New Remote Mutual Authentication Scheme using Smart Cards

Size: px
Start display at page:

Download "New Remote Mutual Authentication Scheme using Smart Cards"

Transcription

1 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu , Inda E mal: rrajaram@tce.edu ** Smart and Secure Lab, Thagarajar College of Engneerng, Madura, Taml Nadu , Inda Abstract. Remote mutual authentcaton based on smart cards s the best practcal soluton for remote accessng. Most of the schemes are password based. In ths paper we propose a new remote mutual authentcaton scheme usng smart cards wthout mantanng the password table. Ths s based on ElGamal s. It provdes hgh securty and mutual authentcaton at a reasonable computatonal cost. Furthermore t restrcts most of the current attackng mechansms. It s smple and can be adopted n any knd of lghtweght devces. 1 Introducton To access resources from a remote system, users should have proper access rghts. One of the smpler and more effcent mechansms s the use of a password authentcaton scheme. To access the resources, each user should have an dentty (ID) and a password (PW). In the exstng tradtonal setup the ID and PW are mantaned by the remote system n a verfcaton table. If a user wants to log n a remote server, he has to submt hs ID and PW to the server. The remote server receves the logn message and checks the elgblty of the user by referencng the password or verfcaton table. If the submtted ID and PW match the correspondng par stored n the server s verfcaton table, the user wll be granted access to the server. A remote password authentcaton scheme s used to authentcate the legtmacy of the remote user over an nsecure channel. In such a scheme, the password s often regarded as a secret shared between the authentcaton server (AS) and the user, and serves to authentcate the dentty of the ndvdual logn. Through knowledge of the password, the remote user can create a vald logn message to the authentcaton server. AS checks the valdty of the logn mes 141

2 142 Rajaram Ramasamy, Amutha Prabakar Munyand sage to provde the access rght. Password authentcaton schemes wth smart cards have a long hstory n the remote user authentcaton envronment. 1.1 Problems n the Tradtonal Method Two problems are found n ths exstng tradtonal mechansm. 1. The admnstrator of the server wll come to know the password, because the server mantans the password table. 2. An ntruder can mpersonate a legal user by stealng the user s ID and PW from the password table. To add to the woes, the current Internet s vulnerable to varous attacks such as denal of servce attack, forgery attack, forward secrecy attack, server spoofng attack, parallel sesson attack, guessng attack, replay attack, smart card loss attack, and stolen verfer attack. In ths paper we propose a new remote mutual authentcaton scheme usng smart cards wthout password table, whch crcumvents most of these attacks. In the proposed method the remote system does not mantan the password table, but nstead mantans the one tme regstraton date and tme of the users. In ths paper, we propose an mproved remote user authentcaton scheme based on ElGamal, usng smart cards. We have ncorporated mutual authentcaton, whch enhances the securty mechansm further. Our proposed scheme ressts most of the attackng mechansms. Ths paper s organzed as follows, n secton 2 we revew the Hwang L scheme [7] and Awasth Lal scheme [14]. In secton 3, we propose a new remote mutual authentcaton scheme wthout usng password table. In secton 4, we provde a securty analyss of our proposed scheme. In Secton5, we analyze the cost and functonalty of the related scheme. Fnally, n secton 6, we conclude our paper. 2 Related Work In 1981 Lamport [1] proposed a remote password authentcaton scheme usng a password table to acheve user authentcaton. The Lamport [1] scheme s not secure, due to some vulnerabltes. A remote user authentcaton scheme usng smart cards was proposed by Hwang L [7]. Hwang L s scheme s based on the ElGamal s [2] publc key scheme. Ths scheme can wthstand the replayng attack by ncludng tme stamp n the logn message. Moreover, the remote system does not need to store a password table for verfyng the legtmacy of the logn users. The system only needs to mantan a secret key, whch s used to compute user passwords, based on user submtted denttes n the authentca

