Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Size: px
Start display at page:

Download "Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments"

Transcription

1 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub Km and Jn Kwa IT onvergence Research Insttute, ungyunwan nversty, Korea Department of Informaton and ompute Engneerng, Aou nversty, Korea smsaa@gmalcom, securty@aouacr Abstract ult-server envronments are that the user regsters the sngle regstraton server and snce the user uses the servce to authentcate on mult-server For ths, many user authentcaton schemes have been proposed for mult-server envronments In 0, L, et al, proposed dynamc ID based remote user authentcaton scheme for mult-server envronments nfortunately, ther scheme s vulnerable to forgery attacs and replay attacs In ths paper, we analye the securty vulnerabltes of L et al s scheme, and propose dynamc ID based remote user authentcaton scheme for mult-server envronments The proposed scheme ensures the safety to varous attacs such as forgery attacs and replay attacs Just le the exstng schemes, our scheme s effcent at usng the hash functon and exclusve-or operaton Keywords: Dynamc ID, utual authentcaton, Password, ult-erver Envronment Introducton ser authentcaton s used to authentcate a legtmate user through an nsecure channel Accordng to the use envronment, user authentcaton can be dvded nto user authentcaton n sngle-server envronments and user authentcaton n mult-server envronments For user authentcaton n mult-server envronments, users can regster at a regstraton center to access a server that s assocated wth the regstraton center any user authentcaton schemes have been proposed for mult-server envronments [ ] In 009, Hsang and hh proposed a secure dynamc-id-based remote user authentcaton scheme for mult-server envronments [7] They clamed that ther scheme s secure and more effcent than Lao and Wang s scheme nfortunately, Lee, et al, ponted out that Hsang and hh s scheme s vulnerable to masquerade attacs and server spoofng attacs, s not easly reparable, and cannot provde mutual authentcaton [8] To solve these problems, Lee, et al, proposed an mprovement to Hsang and hh s scheme Recently, L, et al, showed that Lee, et al s scheme does not provde authentcaton and s vulnerable to forgery attacs and server spoofng attacs [9] In addton, L et al, proposed a scheme based on Lee, et al s scheme However, ther scheme s vulnerable to forgery attacs and replay attacs In ths paper, we analye the securty vulnerabltes of L, et al s dynamc-id-based remote user authentcaton scheme and then we propose a securty enhanced dynamc ID based remote user authentcaton scheme for mult-server envronments Ths study s organed as follows: ecton descrbes a bref revew of L, et al s scheme, and ecton analye the securty vulnerabltes of L et al s scheme In ecton, we propose a securty enhanced dynamc ID based remote user authentcaton scheme for mult-server envronments In ecton, we analye our proposed scheme of the securty requrements and performance Fnally, ecton 6 presents our concluson I: 00-6 IJET opyrght c 0 ER

2 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) Revew of L, et al s cheme Regstraton Phase tep R R : { ID, A } The user selects dentty ID and password PW and computes A h b PW ) where b s a random number generated by sends ID and A to R through a secure channel, tep R After recevng a regstraton message from, R computes h x y ) and h ID h y )) usng x, y, and ID, where x and y are the master secret ey and a secret number selected by R, and ID s the dentty of the server tep R R : { smart card [, D, E, h ), h y )]} R sends h x y ) and h ID h y )) to server through a secure channel and computes B h ID x ), h ID h y ) A ), D h B h x y )), and E and B h x y ) Then R ssues the smart card contanng [, D, E, h ), h y )] delvers t to tep R E, b, h ), h y )] Logn phase through a secure channel enters b nto hs/her smart card, and the smart card contans, D, [ tep L The user nserts hs/her smart card nto the devce and nputs ID and PW Then the smart card computes A h b PW ) and h ID h y ) A ) and checs whether s equal to If they are not equal, the procedure s termnated tep L Otherwse, the smart card generates a random nonce P and computes E h h ID h y )) ), ID A h D ID ), h P ID D ), and h ID h y )) tep L { P, ID,, } : sends P, ID,, and to Verfcaton Phase tep V After recevng the logn request message from, computes h ID h y )), E P h h ID h y )) ), B E h x y ), h B h x y )), A ID h D ID ), and h P ID D ) Then, checs whether s equal to If they are equal, accepts the logn request to tep V Then, generates a random nonce and computes h D A ID ) and A, and sends and to D 8 opyrght c 0 ER

