Two-Factor User Authentication in Multi-Server Networks

Size: px
Start display at page:

Download "Two-Factor User Authentication in Multi-Server Networks"

Transcription

1 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan nversty of Technology 59 Zhongzheng Road, Tanan Cty 700, TAIWAN (R.O.C.) th0040@mal.tut.edu.tw Department of Computer cence and Engneerng, Natonal un Yat-sen nversty 70 Lenha Road, Kaohsung Cty 8044, TAIWAN (R.O.C.) * Correspondng author: cyweng@mal.cse.nsysu.edu.tw Abstract Recently, Chang and Cheng proposed a robust mechansm for smart card based remote logns n a mult-server archtecture. However, based on the securty analyzes conducted by us, we fnd ther mechansm s vulnerable aganst smart card lost problems, leak-of-verfer attack and sesson key dsclosure attack. To elmnate all dentfed securty threats n ther mechansm, we further proposed an mproved verson of two-factor based user authentcaton protocol n mult-server networks. Keywords: Informaton securty; Key agreement; Mult-server archtecture; Password; mart card. Introducton In order to frustrate llegal users attempts of gettng the servceable resources mantaned n remote servers, two-factor (password and smart card) user authentcaton s the wdely accepted and most adopted method n clent-server archtecture [5, 6, 7, 8]. However, n tradtonal remote logn mechansms for a mult-server archtecture [], [9], a user needs to regster wth dfferent servce provders and remember the varous denttes and passwords for ensurng hgher securty. Therefore, sngle regstraton s the most mportant feature n a mult-server archtecture and any user can take desred servces from varous network servers wthout repeatng regstraton to each servce provder. Password authentcaton wth smart card s one of the mechansms that were wdely used to authentcate the valdty of partcpants between a logn user, the servce provders and a trusted regstraton center. In 00, L, Ln and Hwang proposed an authentcaton scheme [4] usng neural networks and asymmetrc key cryptosystems. In 004, Juang proposed an effcent and smart card based mult-server authentcaton scheme [3] for enhancng the system performance. In 008, Tsa proposed a mult-server authentcaton scheme [] based on one-way hash functon wthout verfcaton table. In 0, Chang and Cheng developed a more robust and effcent smart card based remote logn mechansm [] n whch only lghtweght one-way hash functon and exclusve OR operaton are requred durng mult-server authentcaton processes. nfortunately, based on the securty analyses conducted by us, Chang-Chengs logn mechansm s stll vulnerable aganst the smart card lost problems, leak-of-verfer attack and sesson key dsclosure attack. In ths paper, we wll demonstrate a seres of steps to show how the above-mentoned attacks can be nvoked on ther mechansm n the presence of a malcous adversary. 6

2 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0. Revew of Chang-Cheng s Mechansm Chang-Chengs mechansm conssts of one trusted regstraton center (RC), servce provders (P j ) and logn users ( ). RC s responsble for regstraton of P j and. When P j regster wth RC use dentfer ID j, RC computes a secret key KR j = H(ID j k) and shares t wth P j, where s the strng concatenaton symbol, k s the prvate key of RC and H(.) s a prvate one-way hash functon only known by RC... Regstraton Phase When a user wants to get the servce granted n ths system, must perform regstraton wth RC. Frst, chooses hs/her dentfer d and password pw and sends the regstraton message {d, pw, Personal Informaton} to RC through a secure channel. Then, RC checks s personal nformaton and credt. If above does not hold, RC rejects s regstraton; otherwse, RC computes a transformed dentfer TID = T d as s account number and saves t n the database, where T s the regstraton tme. The mechansm concatenates T wth d can prevent the duplcaton of account numbers and can freely select hs/her own d and pw. In addton, RC computes TPW = h(pw ) and = H(TID k) pw, stores (TID, h(.), TPW ) nto s smart card and ssues ths smart card to, where s the exclusve-or symbol and h(.) s a publc one-way hash functon... Logn Phase In ths phase, we assume that wants to log n the server P j and asks a servce from P j. * nserts hs/her smart card to a nput devce and enters password pw. Then the smart card performs the flowng steps: * * tep : The smart card computes h( pw ) and checks whether h( pw ) = TPW. If t does not hold, the smart card stops the logn procedure; otherwse, t goes to tep. tep : The smart card computes = h( pw * N ID j ) and sends the logn message {TID, N } to P j, where N s a nonce chosen by s smart card. tep 3: pon recevng the logn message from, P j computes = h(kr j N ) and sends {TID, N, ID j, N } to RC, where N s a nonce chosen by P j..3. Authentcaton and Key Agreement Phase pon recevng the message from P j, RC, P j and perform the followng steps to acheve mutual authentcaton and construct a common sesson key shared between and P j. tep : RC checks the freshness of N and N and the valdty of s account number TID. If they does not hold, RC rejects ths logn; otherwse, t goes to tep. tep : RC checks whether h(h(tid k) N ID j ) = and h(h(id j k) N ) =. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that and P j are legal partcpants and goes to tep 3. tep 3: RC chooses a random number ran and computes =h(h(id j k) N R ), h(h(tid k) N R ) =h(h(id j k)) (ran h(h(tid k))) and (h(h(id j k)) ran), where N R s a nonce chosen by RC. Fnally RC sends { } to P j. = =h(h(tid k)), N R,, 6