3 New Remote Mutual Authentcaton Scheme usng Smart Card 143 ton phase. As the securty of the scheme reles on the dffculty of computng dscrete logarthms over fnte felds, t s dffcult for the users to compute the secret key of the system from known nformaton. Ths scheme s breakable only by one of ts legtmate users. A legtmate user can mpersonate other legal users by constructng vald pars of user denttes wthout knowng the secure key of the system. Later, Shen [15] analyzed mpersonaton attack of Chan [8] on Hwang L s [7] scheme, and suggested methods to repulse t. Awasth Lal [14] presented a remote user authentcaton scheme usng smart cards wth forward securty. Forward securty ensures that the prevously generated passwords n the system are secure even f the system s secret key s compromsed. Yoon et al. [23] ctng Awasth Lal [14] proposed a hash based authentcaton scheme based on the work of Chen et al.[13]. In the authentcaton phase, the system cannot valdate the logn request message to compute the password of the user. Yoon et al. [23] presents an enhancement to resolve the problems n the abovementoned scheme based on hash functon. Ths scheme enables users to change ther passwords freely and securely wthout the help of a remote server. It also provdes secure mutual authentcaton In 2004 Kumar [21] proposed a scheme, whch s secure aganst forgery. To obtan ths securty, ths scheme suggests some modfcaton n logn and authentcaton phases. Ths scheme s the modfed form of the Hwang et al. [15] scheme and uses one more functon CK to generate the check dgt of Kumar [21] for each regstered dentty. In ths scheme, only the AS can generate a vald dentty and the correspondng check dgt. Fan et al. [25] proposed a robust remote authentcaton scheme wth smart cards. He clamed that hs scheme satsfes the followng propertes: 1) low computaton for smart cards; 2) no password table; 3) password chosen by the users themselves; 4) no need for clock synchronzaton and delay tme lmtaton; 5) wthstand the replay attack; 6) server authentcaton; 7) wthstand the offlne dctonary attack wthout smart cards; 8) wthstand the offlne dctonary attack wth smart cards; 9) revokng the lost cards wthout changng the user s denttes. The major contrbuton of Fan et al. [25] scheme provdes a method for preventng the offlne dctonary attack even f the secret nformaton stored n a smart card s compromsed. The major drawbacks of hs scheme are the hgher computaton and communcaton costs, because of usng Rabn s publckey cryptosystem. Furthermore, hs scheme does not provde a functon for sesson key agreement and cannot prevent the nsder attack. Ku et al. [19] proposed an mprovement to prevent the reflecton attack mentoned by Mtchell [3] and an nsder attack dscussed by Ku et al. [16]. In addton, they showed that Chen [13] scheme s vulnerable and can be compromsed. Furthermore, Ku et al. [19] proposed an mprovement to Chen [13]

4 144 Rajaram Ramasamy, Amutha Prabakar Munyand scheme to prevent the above mentoned weaknesses. However, the mproved scheme s not only susceptble to parallel sesson attack proposed by Hsu [22], but also nsecure for changng the user s password n password changng phase. Dfferent types of password authentcaton schemes have been proposed by [4], [5], [6], [7], [9], [13], [11], [12], [10] and [20]. Hwang et al. [26] present the survey of all currently avalable passwordauthentcaton related schemes and get them classfed n terms of several crucal crtera. Tsa et al. ponted out that most of the exstng schemes are vulnerable to varous attacks and fal to serve all the purposes that an deal password authentcaton scheme should, and defne all possble attacks and goals that an deal password authentcaton scheme should wthstand and acheve. Tan e.t al. [27] show that Yoon et al. scheme [23] s subject to forgery attacks f the nformaton stored n the smart card s stolen. Ths volates the two factor securty objectve of the smart cards based remote user authentcaton schemes. Tan et al. propose an amendment to ths problem and propose two new schemes, whch are more effcent and secure than Yoon et al. s scheme. Lu Yonglang et al. [28] proposed a novel ECC based wre less authentcaton protocol. 3 New Remote Mutual Authentcaton Scheme Usng Smart Cards In ths paper, we propose a new remote mutual authentcaton scheme usng smart cards. Our proposed scheme s composed by an ntal phase, a regstraton phase, a logn phase and an authentcaton phase. Whenever a new user regsters through the regstraton phase, the server ssues the smart card and password, whch holds the related nformaton, and sends t through the secure channel. To access the remote server, user nserts hs smart card nto the devce and keys the password. The server authentcates the user n the authentcaton phase. Lee et al. [17] and Kumar [21] pont out that Awasth Lal fals to provde forward securty because the regstraton tme of the user s stored n the smart card tself. Ths does not apply to our scheme, as the regstraton tme s stored n an encrypted form n the server. The phases n our proposed scheme are explaned below. 3.1 Intal Phase The Authentcaton Server (AS) generates the followng parameters p : a large prme number

