Security Issues in Smart Card Authentication Scheme
|
|
- Clement O’Connor’
- 5 years ago
- Views:
Transcription
1 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ecurty Issues n mrt Crd Authentcton cheme Rv ngh Pppl, Jdhr C. D., nd hshkl Tpsw Abstrct To secure normton rom unuthorzed ccess, vrous uthentcton schemes hve been deployed. Among these, pssword bsed uthentcton schemes usng smrt crd re wdely used or vrous pplctons such s remote user logn, onlne bnkng, vercton, ccess control nd e-commerce. It provdes mutul uthentcton between user nd server. Ths rtcle portrys securty requrements nd possble ttcks or smrt crd bsed pssword uthentcton scheme. In ddton, vrous solutons or derent ttcks re lso dscussed. Index Terms Authentcton, pssword, securty, smrt crd. I. INTRODCTION Wth the rpd growth o computer networks, more nd more users ccess the remote server s servce n dstrbuted computng envronment. Due to the st development o Internet nd wreless communctons, mny ctvtes lke onlne-shoppng, onlne bnkng, onlne votng re conducted over t. Electronc trnsctons crred out over the network pltorm re gnng populrty nd t s wdely ccepted n the Internet computng world. A number o orgnztons dong busness n the trdtonl wy re extendng themselves to do busness over the Internet. To protect dt durng ther trnsmsson over nsecure chnnel, dequte network securty mesures re needed to resst potentl ttcks rom evesdroppng, unuthorzed retrevl nd ntended modcton, etc. For every busness trnscton uthentcton s requred. It ensures the orgn o messge or electronc document correctly dented wth n ssurnce tht the dentty s not ke. It s the prmry requrement beore the user ccesses the server over nsecure chnnel s t prevents unuthorzed ccess. Vrous uthentcton schemes hve been proposed to secure the normton or resources rom unuthorzed user [], []. One mong them s pssword uthentcton scheme. In conventonl pssword uthentcton schemes, server mntns pssword tble or vercton tble whch contns user denter nd pssword or ll the regstered users. It s used to uthentcte the legtmte user. Every user hs n nd. Whenever user wnts to ccess resources rom server, he or she submts nd to pss the uthentcton phse. The server veres the correspondng to the rom vercton tble. I the submtted pssword mtches the one stored n the vercton Mnuscrpt receved Februry 6, 0; revsed Mrch 7, 0. R.. Pppl,. Tpsw re wth ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor-47400, Ind e-ml: rv@ tm.c.n, stpsw@ tm.c.n. Jdhr C. D. s wth Deence Insttute o Advnce Technology, Pune-405, Ind e-ml: jdhrcd@ dt.c.n. tble then server uthentctes the user. However, there s thret n such process; n ntruder cn mpersonte legl user by nterceptng the messges rom the network nd logn to the server lter usng the ntercepted normton. Even the s encrypted durng communcton, such n mpersonton ttck s stll possble. In ddton, n ntruder brek nto the server; the contents o the vercton tble cn be esly moded or stolen. Mjor downsde o ths scheme s securng the vercton tble whch stores the pssword n pln text orm. One o the solutons to cope up wth ths problem s to encode the pssword usng hsh uncton nd store the resultnt test pttern n vercton tble []. Another lternte soluton s to store the pssword n encrypted orm whch cnnot be esly derved rom n ttcker even ttcker knows the content o the vercton tble. However, t consumes more memory spce to store the encrypted pssword. In both the pproches, sze o the vercton tble s drectly proportonl to the number o users. In other words, sze o the vercton tble ncreses s the number o users ncreses. Mngement o such huge vercton tble ncreses burden to the server. In ddton, they re not secure snce n ttcker cn mody the contents o the vercton tble whch result the entre system to brek down. To resst ll possble ttcks on the vercton tble, smrt crd bsed pssword uthentcton scheme hs been proposed. In ths scheme, server does not mntn vercton tble to uthentcte the legtmte user. The rest o the pper s orgnzed s ollows. ecton II descrbes vrous possble ttcks on smrt crd uthentcton scheme wth solutons or them. ecton III explores the securty requrements. Fnlly, secton IV concludes the pper. II. POIBLE ATTACK ON MART CARD ATHENTICATION CHEME The remote user uthentcton scheme s used to uthentcte the legtmcy o the remote users over n nsecure chnnel. nce lst decde mny elegnt remote user uthentcton schemes usng smrt crd hve been proposed [4], [6], [8-0], [-7], [], [], [4-5]. mrt crd uthentcton scheme s usully composed o three phses nmely; regstrton phse, logn phse nd uthentcton phse. The regstrton phse s nvoked only once when new user regsters n the server. pon recevng regstrton request over secure chnnel, server ssues smrt crd to user by storng the computed prmeters nto smrt crd memory. The logn phse nd uthentcton phse re nvoked when user wnts to logn the server. pon recevng the logn request, server checks the vldty o the logn request to uthentcte the user. The nottons used throughout ths 06
