack and sesson key dsclosure attack. To elmnate all dentfed securty threats n ther mechansm, we further proposed an mproved verson of two-factor based user authentcaton protocol n mult-server networks. Keywords: Informaton securty; Key agreement; Mult-server archtecture; Password; mart card. Introducton In order to frustrate llegal users attempts of gettng the servceable resources mantaned n remote servers, two-factor (password and smart card) user authentcaton s the wdely accepted and most adopted method n clent-server archtecture [5, 6, 7, 8]. However, n tradtonal remote logn mechansms for a mult-server archtecture [], [9], a user needs to regster wth dfferent servce provders and remember the varous denttes and passwords for ensurng hgher securty. Therefore, sngle regstraton s the most mportant feature n a mult-server archtecture and any user can take desred servces from varous network servers wthout repeatng regstraton to each servce provder. Password authentcaton wth smart card s one of the mechansms that were wdely used to authentcate the valdty of partcpants between a logn user, the servce provders and a trusted regstraton center. In 00, L, Ln and Hwang proposed an authentcaton scheme [4] usng neural networks and asymmetrc key cryptosystems. In 004, Juang proposed an effcent and smart card based mult-server authentcaton scheme [3] for enhancng the system performance. In 008, Tsa proposed a mult-server authentcaton scheme [] based on one-way hash functon wthout verfcaton table. In 0, Chang and Cheng developed a more robust and effcent smart card based remote logn mechansm [] n whch only lghtweght one-way hash functon and exclusve OR operaton are requred durng mult-server authentcaton processes. nfortunately, based on the securty analyses conducted by us, Chang-Chengs logn mechansm s stll vulnerable aganst the smart card lost problems, leak-of-verfer attack and sesson key dsclosure attack. In ths paper, we wll demonstrate a seres of steps to show how the above-mentoned attacks can be nvoked on ther mechansm n the presence of a malcous adversary. 6
2 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0. Revew of Chang-Cheng s Mechansm Chang-Chengs mechansm conssts of one trusted regstraton center (RC), servce provders (P j ) and logn users ( ). RC s responsble for regstraton of P j and. When P j regster wth RC use dentfer ID j, RC computes a secret key KR j = H(ID j k) and shares t wth P j, where s the strng concatenaton symbol, k s the prvate key of RC and H(.) s a prvate one-way hash functon only known by RC... Regstraton Phase When a user wants to get the servce granted n ths system, must perform regstraton wth RC. Frst, chooses hs/her dentfer d and password pw and sends the regstraton message {d, pw, Personal Informaton} to RC through a secure channel. Then, RC checks s personal nformaton and credt. If above does not hold, RC rejects s regstraton; otherwse, RC computes a transformed dentfer TID = T d as s account number and saves t n the database, where T s the regstraton tme. The mechansm concatenates T wth d can prevent the duplcaton of account numbers and can freely select hs/her own d and pw. In addton, RC computes TPW = h(pw ) and = H(TID k) pw, stores (TID, h(.), TPW ) nto s smart card and ssues ths smart card to, where s the exclusve-or symbol and h(.) s a publc one-way hash functon... Logn Phase In ths phase, we assume that wants to log n the server P j and asks a servce from P j. * nserts hs/her smart card to a nput devce and enters password pw. Then the smart card performs the flowng steps: * * tep : The smart card computes h( pw ) and checks whether h( pw ) = TPW. If t does not hold, the smart card stops the logn procedure; otherwse, t goes to tep. tep : The smart card computes = h( pw * N ID j ) and sends the logn message {TID, N } to P j, where N s a nonce chosen by s smart card. tep 3: pon recevng the logn message from, P j computes = h(kr j N ) and sends {TID, N, ID j, N } to RC, where N s a nonce chosen by P j..3. Authentcaton and Key Agreement Phase pon recevng the message from P j, RC, P j and perform the followng steps to acheve mutual authentcaton and construct a common sesson key shared between and P j. tep : RC checks the freshness of N and N and the valdty of s account number TID. If they does not hold, RC rejects ths logn; otherwse, t goes to tep. tep : RC checks whether h(h(tid k) N ID j ) = and h(h(id j k) N ) =. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that and P j are legal partcpants and goes to tep 3. tep 3: RC chooses a random number ran and computes =h(h(id j k) N R ), h(h(tid k) N R ) =h(h(id j k)) (ran h(h(tid k))) and (h(h(id j k)) ran), where N R s a nonce chosen by RC. Fnally RC sends { } to P j. = =h(h(tid k)), N R,, 6