5 New Remote Mutual Authentcaton Scheme usng Smart Card 145 f (.) : A one way functon x s : the secret key of the system, mantaned by the server T R : Regstraton Tmestamp of every user, mantaned by the server n an encrypted form, usng the server s secret key. 3.2 Regstraton Phase A useru who wants to regster to access the server servces, submts ts ID to the AS. AS computes PW as PW ( ) x s = ID TR mod p Here T R s the one tme regstraton tme and date of the user U as got from the system clock and mantaned by the server. Regstraton center ssues a password PW and a smart card, ncorporated wth the publc parameters ( f (.), p ). 3.3 Logn Phase User U nserts the smart card to the smart card reader and keys ID and PW. The smart card wll perform the followng operatons, 1. Generate a random number r r 2. Compute C1 = PW mod p 3. Compute t = f( T PW ) mod( p 1), where T s the current date and tme of the smart card reader. t 4. Compute M = PW mod p t 5. Compute C2 = M( C1)mod p 6. Sends a logn request C = ( ID, C1, C2, T) to the remote system (Authentcaton Server AS). 3.4 Authentcaton Phase Assume AS receves the message C at tme T c, where Tc s the current date and tme of the AS. Then AS takes the followng actons, 1. Check the format of ID. If the dentty format s correct, then AS wll accept the logn request. Otherwse, the request wll be rejected. 2. Check the valdty of the tme nterval between T and T c. 3. Check whether the followng equaton, t 1 f ( T PW ) C ( C ) = ( PW) mod p s satsfed. It s dffcult for 2 1

6 146 Rajaram Ramasamy, Amutha Prabakar Munyand user U to compute the secret key x s and fnd the regstraton tme TR of the system from the equaton, PW ( ) x s = ID TR mod p Now mutual authentcaton message s composed as follows, t = f( Ts PW ) Here T s s the current tme of the remote system. t C mod 3 = C1 p * 4. Send the mutual authentcaton message C = ( C3, T s ) to user U. * 5. User U receves the mutual authentcaton message C and checks the valdty of the message. * t putesc mod 3 = C1 pand checks wth the receved C 3 value. If t s vald then accepts, otherwse rejects and generates a new logn request. 4 Securty Analyss of the Proposed Scheme In ths secton we dscuss the enhanced securty features of the proposed scheme. Our proposed scheme wthstands most of the attackng methods. 4.1 Denal of Servce Attack In our proposed scheme, the logn request s generated based on a password and the current tme. The logn request generaton does not depend on any prevous nformaton: every tme t s a new one wth current tme. The attacker cannot create or update the false nformaton to logn 4.2 Forgery Attack The attacker cannot create a vald password wthout knowng the regstraton tme T R and the secret key of server x s. So the attacker cannot create a vald logn request and act as a legal user 4.3 Password Guessng Attack x In our scheme, the password s computed as follows PW ( ) s = ID TR mod p. Suppose an adversary ntercepts the logn request C = ( ID, C1, C2, T) of a user U. It s not possble to recover the orgnal password from the logn re

7 New Remote Mutual Authentcaton Scheme usng Smart Card 147 quest message. The system. T R value s unque and 4.4 Parallel Sesson Attack xs s the secret key of the remote Suppose an adversary ntercepts the logn messagec = ( ID, C1, C2, T), the adversary cannot create a vald new logn message. Here C 1 and C 2 values are fresh for every tme. The adversary cannot fnd the value of r and t = ( T PW ). 4.5 Smart Card Loss Attack Suppose user U loses hs smart card, the adversary cannot use ths card wthout knowng the password of the user U. Suppose an adversary wants to change the password, he must know the orgnal password. Thus hs attempt to mpersonate user U fals. 4.6 Mutual Authentcaton The user U wants to log on to the remote system S and sends a logn request to S. Suppose an adversary ntercepts the logn request and attempts to mpersonate as remote system S. The adversary cannot calculate the vald t C mod 3 = C1 p wthout knowng the value PW, and cannot get the PW value from the logn message. The adversary agan fals to mpersonate the remote system S. 5 Analyss of Cost and Functonalty In ths secton, we present a comparson between our scheme and three other schemes. All the 4 schemes are based on ElGamal s, but only the proposed scheme facltates mutual authentcaton. Table 1 llustrates the computatonal cost for each phase. Scheme E1 E2 E3 Our Scheme 1 Ds Log 1 Hash + 2 Ds-log 2 Hash + 3 Ds-log Hwang L s [7] 1 Ds-log 1 Hash + 2 Ds-log 1 Hash + 2 Ds-log Awasth [17] 1 Ds-log 1 Hash + 2 Ds-log 1 Hash + 2 Ds-log