3 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) tep V After recevng the authentcaton message from and h D A ID ), computes Then, checs whether s equal to If they are equal, authentcates ext, computes h D A ID ) and sends to tep V After recevng the mutual authentcaton message from h D A ID ) and checs whether the procedure s termnated Otherwse, authentcaton s completed s equal to authentcates A, computes If they are equal,, and the mutual After the mutual authentcaton, and computes K h D A ID ) for future secure communcaton Vulnerablty of L, et al s cheme Forgery Attac Assume that an attacer Z s a legal user of the system, stolen s smart card, and eavesdrops the communcaton between and Then, Z extracts the parameters [, D, E, b, h ), h y )] stored n h ID h y )) and A ID h D ID ) s smart card and computes tep Z nserts hs/her smart card nto the devce and nputs ID and PW The smart card computes A h b PW ) and h ID h y ) A ) and checs whether s equal to Z generates a random number and computes P E h h ID h y )) ), ID A h D ID ), h P ID D ), and h ID h y )) tep Then, Z sends the forged logn request message { P, ID,, } to server tep After recevng the logn request message P, ID,, } {, computes h ID h y )), E P h h ID h y )) ), B E h x y ), h B h x y )), A ID h D ID ), and h P ID D ), and checs whether s equal to If they are equal, accepts the logn request to Z tep generates a random nonce, computes h D A ID ) and A, and sends and to Z tep After recevng the authentcaton message {, }, Z computes A and h D A ID ) and authentcates because s equal to Then, Z computes h D A ID ) and sends to tep 6 After recevng the mutual authentcaton message { }, computes h D A ID ) and checs whether s equal to If they are equal, D opyrght c 0 ER 9

4 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) authentcates Z Therefore, L, et al s scheme s vulnerable to forgery attac Replay Attac Assume that an attacer Z eavesdrops the communcaton message P, ID,,,,, } between message { P, ID,, } to { and Then, Z sends the prevous logn request tep After recevng the logn request message P, ID,,, } {, computes h ID h y )), E P h h ID h y )) ), B E h x y ), D h B h x y )), A ID h D ID ), and h P ID D ) and checs whether s equal to If they are equal, accepts the logn request to Z tep and generates a random nonce A and computes h D A ID ) tep Then, sends and to Z tep After recevng the authentcaton message, }, Z checs whether { s equal to, where s the same value wth receved from If they are equal, Z authentcates and sends to tep After prevously recevng the mutual authentcaton message { }, computes h D A ID ) and checs whether s equal to If they are equal, authentcates Z Therefore, L, et al s scheme s vulnerable to replay attacs The Proposed cheme In ths secton, we propose securty enhanced dynamc ID based remote user authentcaton scheme for mult-server envronments Regstraton center R selects the master secret ey x and a secret number y, computes h x y ) and h ID h y )), and then shares them wth server though a secure channel Ths scheme conssts of four phases: regstraton phase, logn phase, verfcaton phase, and password change phase otaton Table shows the notaton used descrbe our proposed scheme 0 opyrght c 0 ER

5 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) otaton Descrpton The th user The th server R Regstraton center ID Identty of PW Password of ID Identty of Table otaton of or cheme ID Dynamc ID of x aster secret ey of regstraton center y ecret number of regstraton center h ) A one-way hash functon Exclusve OR operaton oncatenaton operaton A B : X X s transmtted from A to B Regstraton Phase When a user wants to regster wth R, he/she performs the followng steps: tep R R { ID, h ID ), h b PW )} : selects dentty ID and password PW, and computes h ID ) and h b PW ), where b s a random number generated by Then sends h ID ), and h b PW ) to R for regstraton through a secure channel ID, tep R R : { smart card [ A,, D, h ), h y )]} R computes the followngs: A h h ID ) h b PW )) B h x ID ) D E h ID ) h B h x y )) B h x y ) Then, R ssues a smart card contanng [ A, D, E, h ), h y )] and delvers t to through a secure channel tep R enters b nto hs/her smart card and, and the smart card contans [ A, D, E, b, h ), h y )] Fgure Regstraton Phase n our cheme opyrght c 0 ER