3 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 tep 4: pon recevng the message from RC, P j checks the freshness of N R. If t s nvald, P j termnates the connecton; otherwse, t goes to tep 5. tep 5: P j checks whether h(kb j N R ) =. If t holds, t goes to tep 6; otherwse, P j stops the procedure. tep 6: P j computes s = h(kr j ) and K = h((h(kr j ) s) N N N R ) and sends {, N R } to, where K s the common sesson key shared between P j and. tep 7: pon recevng the response message from P j, the smart card checks the freshness of N R and verfes whether h( pw N R ) =. If they are nvald, then authentcaton fals; * otherwse, convnces that P j s a legal partcpant and computes u = h( pw * ) and the common sesson key K = h((u h( pw * )) N N N R ). 3. Attacks on Chang-Cheng s Mechansm Although Chang and Cheng clamed that ther mechansm can resst many types of attacks and satsfy all the essental requrements for mult-server archtecture authentcaton. However, the actual stuaton s not the case and the cryptanalyss of Chang-Chengs mechansm has been made n ths secton. The detaled cryptanalyss s presented as follows. 3.. mart Card Lost Problems In ths attack, we assume that s smart card s stolen by an adversary a and the secret nformaton (TID, h(.), TPW ) whch s stored n the smart card can be extracted by montorng ts power consumpton [0]. Off-lne password guessng attack: As we know, the content of the smart card s (TID = T d ; h(.); TPW =h(pw ); = H(TID k) pw ). Wth ths nformaton, a can select a guessable password pw and compute h( pw ). If h( pw ) s equal to TPW, t ndcates the correct guess of s low-entropy password and Chang-Chengs mechansm cannot wthstand off-lne password guessng attack. Impersonaton attack: Once the adversary a got the secret nformaton (TID, h(.), TPW, ) and correctly derved s password pw, he/se can make a vald logn request wth ease. For example, a computes = h( pw N A ID j ) and makes a vald logn message to mpersonate by sendng {TID, N A } to the servce provder P j, where N A s a nonce chosen by a. 3.. Leak-of-Verfer Attack In Chang-Chengs mechansm, we found that ther mechansm may suffer from leak-ofverfer attack and any legtmate user who possesses the smart card can easly derve servce provder P j s secret h(h(id j k)) by performng the followng steps: tep : In tep 7 of authentcaton and key agreement phase, receves the response message {, N R } from P j. tep : Then, computes u = h( pw * )= h(h(id j k)) ran and removes ran from h(h(id j k)) ran. Fnally, derves P j s secret h(h(id j k)). 63
4 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, esson Key Dsclosure Attack In case of P j s secret h(h(id j k)) s successfully derved by a, a can use t to derve the prevous and subsequent sesson keys whch are constructed by other users and P j. We assume that some vctm user s logn message {TID, N A }, P j s authentcaton message {TID, N, ID j, N } and RCs response message {, N R } are collected by a. Then, the sesson key dsclosure attack can be launched by performng the followng steps: tep : a eavesdrops above-mentoned messages and obtans three nonces N, N, and N R from, P j, and RC, respectvely. tep : a uses P j s secret h(h(id j k)) to derve s by computng s = h(h(id j k)) = ran h(h(tid k)). tep 3: a derves the sesson keys of past and future sessons by computng K = h((h(h(id j k)) s) N N N R ). 4. The Proposed Protocol Accordng to our cryptanalyss, we proposed a more secure remote logn protocol to remove the securty weaknesses exstng n Chang-Chengs mechansm. 4.. Regstraton Phase When a user wants to get the servce granted n ths system, must perform regstraton wth RC as follows. tep : chooses hs/her dentfer d and password pw and generates a random number b. Then, computes h((d pw ) b) and sends the regstraton message {d, h((d pw ) b), Personal Informaton} to RC through a secure channel. tep : pon recevng the regstraton message from, RC checks s personal nformaton and credt. If above does not hold, RC rejects s regstraton; otherwse, t goes to tep 3. tep 3: RC computes a transformed dentfer TID = T d as s account number and saves t n the database, where T s the regstraton tme of. tep 4: RC computes = H(TID k) h((d pw ) b) and stores (, h(tid ), h(.), T ) nto s smart card and ssues ths smart card to. tep 5: pon recevng the smart card, stores the random number b nto the smart card and does not need to remember b after fnshng the phase. 4.. Logn Phase In case of wants to log n the server P j and asks a servce from P j, nserts hs/her smart card to a nput devce and enters dentfer d, password pw, and ID j. Then the smart card performs the flowng steps: tep : The smart card retreves T and b to compute TID = T d and h((d pw ) b), respectvely. Then, the smart card checks whether h( TID ) =h(tid ). If t does not hold, the smart card termnates ths logn; otherwse, the smart card generates a nonce N and sends the logn message {TID } to P j, where = h((d pw ) b) N and = h((tid ID j ) N ). 64