8 148 Rajaram Ramasamy, Amutha Prabakar Munyand Kumar [24] 1 Ds Log 1 Hash + 2 Ds log 1 Hash + 2 Ds Log Table 1: Cost comparson between Our Scheme and Related Schemes Computatonal cost comparson between our scheme and related schemes. Here, E1 stands for the computaton cost of the Regstraton phase, E2 stands for the computatonal cost for the logn phase, E3 stands for the computaton cost for the authentcaton phase, Ds log for dscrete logarthm, and Hash for hash functon. Obvously due to ncluson of mutual authentcaton, our scheme entals a hgher computatonal cost. 6 Securty Comparson Table 2 shows the securty requrements of the related schemes. Hwang s, Awasth Lal and Kumar s scheme are based on the publc key ElGamal scheme. Schemes S1 S2 S3 S4 S5 S6 S7 S8 S9 Hwang L [7] Y N N N Y Y Y Y Y Awasth [17] Y Y Y N Y Y Y Y Y Kumar [24] Y Y Y N Y Y Y Y Y Our Scheme Y Y Y Y Y Y Y Y Y Table 2: Securty Comparson wth related schemes In ths table we consder all the attacks dentfed and defned by Tsa Lee Hwang [24]. They are the ones descrbed below. In the table, Y stands for acheved and N for non acheved. S1 Denal of Servce Attacks: An attacker can update false verfcaton nformaton of a legal user for the next logn phase. Afterwards, the legal user wll not be able to logn successfully anymore S2 Forgery Attacks (Impersonaton Attacks): An attacker attempts to modfy ntercepted communcatons to masquerade the legal user and log n the system S3 Forward Secrecy: It ensures that the prevously generated passwords n the system are secure even f the system s secret key has been revealed n publc by accdent or has been stolen

9 New Remote Mutual Authentcaton Scheme usng Smart Card 149 S4 Mutual Authentcaton: The user and the server can authentcate each other. Not only can the server verfy the legal users, but the users can also verfy the legal server. Mutual authentcaton can help wthstand the server spoofng attack where an attacker pretends to be the server to manpulate senstve data of the legal users S5 Parallel Sesson Attack: Wthout knowng a user s password, an attacker can masquerade as the legal user by creatng a vald logn message out of some eavesdropped communcaton between the user and the server S6 Password Guessng Attack (Offlne dctonary attack): Most passwords have such low entropy that the system s vulnerable to password guessng attacks, where an attacker ntercepts authentcaton messages, stores them locally and then attempts to use a guessed password to verfy the correctness of hs/her guess usng these authentcaton messages S7 Replay Attacks: Havng ntercepted prevous communcatons, an attacker can mpersonate the legal user to log n the system. The attacker can replay the ntercepted messages S8 Smart Card Loss Attacks: When the smart card s lost or stolen, unauthorzed users can easly change the password of the smart card, or can guess the password of the user by usng password guessng attacks, or can mpersonate the user to log n the system S9 Stolen Verfer Attacks: An attacker who steals the password verfer (e.g., hashed passwords) from the server can use the stolen verfer to mpersonate a legal user to log n the system 7 Concluson Hwang L [7] proposed a remote user authentcaton scheme usng smart cards. Awasth Lal [14] proposed a remote user authentcaton scheme wth forward securty. Both schemes suffer dfferent types of attacks. In ths paper we propose a new remote mutual authentcaton scheme usng smart cards. Our proposed scheme wthstands most of the current attackng mechansms. Awasth Lal s scheme suffers from stolen verfer attack. In our method, stolen verfer attack wll not work. The user password s not related to any nformaton stored n the smart card and the server wll not mantan any password table. The server mantans the regstraton tme of all the users n the encrypted format by usng ts secret key. It s dffcult for the attacker to fnd the password wthout knowng the regstraton tme of the user and the secret key of the remote system.