3 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 tep 4: pon recevng the message from RC, P j checks the freshness of N R. If t s nvald, P j termnates the connecton; otherwse, t goes to tep 5. tep 5: P j checks whether h(kb j N R ) =. If t holds, t goes to tep 6; otherwse, P j stops the procedure. tep 6: P j computes s = h(kr j ) and K = h((h(kr j ) s) N N N R ) and sends {, N R } to, where K s the common sesson key shared between P j and. tep 7: pon recevng the response message from P j, the smart card checks the freshness of N R and verfes whether h( pw N R ) =. If they are nvald, then authentcaton fals; * otherwse, convnces that P j s a legal partcpant and computes u = h( pw * ) and the common sesson key K = h((u h( pw * )) N N N R ). 3. Attacks on Chang-Cheng s Mechansm Although Chang and Cheng clamed that ther mechansm can resst many types of attacks and satsfy all the essental requrements for mult-server archtecture authentcaton. However, the actual stuaton s not the case and the cryptanalyss of Chang-Chengs mechansm has been made n ths secton. The detaled cryptanalyss s presented as follows. 3.. mart Card Lost Problems In ths attack, we assume that s smart card s stolen by an adversary a and the secret nformaton (TID, h(.), TPW ) whch s stored n the smart card can be extracted by montorng ts power consumpton [0]. Off-lne password guessng attack: As we know, the content of the smart card s (TID = T d ; h(.); TPW =h(pw ); = H(TID k) pw ). Wth ths nformaton, a can select a guessable password pw and compute h( pw ). If h( pw ) s equal to TPW, t ndcates the correct guess of s low-entropy password and Chang-Chengs mechansm cannot wthstand off-lne password guessng attack. Impersonaton attack: Once the adversary a got the secret nformaton (TID, h(.), TPW, ) and correctly derved s password pw, he/se can make a vald logn request wth ease. For example, a computes = h( pw N A ID j ) and makes a vald logn message to mpersonate by sendng {TID, N A } to the servce provder P j, where N A s a nonce chosen by a. 3.. Leak-of-Verfer Attack In Chang-Chengs mechansm, we found that ther mechansm may suffer from leak-ofverfer attack and any legtmate user who possesses the smart card can easly derve servce provder P j s secret h(h(id j k)) by performng the followng steps: tep : In tep 7 of authentcaton and key agreement phase, receves the response message {, N R } from P j. tep : Then, computes u = h( pw * )= h(h(id j k)) ran and removes ran from h(h(id j k)) ran. Fnally, derves P j s secret h(h(id j k)). 63