5 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 tep : pon recevng the logn message from, P j computes = KR j N and sends {TID, ID j } to RC, where N s a nonce chosen by P j and = h((id j TID ) N ) Authentcaton and Key Agreement Phase pon recevng the message from P j, RC, P j and perform the followng steps to acheve mutual authentcaton and construct a common sesson key shared between and P j. tep : RC checks the valdty of s account number TID and P j s dentfer ID j. If they does not hold, RC rejects ths logn; otherwse, t goes to tep. tep : RC computes N = H(TID k) and checks the freshness of N and the valdty of h((tid ID j ) N )=. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that s a legal user and goes to tep 3. tep 3: RC computes N = H(ID j k) and checks the freshness of N and the valdty of h((id j TID ) N ) =. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that P j s a legal servce provder and goes to tep 4. tep 4: RC computes = h( N ) N N R = h(h(tid k) K) = h( N ) N N R and = h(h(id j k) K), where N R s a nonce chosen by RC and K s a common sesson key whch s constructed by computng K = h( N N N R ). Fnally RC sends {, } to P j. tep 5: pon recevng the message from RC, P j computes " = h(n )and K = h( " N ) and checks whether h(h(id j k) K ) =. If t s nvald, P j termnates the connecton; otherwse, P j convnces that RC and are legal partcpants and sends { } to. Note that K = K s the common sesson key shared between P j, and RC. tep 6: pon recevng the response message from P j, the smart card computes " = h(n ) and K = h( " N ) and checks whether h(h(tid k) K )=. If t s nvald, termnates the connecton; otherwse, convnces that RC and P j are legal partcpants and K = K = K s the common sesson key shared between, P j and RC. 5. ecurty Analyss Here we manly dscussed and analyzed the securty of the proposed protocol on varous known cryptographc attacks and demonstrated ts strength n terms of securty. Off-lne password guessng attack: In case of s smart card s stolen by an adversary a and he/she has the ablty to obtan the contents of the smart card (, h(tid ), h(.), T, b). It does not help a to derve or modfy s password wthout knowng s dentty d and password pw. In addton, from the proposed protocol, we can see that the logn messages {TID } and {TID, ID j } only contan nformaton about H(TID k), H(ID j k), N and N. They do not nclude any nformaton about the password. Therefore, ths desgn of the proposed protocol can protect the system aganst off-lne password guessng attack. 65
6 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Impersonaton attack: The proposed protocol must protect the system aganst mpersonaton attacks on both the user, servce provder and the regstraton center sde. Frst, on the user and servce provder sde, t s dffcult for a to create correct and wthout the users secret token H(TID k) and the servce provders secret token H(ID j k). Moreover, t s dffcult for a to get the regstraton centers secret key k. On the regstraton center sde, a cannot derve the random nonces N and N wthout H(TID k) and H(ID j k), whch means a cannot compute the correct hash values h(n ) and h(n ) n order to mpersonate the regstraton center. Leak-of-verfer attack: In our proposed protocol, a regstered user may try to obtan the secret token H(TID k) from hs/her smart card by extractng and b and computng H(TID k) = h((d pw ) b). However, t does not help to obtan P j s secret token H(ID j k) and nonce N from the logn parameters and due to the protecton of oneway hash functon and the securty of large nonce (e.g., bgger than 56 bts). On the other hand, the random nonce N R s known to only regstraton center RC and t s masked by =h(n ) N N R and = h(n ) N N R. Therefore, and P j cannot derve N R from and wthout knowng P j s N and s N, respectvely. esson key dsclosure attack: After the successful user authentcaton, the user, the servce provder and the regstraton center computes the common sesson key K= h(n N N R ) and an adversary a may try to derve K to damage the later communcatons between them. However, n tep 4 of authentcaton and key agreement phase, a cannot obtans N N R and N N R wthout knowng h(n ) and h(n ), respectvely. As a result, a cannot get success n the proposed protocol by sesson key dsclosure attack. 6. Conclusons In ths paper, we showed that Chang and Chengs two-factor based mult-server authentcaton protocol s nsecure. To offset these securty weaknesses found n Chang- Chengs protocol, we have proposed an mproved verson of two-factor based mult-server authentcaton protocol. ecurty analyss shows that our proposed protocol s reslent to varous attacks and acheves mutual authentcaton and sesson key agreement. References [] C. C. Chang and T. F. Cheng, A robust and effcent smart card based remote logn mechansm for multserver archtecture, Internatonal Journal of Innovatve Computng, Informaton and Control, 7(8), (0), pp [] H. C. Hsang and W. K. hh, Improvement of the secure dynamc ID based remote user authentcaton scheme for mult-server envronment, Computer