10 150 Rajaram Ramasamy, Amutha Prabakar Munyand Acknowledgment Ths work was supported by grants from Natonal Techncal Research Organzaton, of Government of Inda. The authors thank the Prncpal and Head of the Department of Computer Scence and Engneerng of Thagarajar College of Engneerng, Madura, Inda, for the support and encouragement. References [1] L. Lamport (1981), Password authentcaton wth nsecure communcaton, Communcaton of the ACM, Vol. 24, No. 11, pp [2] T. ElGamal (1985), A publc key cryptosystem and a sgnature scheme based on dscrete logarthms, IEEE Transactons on Informaton Theory, Vol. 31, No. 4, pp , July. [3] C. Mtchell (1989), Lmtaton of challenge response entty authentcaton, Electroncs Letters, Vol. 25, No.17, pp , Aug. [4] C. C. Chang and T. C. Wu (1993), Remote password authentcaton wth smart cards, IEE Proceedngs E, Vol. 138, No. 3, pp [5] C. C. Chang and S. J. Hwang (1993), Usng smart cards to authentcate remote passwords, Computers and Mathematcs wth applcatons, Vol. 26, No. 7, pp [6] T. C. Wu (1995), Remote logn authentcaton scheme based on a geometrc approach, Computer Communcaton, Vol. 18, No. 12, pp [7] M. S. Hwang and L. H. L (2000), A new remote user authentcaton scheme usng smart cards, IEEE Transactons on Consumer Electroncs, Vol. 46, No. 1, pp , February. [8] C. K. Chan and L. M. Cheng (2000), Cryptanalyss of a remote user authentcaton scheme usng smart cards, IEEE Transactons on Consumer Electroncs, Vol. 46, pp [9] L. H. L, L. C. Ln and M. S. Hwang (2001), A remote password authentcaton scheme for mult server archtecture usng neural networks, IEEE Transactons Neural Networks, Vol. 12, No. 6, pp [10] Y. L. Tang, M. S. Hwang and C. C. Lee (2002), A smple remote user authentcaton scheme, Mathematcal and Computer Modelng, Vol. 36, pp

11 New Remote Mutual Authentcaton Scheme usng Smart Card 151 [11] C. C. Lee, M. S. Hwang and W. P. Yang (2002), A flexble remote user authentcaton scheme usng smart cards, ACM Operatng Systems Revew, Vol. 36, No. 3, pp [12] C. C. Lee, L. H. L, and M. S. Hwang (2002), A remote user authentcaton scheme usng hash functons, ACM Operatng Systems Revew, Vol. 36, No. 4, pp [13] H. Y. Chen, J. K. Jan, and Y. M. Tseng (2002), An effcent and practcal soluton to remote authentcaton: smart card, Computers & Securty, Vol. 21, No. 4, pp [14] A K. Awasth and Sunder Lal (2003), A Remote User Authentcaton Scheme usng Smart Cards wth Forward Securty, IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, pp , [15] J. J. Shen, C. W. Ln and M. S. Hwang (2003), A modfed Remote User Authentcaton Scheme usng Smart Card, IEEE Transactons on Consumer Electroncs, Vol. 49, No. 2, pp [16] W. C. Ku, C. M. Chen, and H. L. Lee (2003), Cryptanalyss of a varant of Peyravan Zunc s password authentcaton scheme, IEICE Transacton on Communcaton, Vol. E86 B, No. 5, pp , May. [17] Sung Woon Lee, Hyun Sung Km, and Kee Young Yoo (2004) Comment on a Remote User Authentcaton Scheme usng Smart Cards wth Forward Secrecy. IEEE Transactons on Consumer Electroncs, Vol 50. No 2. May. [18] M. Kumar (2004), Some Remarks on a Remote User Authentcaton Scheme Usng Smart Cards wth Forward Secrecy. IEEE Transactons on Consumer Electroncs, Vol 50. No 2. May. [19] W. C. Ku, and S. M. Chen (2004), Weakness and mprovement of an effcent password based user authentcaton scheme usng smart cards, IEEE Transactons on Consumer Electroncs, Vol. 50, No. 1, pp , Feb. [20] A. K. Awasth and S. Lal (2004), An enhanced remote user authentcaton scheme usng smart cards, IEEE Transactons on Consumer Electroncs, Vol. 50, No. 2, pp , May. [21] M. Kumar (2004), New remote user authentcaton scheme usng smart cards, IEEE Transactons on Consumer Electroncs, Vol. 50, No. 2, pp May.