6 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) Logn Phase tep L password nserts hs/her smart card nto the devce and nputs dentty ID and PW The smart card computes ID ) h, b PW ) h, and h h ID ) h b PW )) and checs whether A s equal to A If they are not equal, the procedure s termnated Otherwse, proceeds the followng steps tep L The smart card computes the followngs: ID h b PW ) h h ID ) ID ) A h ID h y )) h h ID h y )) ) E h E h ID h y )) ) D h h b PW ) ID D E ), where s a random nonce generated by tep L { ID,,,, } : sends ID,,,, and to Verfcaton Phase tep V E B D computes the followngs: h ID h y )) E h h ID h y )) h x y ) h E h ID ) h y )) h ID ) D h B h x y )) h b PW ) ID h h ID ) ID ) h h b PW ) ID D E ) ) tep V checs whether s equal to If they are equal, generates random nonce Then, computes the followngs: h b PW ) h h b PW ) h ID ) ID ), 6 and sends and 6 to tep V computes the followngs: h b PW ) 6 h h b PW ) h ID ) ID ), and checs whether 6 s equal to 6 If they are equal, authentcates computes 7 h h b PW ) h ID ) ID ) and sends 7 to tep V whether Then, computes h h b PW ) h ID ) ID ) and checs 7 s equal to 7 authentcates 7 If they are not equal, the procedure s termnated Otherwse, and the mutual authentcaton s completed opyrght c 0 ER

7 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) After the mutual authentcaton, and computes K h h b PW ) h ID ) ID ) for future secure communcaton Password hange Phase tep P password Fgure Logn and Verfcaton Phase n our cheme nserts hs/her smart card nto the devce and nputs dentty PW ID and tep P The smart card computes ID ) h b PW )), and checs whether s termnated Otherwse, b h, b PW ) A s equal to h, and A h h ID ) A If they are not equal, the procedure nputs a password PW and a random number tep P The smart card computes ID ) h, h b ), A h h ID PW ) h b )), and D D h ID ) h ID ) tep P Fnally, the smart card replaces A wth A, and D wth D Fgure Password hange Phase n our cheme opyrght c 0 ER

8 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) Analyses ecurty Analyss Table compares the securty of exstng schemes wth our proposed scheme Our scheme has the followng securty propertes: Known-ey ecrecy: If an attacer obtans the sesson ey K n the prevous sesson, he/she cannot compute sesson ey n later sesson As the nature of a one-way hash functon, an attacer cannot obtan h ID ) and h b PW ) n sesson ey Also f an attacer are stolen s smart card or eavesdrops the prevous message, he/she compute the sesson ey from t Forward ecrecy: If an attacer obtans the master secret ey x, he/she cannot compute the sesson ey of the prevous sesson The reason cannot now b, ID, and PW Although an attacer are stolen s smart card or eavesdrops the prevous message, he/she compute the prevous sesson ey wthout nowng b, ID, and PW Replay Attac: Assume that an attacer eavesdrops on the logn request message { ID,,,,,, 6, 7 } for the prevous sesson An attacer s replayng the eavesdroppng message to authentcate, but he/she cannot authentcate from the server Forgery Attac: Because an attacer cannot now b, ID, PW,, h y ), E, and D, he/she cannot compute the logn request message { ID,,,, } Although an attacer are a legtmate user of the system, he/she cannot compute the logn request message because of wthout nowng b, PW, and ID Even though an attacer also obtan user s smart card, he/she cannot compute the logn request message because of wthout nowng ID and PW erver poofng Attac and Regstraton enter poofng Attac: When an attacer masquerade as a legtmate server, he/she cannot obtan h ID ) and h b PW ) because of wthout nowng h x y ) Also because a legtmate server cannot now h y ), he/she cannot masquerade as the other server An attacer cannot masquerade as a legtmate regstraton center because of wthout nowng x and y tolen mart ard Attac: Assume that an attacer obtans s smart card or extracts nformaton of s smart card But an attacer cannot compute the logn request message because of wthout nowng ID and PW Also an attacer cannot obtan ID and PW through the extracted nformaton The reason cannot obtan ID and PW from the extracted nformaton by the nature of a one-way hash functon utual Authentcaton: The user can authentcate the server by checng 6 and the server can authentcate the user by checng 7 opyrght c 0 ER