tandards & Interfaces, 3(6), (009), pp [3] W. Juang, Effcent mult-server password authentcated key agreement usng smart cards, IEEE Transactons on Consumer Electroncs, 50(), (004), pp [4] L. H. L, I. C. Ln and M.. Hwang, A remote password authentcaton scheme for mult-server archtecture usng neural networks, IEEE Transactons on Neural Network, (6), (00), pp [5] C. T. L and C. C. Lee, A robust remote user authentcaton scheme usng smart card, Informaton Technology and Control, 40(3), (0), pp [6] C. T. L and C. C. Lee, A novel user authentcaton and prvacy preservng scheme wth smart cards for wreless communcatons, Mathematcal and Computer Modellng, 55(-), (0), pp [7] C. T. L and M.. Hwang, A lghtweght anonymous routng protocol wthout publc key en/decryptons for wreless ad hoc networks, Informaton cences, 8(3), (0), pp
7 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 [8] C. T. L, C. C. Yang and M.. Hwang, A secure routng protocol wth node selfshness resstance n MANETs, Internatonal Journal of Moble Communcatons, 0(), (0), pp [9] X. L, Y. Xong, J. Ma and W. Wang, An effcent and securty dynamc dentty based authentcaton protocol for mult-server archtecture usng smart cards, Journal of Network and Computer Applcatons, 35(), (0), pp [0] T.. Messerges, E. A. Dabbsh and R.H. loan, Examnng smart-card securty under the threat of power analyss attacks, IEEE Transactons on Computers, 5(5), (00), pp [] J. L. Tsa, Effcent mult-server authentcaton scheme based on one-way hash functon wthout verfcaton table, Computers & ecurty, 7(3-4), (008), pp
8 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 68
Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More informationNew Remote Mutual Authentication Scheme using Smart Cards
141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **
More informationAn enhanced dynamic-id-based remote user authentication protocol with smart card
Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationarxiv: v1 [cs.cr] 20 Jun 2013
arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty
More informationarxiv: v1 [cs.cr] 28 May 2013
arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationAn efficient biometrics-based authentication scheme for telecare medicine information systems
Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan
More informationAnalysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)
Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationA software agent enabled biometric security algorithm for secure file access in consumer storage devices
A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software
More informationA lightweight password-based authentication protocol using smart card
Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa
More informationSecurity analysis and design of an efficient ECC-based two-factor password authentication scheme
SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent
More informationInternational Conference on Materials Engineering and Information Technology Applications (MEITA 2015)
Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng
More informationResearch Article Robust and Efficient Authentication Scheme for Session Initiation Protocol
Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016
Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv
More informationCryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag
IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and
More informationA New Security Model for Cross-Realm C2C-PAKE Protocol
A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated
More informationResource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationPrivacy Models for RFID Authentication Protocols
Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationConformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection
Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,
More informationTime-Assisted Authentication Protocol
Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationAn Efficient Password-Only Authenticated Three-Party Key Exchange Protocol
Internatonal Journal of Appled Engneerng Research ISSN 0973-4562 Volume 12, Number 14 (2017) pp. 4329-4339 Research Inda Publcatons. http://www.rpublcaton.com An Effcent Password-Only Authentcated Three-Party
More informationProviding Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework
2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationSecure Distributed Cluster Formation in Wireless Sensor Networks
Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng
More informationA RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood
A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationDesign and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol
Desgn and Analyss of Authentcated Key Agreement Schemes for Future IoT Applcatons and Sesson Intaton Protocol Thess submtted n partal fulfllment of the requrements for the degree of Master of Scence (By