4 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, esson Key Dsclosure Attack In case of P j s secret h(h(id j k)) s successfully derved by a, a can use t to derve the prevous and subsequent sesson keys whch are constructed by other users and P j. We assume that some vctm user s logn message {TID, N A }, P j s authentcaton message {TID, N, ID j, N } and RCs response message {, N R } are collected by a. Then, the sesson key dsclosure attack can be launched by performng the followng steps: tep : a eavesdrops above-mentoned messages and obtans three nonces N, N, and N R from, P j, and RC, respectvely. tep : a uses P j s secret h(h(id j k)) to derve s by computng s = h(h(id j k)) = ran h(h(tid k)). tep 3: a derves the sesson keys of past and future sessons by computng K = h((h(h(id j k)) s) N N N R ). 4. The Proposed Protocol Accordng to our cryptanalyss, we proposed a more secure remote logn protocol to remove the securty weaknesses exstng n Chang-Chengs mechansm. 4.. Regstraton Phase When a user wants to get the servce granted n ths system, must perform regstraton wth RC as follows. tep : chooses hs/her dentfer d and password pw and generates a random number b. Then, computes h((d pw ) b) and sends the regstraton message {d, h((d pw ) b), Personal Informaton} to RC through a secure channel. tep : pon recevng the regstraton message from, RC checks s personal nformaton and credt. If above does not hold, RC rejects s regstraton; otherwse, t goes to tep 3. tep 3: RC computes a transformed dentfer TID = T d as s account number and saves t n the database, where T s the regstraton tme of. tep 4: RC computes = H(TID k) h((d pw ) b) and stores (, h(tid ), h(.), T ) nto s smart card and ssues ths smart card to. tep 5: pon recevng the smart card, stores the random number b nto the smart card and does not need to remember b after fnshng the phase. 4.. Logn Phase In case of wants to log n the server P j and asks a servce from P j, nserts hs/her smart card to a nput devce and enters dentfer d, password pw, and ID j. Then the smart card performs the flowng steps: tep : The smart card retreves T and b to compute TID = T d and h((d pw ) b), respectvely. Then, the smart card checks whether h( TID ) =h(tid ). If t does not hold, the smart card termnates ths logn; otherwse, the smart card generates a nonce N and sends the logn message {TID } to P j, where = h((d pw ) b) N and = h((tid ID j ) N ). 64

5 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 tep : pon recevng the logn message from, P j computes = KR j N and sends {TID, ID j } to RC, where N s a nonce chosen by P j and = h((id j TID ) N ) Authentcaton and Key Agreement Phase pon recevng the message from P j, RC, P j and perform the followng steps to acheve mutual authentcaton and construct a common sesson key shared between and P j. tep : RC checks the valdty of s account number TID and P j s dentfer ID j. If they does not hold, RC rejects ths logn; otherwse, t goes to tep. tep : RC computes N = H(TID k) and checks the freshness of N and the valdty of h((tid ID j ) N )=. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that s a legal user and goes to tep 3. tep 3: RC computes N = H(ID j k) and checks the freshness of N and the valdty of h((id j TID ) N ) =. If ether one does not hold, RC rejects ths connecton; otherwse, RC convnces that P j s a legal servce provder and goes to tep 4. tep 4: RC computes = h( N ) N N R = h(h(tid k) K) = h( N ) N N R and = h(h(id j k) K), where N R s a nonce chosen by RC and K s a common sesson key whch s constructed by computng K = h( N N N R ). Fnally RC sends {, } to P j. tep 5: pon recevng the message from RC, P j computes " = h(n )and K = h( " N ) and checks whether h(h(id j k) K ) =. If t s nvald, P j termnates the connecton; otherwse, P j convnces that RC and are legal partcpants and sends { } to. Note that K = K s the common sesson key shared between P j, and RC. tep 6: pon recevng the response message from P j, the smart card computes " = h(n ) and K = h( " N ) and checks whether h(h(tid k) K )=. If t s nvald, termnates the connecton; otherwse, convnces that RC and P j are legal partcpants and K = K = K s the common sesson key shared between, P j and RC. 5. ecurty Analyss Here we manly dscussed and analyzed the securty of the proposed protocol on varous known cryptographc attacks and demonstrated ts strength n terms of securty. Off-lne password guessng attack: In case of s smart card s stolen by an adversary a and he/she has the ablty to obtan the contents of the smart card (, h(tid ), h(.), T, b). It does not help a to derve or modfy s password wthout knowng s dentty d and password pw. In addton, from the proposed protocol, we can see that the logn messages {TID } and {TID, ID j } only contan nformaton about H(TID k), H(ID j k), N and N. They do not nclude any nformaton about the password. Therefore, ths desgn of the proposed protocol can protect the system aganst off-lne password guessng attack. 65