12 152 Rajaram Ramasamy, Amutha Prabakar Munyand [22] C. L. Hsu (2004), Securty of Chen et al s remote user authentcaton scheme usng smart cards, Computer Standards and Interfaces, Vol. 26, No. 3, pp [23] Eun Jun Yoon, Eun Kyung Ryu, and Kee Young Yoo (2004), Further Improvement of an Effcent password based Remote Authentcaton Scheme usng smart cards, IEEE Transacton on Consumer Electroncs, Vol. 50, No. 2, pp , May. [24] Eun Jun Yoon, Eun Kyung Ryu, and Kee Young Yoo (2004), Effcent remote user authentcaton scheme based on generalzed ElGamal sgnature scheme, IEEE Transacton on Consumer Electroncs, Vol. 50, No. 2, pp , May. [25] C. Fan, Y. Chan, and Z. Zhang (2005), Robust remote authentcaton scheme wth smart cards, Computers and Securty, Vol. 24, No. 8, pp , Nov. [26] C.S. Tsa, Cheng Ch Lee, and Mn Shang Hwang (2006), Password Authentcaton Schemes: Current Status and Key Issues, Internatonal Journal of Network Securty, Vol.3, No.2, PP , Sept [27] X. Tan, Robert W. Zhu, and Duncan S. Wong (2007), Improved Effcent Remote User Authentcaton Schemes, Internatonal Journal of Network Securty, Vol.4, No.2, PP , Mar. [28] Lu Yonglang, Wen Gao, Hongxun Yao and Xnghua Yu (2007), Ellptc Curve Cryptography Based Wreless Authentcaton Protocol, Internatonal Journal of Network Securty, Vol.5, No.3, PP , Nov.

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

An efficient biometrics-based authentication scheme for telecare medicine information systems

An efficient biometrics-based authentication scheme for telecare medicine information systems Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A lightweight password-based authentication protocol using smart card

A lightweight password-based authentication protocol using smart card Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2

More information

The Password Change Phase is Still Insecure

The Password Change Phase is Still Insecure Manoj Kumar: The password change phase change is still insecure 1 The Password Change Phase is Still Insecure Manoj Kumar!"#$ %&''%% E. Mail: yamu_balyan@yahoo.co.in Abstract In 2004, W. C. Ku and S. M.

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol Desgn and Analyss of Authentcated Key Agreement Schemes for Future IoT Applcatons and Sesson Intaton Protocol Thess submtted n partal fulfllment of the requrements for the degree of Master of Scence (By

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

A Flexible Auditing Mechanism for Storages in Cloud Computing

A Flexible Auditing Mechanism for Storages in Cloud Computing ISSN (Onlne : 2319-8753 ISSN (Prnt : 2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March 2014 2014 Internatonal Conference on Innovatons

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Time-Assisted Authentication Protocol

Time-Assisted Authentication Protocol Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak

More information

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Comparative Analysis of Smart Card Authentication Schemes

Comparative Analysis of Smart Card Authentication Schemes IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

A New Security Model for Cross-Realm C2C-PAKE Protocol

A New Security Model for Cross-Realm C2C-PAKE Protocol A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated

More information

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement 1 Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi School of Applied Sciences, Gautam Buddha University, Greater Noida, India sonamdevgan11@gmail.com,

More information

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 5(A), May 2012 pp. 3173 3188 A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.9, September 28 3 A Method for Detectng the Exposure of a Secret ey n ey-insulated Scheme Younggyo Lee and Dongho Won Department

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Appled Engneerng Research ISSN 0973-4562 Volume 12, Number 14 (2017) pp. 4329-4339 Research Inda Publcatons. http://www.rpublcaton.com An Effcent Password-Only Authentcated Three-Party

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 8, August 2012 pp. 5499 5511 A SMART CARD BASED AUTHENTICATION SCHEME FOR

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key Informatca 29 (2005) 343 346 343 On the Securty of a Dgtal Sgnature wth Message Recovery Usng Self-certfed Publc Key Janhong Zhang 1,2, We Zou 1, Dan Chen 3 and Yumn Wang 3 1 Insttuton of Computer Scence

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN. Department of Statistics, Islamia College, Peshawar, Pakistan 2

A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN. Department of Statistics, Islamia College, Peshawar, Pakistan 2 Pa. J. Statst. 5 Vol. 3(4), 353-36 A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN Sajjad Ahmad Khan, Hameed Al, Sadaf Manzoor and Alamgr Department of Statstcs, Islama College,

More information

An RFID Authentication Protocol Suitable for Batch-mode Authentication

An RFID Authentication Protocol Suitable for Batch-mode Authentication An RFID Authentcaton Protocol Sutable for Batch-mode Authentcaton Rahman Mohammad Shahrar Masakazu Sosh Kazumasa Omote Atsuko Myaj Japan Advanced Insttute of Scence and Technology (JAIST) 1-1, Asahda,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information