9 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) Table ecurty Analyss of the ompared chemes Proposed scheme Hsang, et al [7] Lee, et al [8] L, et al [9] Known-ey secrecy Yes Yes Yes Yes Forward secrecy Yes Yes Yes Yes Replay attac Yes Yes Yes o Forgery attac Yes o o o erver spoofng attac and regstraton center Yes o o Yes spoofng attac tolen smart card attac Yes Yes Yes Yes utual authentcaton Yes o o Yes Performance Analyss Table compares the performance of exstng schemes wth our proposed scheme Fgure show the measured results for users performng the logn and verfcaton phase As shown n Fgure, our proposed scheme ncurs less computatonal tme than Hsang, et als scheme and ncurs lttle more computatonal tme as Lee, et als scheme and L, et als scheme However our scheme s more secure aganst varous attacs Table Performance Analyss of the ompared chemes cheme Proposed Hsang, et al Lee, et al L, et al scheme [7] [8] [9] Regstraton ser Th)+T ) Th)+T ) Th)+T ) Th)+T ) Phase R 6TT)+T ) TT)+T ) 6TT)+T ) 6TT)+T ) Logn & ser Th)+7T ) 0Th)+7T ) 0Th)+T ) 9Th)+6T ) Verfcaton erver 8Th)+8T ) 9Th)+6T ) 8Th)+T ) 7Th)+6T ) Phase R Th)+6T ) Total 7Th)+8T ) 8Th)+T ) Th)+8T ) Th)+T ) Fgure Analyss of Tme Accordng To umber of sers opyrght c 0 ER

10 Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0) onclusons In ths paper, we examned the securty vulnerabltes of L, et al s scheme and proposed a securty enhanced dynamc ID based remote user authentcaton scheme for mult-server envronments Our scheme provdes mutual authentcaton and ey establshment between user and server In addton, our scheme has been proved that securty to varous attacs Although our scheme ncurs a lttle more computatonal costs than Lee, et als scheme and L, et als scheme, t s more secure aganst varous attacs than Lee, et als scheme and L, et als scheme Acnowledgments Ths wor was supported by the atonal Research Foundaton of Korea RF) grant funded by the Korea government IP) o RF-0RAAA0088) References [] W Tsaur, A Flexble ser Authentcaton cheme for ult-server Internet ervces, Lecture otes n omputer cence, vol 09, 00), pp 7-8 [] L L, I Ln and Hwang, A remote password authentcaton scheme for multserver archtecture usng neural networs, IEEE Transactons on eural etwors, vol, no 6, 00), pp 98-0 [] I Ln, Hwang and L L, A remote user authentcaton scheme for mult-server archtecture, Future Generaton omputer ystems, vol 9, no, 00), pp - [] W Juang, Effcent mult-server password authentcated ey agreement usng smart cards, IEEE Transactons on onsumer Electroncs, vol 0, no, 00), pp - [] hang and J Lee, An effcent and secure mult-server password authentcaton scheme usng smart cards, Proc Internatonal onference on yberworlds, 00), pp 7- [6] Y Lao and Wang, A secure dynamc ID based remote user authentcaton scheme for mult-server envronment, omputer tandards & Interfaces, vol, no, 009), pp -9 [7] H Hsang and W hh, Improvement of the secure dynamc ID based remote user authentcaton scheme for mult-server envronment, omputer tandards & Interfaces, vol, no 6, 009), pp 8- [8] Lee, T Ln and R hang, A secure dynamc ID based remote user authentcaton scheme for multserver envronment usng smart cards, Expert ystems wth Applcatons, vol 8, no, 0), pp [9] X L, J a, W Wang, Y Xong and J Zhang, A novel smart card and dynamc ID based remote user authentcaton scheme for mult-server envronments, athematcal and omputer odellng, vol 8, no -, 0), pp 8-9 [0] Lee, Y La and L, An Improved ecure Dynamc ID Based Remote ser Authentcaton cheme for ult-erver Envronment, IJIA, vol 6, no, 0), pp 0-09 [] L, Weng and Fan, Two-Factor ser Authentcaton n ult-erver etwors, IJIA, vol 6, no, 0), pp 6-67 [] L, Lee, H e and Yang, A Password and mart ard Based ser Authentcaton echansm for ult-erver Envronments, IJFG, vol, no, 0), pp -6 6 opyrght c 0 ER