6 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Impersonaton attack: The proposed protocol must protect the system aganst mpersonaton attacks on both the user, servce provder and the regstraton center sde. Frst, on the user and servce provder sde, t s dffcult for a to create correct and wthout the users secret token H(TID k) and the servce provders secret token H(ID j k). Moreover, t s dffcult for a to get the regstraton centers secret key k. On the regstraton center sde, a cannot derve the random nonces N and N wthout H(TID k) and H(ID j k), whch means a cannot compute the correct hash values h(n ) and h(n ) n order to mpersonate the regstraton center. Leak-of-verfer attack: In our proposed protocol, a regstered user may try to obtan the secret token H(TID k) from hs/her smart card by extractng and b and computng H(TID k) = h((d pw ) b). However, t does not help to obtan P j s secret token H(ID j k) and nonce N from the logn parameters and due to the protecton of oneway hash functon and the securty of large nonce (e.g., bgger than 56 bts). On the other hand, the random nonce N R s known to only regstraton center RC and t s masked by =h(n ) N N R and = h(n ) N N R. Therefore, and P j cannot derve N R from and wthout knowng P j s N and s N, respectvely. esson key dsclosure attack: After the successful user authentcaton, the user, the servce provder and the regstraton center computes the common sesson key K= h(n N N R ) and an adversary a may try to derve K to damage the later communcatons between them. However, n tep 4 of authentcaton and key agreement phase, a cannot obtans N N R and N N R wthout knowng h(n ) and h(n ), respectvely. As a result, a cannot get success n the proposed protocol by sesson key dsclosure attack. 6. Conclusons In ths paper, we showed that Chang and Chengs two-factor based mult-server authentcaton protocol s nsecure. To offset these securty weaknesses found n Chang- Chengs protocol, we have proposed an mproved verson of two-factor based mult-server authentcaton protocol. ecurty analyss shows that our proposed protocol s reslent to varous attacks and acheves mutual authentcaton and sesson key agreement. References [] C. C. Chang and T. F. Cheng, A robust and effcent smart card based remote logn mechansm for multserver archtecture, Internatonal Journal of Innovatve Computng, Informaton and Control, 7(8), (0), pp [] H. C. Hsang and W. K. hh, Improvement of the secure dynamc ID based remote user authentcaton scheme for mult-server envronment, Computer tandards & Interfaces, 3(6), (009), pp [3] W. Juang, Effcent mult-server password authentcated key agreement usng smart cards, IEEE Transactons on Consumer Electroncs, 50(), (004), pp [4] L. H. L, I. C. Ln and M.. Hwang, A remote password authentcaton scheme for mult-server archtecture usng neural networks, IEEE Transactons on Neural Network, (6), (00), pp [5] C. T. L and C. C. Lee, A robust remote user authentcaton scheme usng smart card, Informaton Technology and Control, 40(3), (0), pp [6] C. T. L and C. C. Lee, A novel user authentcaton and prvacy preservng scheme wth smart cards for wreless communcatons, Mathematcal and Computer Modellng, 55(-), (0), pp [7] C. T. L and M.. Hwang, A lghtweght anonymous routng protocol wthout publc key en/decryptons for wreless ad hoc networks, Informaton cences, 8(3), (0), pp

7 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 [8] C. T. L, C. C. Yang and M.. Hwang, A secure routng protocol wth node selfshness resstance n MANETs, Internatonal Journal of Moble Communcatons, 0(), (0), pp [9] X. L, Y. Xong, J. Ma and W. Wang, An effcent and securty dynamc dentty based authentcaton protocol for mult-server archtecture usng smart cards, Journal of Network and Computer Applcatons, 35(), (0), pp [0] T.. Messerges, E. A. Dabbsh and R.H. loan, Examnng smart-card securty under the threat of power analyss attacks, IEEE Transactons on Computers, 5(5), (00), pp [] J. L. Tsa, Effcent mult-server authentcaton scheme based on one-way hash functon wthout verfcaton table, Computers & ecurty, 7(3-4), (008), pp

8 Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 68

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

An efficient biometrics-based authentication scheme for telecare medicine information systems

An efficient biometrics-based authentication scheme for telecare medicine information systems Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

A lightweight password-based authentication protocol using smart card

A lightweight password-based authentication protocol using smart card Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

A New Security Model for Cross-Realm C2C-PAKE Protocol

A New Security Model for Cross-Realm C2C-PAKE Protocol A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