2 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 rtcle re dened n Tble I. Nottons X TABLE I: NOTATION ED IN THI PAPER Ther Menng Legtmte user Identer o Pssword o ecret key o the server Adversry Identer o Pssword o Pssword guessed by New pssword entered durng pssword chnge phse T Tmestmp t whch logn request s creted T T T 4 Tmestmp t whch server receves the logn request Tmestmp t whch server sends messge bck to Tmestmp t whch receves messge rom server Current tmestmp o s system T T Predetermned tme ntervl o trnsmsson dely r, b Rndom numbers Prmtve element p, q Prme numbers hdowed dentty h ecure one wy hsh uncton Btwse Exclusve-OR operton E ymmetrc encrypton usng key x x D x ymmetrc decrypton usng key x C K Functon to generte check dgt Re d One-wy shdow uncton mntned t the server A remote user uthentcton scheme bsed on ElGml s cryptosystem hs been proposed [4]. It conssts o regstrton phse, logn phse nd uthentcton phse. In the regstrton phse, submts to the server. pon recevng the regstrton request, server computes X mod p nd ssues smrt crd to by storng h, p nto smrt crd memory. The s delvered to through secure chnnel. In the logn phse, nserts the smrt crd to the crd reder nd keys n nd. Ater enterng the credentls, the crd reder genertes rndom number r, computes C r mod p, t h T mod p, M t r mod p, C M mod p nd sends the logn request, C, C, T to the server. In the uthentcton phse, upon recevng the logn request, server rst checks the vldty o to ccept/reject the logn request. I t s ncorrect, the request s rejected else t s consdered or next step o check. The vldty o tme ntervl between T nd T s computed.e., checks T T T. I true, server rejects the logn request, else, X test out whetherc C h T mod p holds or not n order to uthentcte. It s clmed tht the scheme does not mntn ny pssword or vercton tble nd secure gnst reply ttck. However, t s vulnerble to mpersonton ttck [5]. A. Impersonton Attck It s dened s the ttck n whch ttempts to mody the ntercepted messges to msquerde the legl nd logn to the server. submts to the server to msquerde s legl [5]. The server ssues nd smrt crd to. pon recevng, computes vld pr o, o legtmte user wthout knowng server secret key,.e. X. mod p X mod p mod p Further mprovement hs been suggested [6] whch s lso cryptnlyzed [7]. To wthstnd mpersonton ttck, moded scheme hs lso been proposed n whch logn request prmeters re computed rom nsted o [8]. Addtonl mprovement hs been gven n whch computed nsted o, ts logn request contents re C, C, C, T [9], where C C K. A remote user uthentcton scheme usng one-wy hsh uncton hs been proposed [0]. Its mjor drwbcks re pssword s ssued by the server whch results not to choose nd chnge the pssword reely. no mutul uthentcton. In ddton, t s ponted out tht the scheme s vulnerble to olne nd onlne pssword guessng ttcks []. B. Olne Pssword Guessng Attck In olne pssword guessng ttck, s ttempts to determne whether ech o the guessed psswords s correct or not rom the ntercepted messges trnsmtted between nd the server. cn esly very whether guessed pssword s correct or not s pssword s wek. As per the scheme [], ntercepts the logn request, T, C where C h T, rndomly guesses nd checks whether C h T holds or not. I equl, the guessed s vld one. sng, s ble to mpersonte the legtmte to logn the server. The other possble ttck s onlne pssword guessng ttck. C. Onlne Pssword Guessng Attck In ths, tres to use guessed psswords tertvely to pss the uthentcton phse onlne. As dened n [], rndomly guesses nd cretes orged logn request, T, C where C h T P. I the logn request s ccepted by the server, vld s W successully mpersontes to logn the server nd the guessed pssword s pssword. Ths ttck cn be restrcted by lmtng 07