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

An efficient biometrics-based authentication scheme for telecare medicine information systems

An efficient biometrics-based authentication scheme for telecare medicine information systems Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol

Research Article Robust and Efficient Authentication Scheme for Session Initiation Protocol Mathematcal Problems n Engneerng Volume 205, Artcle ID 894549, 9 pages http://dx.do.org/0.55/205/894549 Research Artcle Robust and Effcent Authentcaton Scheme for Sesson Intaton Protocol Yanrong Lu,,2

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

A lightweight password-based authentication protocol using smart card

A lightweight password-based authentication protocol using smart card Receved: 12 February 2017 Revsed: 26 March 2017 Accepted: 17 Aprl 2017 DOI: 10.1002/dac.3336 RESEARCH ARTICLE A lghtweght password-based authentcaton protocol usng smart card Chenyu Wang 1 Dng Wang 2 Guoa

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key Informatca 29 (2005) 343 346 343 On the Securty of a Dgtal Sgnature wth Message Recovery Usng Self-certfed Publc Key Janhong Zhang 1,2, We Zou 1, Dan Chen 3 and Yumn Wang 3 1 Insttuton of Computer Scence

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha

APRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha JAIST Repos https://dspace.j Ttle APRAP: Another Prvacy Preservng RF Authentcaton Protocol Author(s)Myaj, Atsuko; Rahman, Mohammad Sha Ctaton 2010 6th IEEE Workshop on Secure Net Protocols (NPSec): 13-18

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol

An Efficient Password-Only Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Appled Engneerng Research ISSN 0973-4562 Volume 12, Number 14 (2017) pp. 4329-4339 Research Inda Publcatons. http://www.rpublcaton.com An Effcent Password-Only Authentcated Three-Party

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal

More information

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN 634 JOURNL OF COMMUNICTIONS, VOL. 7, NO. 8, UGUST 202 Trust-based Mutual uthentcaton for Bootstrappng n 6LoWPN Hong Yu College of Computer Scence and Technology, Bejng Unversty of Technology, Bejng 0024,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;

More information

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol

Design and Analysis of Authenticated Key Agreement Schemes for Future IoT Applications and Session Initiation Protocol Desgn and Analyss of Authentcated Key Agreement Schemes for Future IoT Applcatons and Sesson Intaton Protocol Thess submtted n partal fulfllment of the requrements for the degree of Master of Scence (By

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Time-Assisted Authentication Protocol

Time-Assisted Authentication Protocol Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.9, September 28 3 A Method for Detectng the Exposure of a Secret ey n ey-insulated Scheme Younggyo Lee and Dongho Won Department

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Flexible Auditing Mechanism for Storages in Cloud Computing

A Flexible Auditing Mechanism for Storages in Cloud Computing ISSN (Onlne : 2319-8753 ISSN (Prnt : 2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March 2014 2014 Internatonal Conference on Innovatons