More informationTrust-based Mutual Authentication for Bootstrapping in 6LoWPAN
634 JOURNL OF COMMUNICTIONS, VOL. 7, NO. 8, UGUST 202 Trust-based Mutual uthentcaton for Bootstrappng n 6LoWPN Hong Yu College of Computer Scence and Technology, Bejng Unversty of Technology, Bejng 0024,
More informationSecuring Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks
Securng Qualty-of-Servce Route Dscovery n On-Demand Routng for Ad Hoc Networks Yh-Chun Hu UC Berkeley yhchun@cs.cmu.edu Davd B. Johnson Rce Unversty dbj@cs.rce.edu ABSTRACT An ad hoc network s a collecton
More informationEnsuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN
Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationA Flexible Auditing Mechanism for Storages in Cloud Computing
ISSN (Onlne : 2319-8753 ISSN (Prnt : 2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March 2014 2014 Internatonal Conference on Innovatons
More informationSecurity Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
July 2016, Volume 3, Number 3 (pp. 163 174) http://www.jcomsec.org Journal of Computng and Securty Securty Analyss of an EPC Class-1 Generaton-2 Complant RFID Authentcaton Protocol Feredoun Morad a,, Hamd
More informationA broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks
Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal
More informationAn Optimized Pseudorandom Generator using Packed Matrices
An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus
More informationID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationA secure sharing design for multi-tag RFID authentication protocol
Edth Cowan Unversty Research Onlne Australan Securty and Intellgence Conference Conferences, Symposa and Campus Events 2015 A secure sharng desgn for mult-tag RFID authentcaton protocol Ayad Al-Adham Plymouth
More informationCONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shh-Chen Chou Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Tawan ABSTRACT Informaton flow control (IFC) s
More informationETAtouch RESTful Webservices
ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationA Saturation Binary Neural Network for Crossbar Switching Problem
A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com
More informationAPRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha
JAIST Repos https://dspace.j Ttle APRAP: Another Prvacy Preservng RF Authentcaton Protocol Author(s)Myaj, Atsuko; Rahman, Mohammad Sha Ctaton 2010 6th IEEE Workshop on Secure Net Protocols (NPSec): 13-18
More informationDetection of masquerade attacks on Wireless Sensor Networks
Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology
More informationRemote User Authentication Scheme in Multi-server Environment using Smart Card
Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationOn the Security of a Digital Signature with Message Recovery Using Self-certified Public Key
Informatca 29 (2005) 343 346 343 On the Securty of a Dgtal Sgnature wth Message Recovery Usng Self-certfed Publc Key Janhong Zhang 1,2, We Zou 1, Dan Chen 3 and Yumn Wang 3 1 Insttuton of Computer Scence
More informationSmart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme
Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due
More informationan assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han
UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16
More informationCLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET
CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Saravanan Kumarasamy 1, Hemalatha B 2 and Hashn P 3 1 Asst. Professor/CSE Erode Sengunthar Engneerng College, Erode, Inda 2, 3 B.E. C.S.E.
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationarxiv: v3 [cs.ds] 7 Feb 2017
: A Two-stage Sketch for Data Streams Tong Yang 1, Lngtong Lu 2, Ybo Yan 1, Muhammad Shahzad 3, Yulong Shen 2 Xaomng L 1, Bn Cu 1, Gaogang Xe 4 1 Pekng Unversty, Chna. 2 Xdan Unversty, Chna. 3 North Carolna
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationAdaptive Free Space Management of Online Placement for Reconfigurable Systems
Adaptve Free Space Management of Onlne Placement for Reconfgurable Systems Trong-Yen Lee, Che-Cheng Hu, and Cha-Chun Tsa Abstract The FPGA can be reconfgured both dynamcally and partally. Such reconfgurable
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationResearch Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue
More informationCategories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationCryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards
Journal of Computational Information Systems 9: 14 (2013) 5513 5520 Available at http://www.jofcis.com Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L, Qan Wang, Cong Wang, Nng Cao, Ku Ren, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationWITH rapid improvements of wireless technologies,
JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More information