3 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 the number o ttempts. To overcome these lmttons, remote user uthentcton scheme usng one-wy hsh uncton hs been proposed []. It s clmed tht the scheme does not requre ny pssword or vercton tble n the server nd legl user cn choose pssword wthout the help o server. Moreover, t provdes mutul uthentcton between user nd server. However, t s ponted out tht scheme s vulnerble to prllel sesson ttck []. D. Prllel esson Attck It s dened s the ttck n whch evesdrops the messges trnsmtted between nd server nd sends t bck s vld logn request to the server. As mentoned n [], computes C h h T to crete the logn request, C, T whch s trnsmtted to server. In order to provde mutul uthentcton, server sends the response messge T, C to n whch C h C T h h T. ntercepts the messges exchnged between nd server to msquerde s legl to strt new sesson. sends, C, T bck to server where T T nd C C. Ths messge psses the uthentcton phse snce C C h C T h h whch T results to logn nto the server. Moded scheme hs been proposed to overcome the prllel sesson ttck []. However, stll t s vulnerble to mpersonton ttck nd relecton ttck; does not provde user nonymty [4]. E. Relecton Attck In relecton ttck, evesdrops logn request durng trnsmsson between nd server nd sends t or moded verson o the messge bck to to msquerde s the legtmte server. As stted n [4], ntercepts the logn request, C, T trnsmtted between nd the server, where C h h nd sends bck T T, C to mmedtely to mpersonte the server where T nd C h C h h h. pon T T recevng the messge T, C, computes h h C T h h h. nce the T computed result equls C, beleves tht the messge s sent by the server. The relecton nd prllel sesson ttcks re possble due to the trnsmsson o messges wth smlr structure. To overcome these weknesses, urther mprovement hs lso been proposed [4]. However, the scheme does not solve the tme synchronzton problem nd server mntns n extr dtbse or ech user. To wthstnd nsder ttck nd relecton ttck, n mprovement over the scheme [] hs been suggested [5]. F. Insder Attck Durng the regstrton phse, s pssword s reveled to server over secure chnnel. An nsder o server obtns s pssword to mpersonte the legl nd ccess other servers sme pssword s used to ccess other servers. In ddton, the scheme [5] llows users to chnge ther pssword reely through pssword chnge phse. The pssword chnge phse s nvoked whenever wnts to chnge old pssword wth new pssword. nserts the smrt crd to the reder, keys nd nd requests to chnge the pssword by enterng new. mrt crd computes R R h b h b whch yelds h E h b where E n, R h E h b, n denotes the number o tmes re-regsters to server. mrt crd replces R wth R. nce the pssword chnge operton s perormed t the crd reder sde, there s no need to nterct wth the server. It s proved tht the scheme s wek gnst prllel sesson ttck nd hs nsecure pssword chnge phse. Further mprovement hs lso been suggested [6]. Nevertheless, the scheme s vulnerble to guessng ttck, Denl-o-ervce ttck nd orgery ttck [7]. To overcome these drwbcks, n mproved scheme hs been proposed whch s lso cryptnlyzed [8]. Further, t s ound tht the scheme s nsecure gnst guessng ttck, dennng-scco ttck nd hs ndequcy to provde perect orwrd secrecy. G. Attck on Perect Forwrd ecrecy Perect orwrd secrecy ssures tht even one long term key s compromsed, t does not revel ny sesson keys used beore. esson key s C h s per [8]. I gets server secret key X nd evesdrops the logn request, C, C,, where T C P h C h h C hp h T esly computes P h nd C P C h whch results to obtn the sesson key. Another possble ttck s dennng scco ttck. H. Dennng cco Attck It s n cton where obtns sesson key rom n evesdropped sesson nd uses the sme key ether to mpersonte the legtmte or mount dctonry ttck on s pssword. As per [8], gets the sesson key C h r nd obtns s secret normton s b ollows C C P h h C C P C C h pon obtnng s secret vlue h, cn mpersonte the legtmte. Consder the cse, computes C P h r b, C h h r P b T where r,b re two rndom numbers chosen by nd T 08