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks Securng Qualty-of-Servce Route Dscovery n On-Demand Routng for Ad Hoc Networks Yh-Chun Hu UC Berkeley yhchun@cs.cmu.edu Davd B. Johnson Rce Unversty dbj@cs.rce.edu ABSTRACT An ad hoc network s a collecton

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Massive XML Data Mining in Cloud Computing Environment

Massive XML Data Mining in Cloud Computing Environment JOURNAL OF MULTIMEDIA, VOL. 9, NO. 8, AUGUST 2014 1011 Massve XML Data Mnng n Cloud Computng Envronment Zhao L Department of Computer Scence, Xnyang College of Agrculture and Forestry, Xnyang, Chna Emal:

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.12 No.9, September 2012 39 Hybrd Job Schedulng Mechansm Usng a Backfll-based Mult-queue Strategy n Dstrbuted Grd Computng Ken Park

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Secure Communication in Digital TV Broadcasting

Secure Communication in Digital TV Broadcasting IJN International Journal of omputer cience and Network ecurity, VOL.8 No.9, eptember 2008 ecure ommunication in Digital TV Broadcasting Hyo Kim Division of Digital Media, Ajou University, Korea ummary

More information

Loop-Free Multipath Routing Using Generalized Diffusing Computations

Loop-Free Multipath Routing Using Generalized Diffusing Computations 1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol July 2016, Volume 3, Number 3 (pp. 163 174) http://www.jcomsec.org Journal of Computng and Securty Securty Analyss of an EPC Class-1 Generaton-2 Complant RFID Authentcaton Protocol Feredoun Morad a,, Hamd

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Area Efficient Self Timed Adders For Low Power Applications in VLSI

Area Efficient Self Timed Adders For Low Power Applications in VLSI ISSN(Onlne): 2319-8753 ISSN (Prnt) :2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology (An ISO 3297: 2007 Certfed Organzaton) Area Effcent Self Tmed Adders For Low

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shh-Chen Chou Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Tawan ABSTRACT Informaton flow control (IFC) s

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Real-time Network Attack Intention Recognition Algorithm

Real-time Network Attack Intention Recognition Algorithm Internatonal Journal of Securty and Its Applcatons, pp.51-62 http://dx.do.org/10.14257/sa.2016.10.4.06 Real-tme Network Attack Intenton Recognton Algorthm Qu Hu and Wang Kun Zhengzhou Insttute of Informaton

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud

Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud 1 Protectng Your Rght: Verfable Attrbute-based Keyword Search wth Fne-graned Owner-enforced Search Authorzaton n the Cloud Wenha Sun, Student Member, IEEE, Shucheng Yu, Member, IEEE, Wenjng Lou, Senor

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Dynamic Node Join Algorithm with Rate-Distortion for P2P Live Multipath Networks

Dynamic Node Join Algorithm with Rate-Distortion for P2P Live Multipath Networks Dynamc Node Jon Algorthm wth Rate-Dstorton for P2P Lve Multpath Networs Shyh-Chang Lu 1,Tsung-Hung Chen 1, Tsang-Hung Wu 1, Peter P.S. Wang 2 1 Dept. of Informaton Eng, 2 Dept. of Computer Scence and Informaton

More information

Simple Security Denitions for and Constructions of 0-RTT Key Exchange

Simple Security Denitions for and Constructions of 0-RTT Key Exchange Smple Securty Dentons for and Constructons of 0-RTT Key Exchange Brtta Hale 1 and Tbor Jager 2 and Sebastan Lauer 3 and Jörg Schwenk 3 1 NTNU, Norwegan Unversty of Scence and Technology, Trondhem brtta.hale@ntnu.no

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

DAQ-Middleware: Data Acquisition Middleware based on Internet of Things

DAQ-Middleware: Data Acquisition Middleware based on Internet of Things DAQ-Mddleware: Data Acquston Mddleware based on Internet of Thngs Zhjn Qu, Zhongwen Guo, Shua Guo, Yngjan Lu and Yu Wang Ocean Unversty of Chna, Qngdao, Shandong, Chna Unversty of North Carolna at Charlotte,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information