Time-Assisted Authentication Protocol

Time-Assisted Authentication Protocol Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Appled Engneerng Research ISSN 0973-4562 Volume 12, Number 14 (2017) pp. 4329-4339 Research Inda Publcatons. http://www.rpublcaton.com An Effcent Password-Only Authentcated Three-Party

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol Desgn and Analyss of Authentcated Key Agreement Schemes for Future IoT Applcatons and Sesson Intaton Protocol Thess submtted n partal fulfllment of the requrements for the degree of Master of Scence (By

More information

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN 634 JOURNL OF COMMUNICTIONS, VOL. 7, NO. 8, UGUST 202 Trust-based Mutual uthentcaton for Bootstrappng n 6LoWPN Hong Yu College of Computer Scence and Technology, Bejng Unversty of Technology, Bejng 0024,

More information

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks Securng Qualty-of-Servce Route Dscovery n On-Demand Routng for Ad Hoc Networks Yh-Chun Hu UC Berkeley yhchun@cs.cmu.edu Davd B. Johnson Rce Unversty dbj@cs.rce.edu ABSTRACT An ad hoc network s a collecton

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

A Flexible Auditing Mechanism for Storages in Cloud Computing

A Flexible Auditing Mechanism for Storages in Cloud Computing ISSN (Onlne : 2319-8753 ISSN (Prnt : 2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March 2014 2014 Internatonal Conference on Innovatons

More information

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol July 2016, Volume 3, Number 3 (pp. 163 174) http://www.jcomsec.org Journal of Computng and Securty Securty Analyss of an EPC Class-1 Generaton-2 Complant RFID Authentcaton Protocol Feredoun Morad a,, Hamd

More information

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A secure sharing design for multi-tag RFID authentication protocol

A secure sharing design for multi-tag RFID authentication protocol Edth Cowan Unversty Research Onlne Australan Securty and Intellgence Conference Conferences, Symposa and Campus Events 2015 A secure sharng desgn for mult-tag RFID authentcaton protocol Ayad Al-Adham Plymouth

More information

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shh-Chen Chou Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Tawan ABSTRACT Informaton flow control (IFC) s

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha JAIST Repos https://dspace.j Ttle APRAP: Another Prvacy Preservng RF Authentcaton Protocol Author(s)Myaj, Atsuko; Rahman, Mohammad Sha Ctaton 2010 6th IEEE Workshop on Secure Net Protocols (NPSec): 13-18

More information

Detection of masquerade attacks on Wireless Sensor Networks

Detection of masquerade attacks on Wireless Sensor Networks Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology

More information

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key Informatca 29 (2005) 343 346 343 On the Securty of a Dgtal Sgnature wth Message Recovery Usng Self-certfed Publc Key Janhong Zhang 1,2, We Zou 1, Dan Chen 3 and Yumn Wang 3 1 Insttuton of Computer Scence

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET

CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Saravanan Kumarasamy 1, Hemalatha B 2 and Hashn P 3 1 Asst. Professor/CSE Erode Sengunthar Engneerng College, Erode, Inda 2, 3 B.E. C.S.E.

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

arxiv: v3 [cs.ds] 7 Feb 2017

arxiv: v3 [cs.ds] 7 Feb 2017 : A Two-stage Sketch for Data Streams Tong Yang 1, Lngtong Lu 2, Ybo Yan 1, Muhammad Shahzad 3, Yulong Shen 2 Xaomng L 1, Bn Cu 1, Gaogang Xe 4 1 Pekng Unversty, Chna. 2 Xdan Unversty, Chna. 3 North Carolna

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Adaptive Free Space Management of Online Placement for Reconfigurable Systems

Adaptive Free Space Management of Online Placement for Reconfigurable Systems Adaptve Free Space Management of Onlne Placement for Reconfgurable Systems Trong-Yen Lee, Che-Cheng Hu, and Cha-Chun Tsa Abstract The FPGA can be reconfgured both dynamcally and partally. Such reconfgurable

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue

More information

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards Journal of Computational Information Systems 9: 14 (2013) 5513 5520 Available at http://www.jofcis.com Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L, Qan Wang, Cong Wang, Nng Cao, Ku Ren, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information