4 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 denotes current tmestmp o s system. prepres orged logn request M, C, C, T to mpersonte. Another possble ttck s smrt crd stolen ttck. I. mrt Crd tolen Attck When smrt crd s lost or stolen, unuthorzed user who obtns the smrt crd cn guess the pssword o usng pssword guessng ttcks or mpersonte vld to logn nto the server. who stels the smrt crd cn obtn the secret normton stored n the stolen smrt crd by montorng the consumpton o power [9] or by nlyzng the reveled normton [0]., who stels smrt crd, knows R, V, b, h, h nd [8]. sng these prmeters, k derves rom V hp h b wthout ny knowledge o server secret key X s by checkng V hr h b h b or not where s the guessed pssword V h h b P I holds, pproch, R h b W P Rh b P h s the correct pssword o. In ths derves h nd h b to s mpersonte. All the schemes dscussed so r do not solve the tme synchronzton problem. Nonce-bsed scheme [] overcomes the tme synchronzton problem. It nherts ll the prevous dvntges wth ddtonl eture such s sesson key generton greed between nd server. However, securty lws n ths scheme re: t s susceptble to nsder ttck. s not llowed to chnge the pssword reely. t uses symmetrc encrypton nd decrypton whch s necent or low computtonl powered smrt crds. Another nonce-bsed scheme hs been proposed [] to solve the serous tme synchronzton problem. It tkes over ll the prevous dvntges wth n ddtonl chrcterstc tht t uses one wy hsh uncton to reduce the computtonl cost. Nevertheless, t s vulnerble to mpersonton ttck, olne pssword guessng ttck, Denl-o-ervce ttck nd mn-n-the-mddle ttck []. J. Mn-n-the-Mddle Attck The mn-n-the-mddle ttck s orm o ctve evesdroppng n whch sts between the server nd by mkng ndependent connectons between them. The messges whch re exchnged between nd server re ntercepted by wthout the knowledge o nd server. As per the scheme [], ssume tht N modq nd W N modq sent by server nd respectvely. Durng the trnsmsson, ntercepts both the messges nd sends the moded/new messge to both o them. hs two sesson keys, one s used between nd.e., K se N Ns N modq modq nd the other s used between server nd.e., N N N Keu W mod q mod q. Hence, ntercepts the communcton exchnged between nd the server. In ddton, cn reply moded/new messge to both o them. Another scheme whch ressts mpersonton ttck, smrt crd loss ttck nd nsder ttck hs been proposed [4]. In ths scheme, tmestmp T s used n the logn phse to resst reply ttck. However, t ls to wthstnd ths ttck. K. Reply Attck The reply ttck s one n whch n ttcker re-submts the ntercepted logn request to mpersonte the genune user. The logn request contents re, C, r, k, y, T s per [4]. Durng the trnsmsson o logn request exchnged between nd server, cptures t nd resends the request by chngng the vlue o T. pon recevng the request, server nds the derence between T nd T to check the reshness o receved request.e., T T T. I t holds, s successul n n ttempt o mpersonton. Another possble ttck s Denl-o-ervce ttck. L. Denl-o-ervce Attck The Denl-o-ervce ttck prevents/nhbts the use o network resources nd communcton cltes. For exmple, sends nvld logn requests contnuously to mke the server busy. The schemes [], [], [5], [6], [], [], [4], [7], [0-5] re vulnerble to ths ttck. nserts ts own smrt crd nto the crd reder nd keys n nvld nd. The crd reder perorms the computton to crete logn request nd sends t to the server. contnuously does the sme thng to overlod the server whch results to restrn the server ccessblty or the other vld users. An bsed scheme usng RA cryptosystem hs been proposed [5]. However, t exhbts mpersonton ttck nd urther mprovement hs lso been suggested [6] whch nherts ll the merts o the prevous scheme wth n dded eture o mutul uthentcton. A user rendly uthentcton scheme bsed on one wy hsh uncton hs been proposed [7]. However, t s ponted out tht the scheme s vulnerble to mpersonton ttck. To overcome ths ttck, urther mprovement hs lso been proposed [8]. Moreover, t s proved tht the scheme s nsecure gnst guessng ttck nd orgery ttck. To overcome these securty weknesses, n mproved scheme hs lso been proposed [9]. Though, t s nlyzed tht scheme s vulnerble to relecton ttck nd prllel sesson ttck. Ths s due to the symmetrc structure o communcton messges exchnged between user nd server. A dynmc -bsed remote user uthentcton scheme usng one wy hsh uncton hs been proposed [0] nd clmed tht the scheme llows the users to choose nd chnge ther psswords reely, secure gnst -thet, nd ressts reply ttck, orgery ttck, guessng ttck, nsder 09
5 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ttck nd stolen verer ttck. However, t s proved tht the scheme s nsecure gnst guessng ttck nd does not provde mutul uthentcton []. To deet these securty lws, new scheme hs been suggested. Nevertheless, t s susceptble to mpersonton ttck. Further, mproved scheme hs lso been proposed []. Its mjor drwbcks re t does not provde secure pssword chnge phse. b user needs to remember the secret number Y. On the other hnd, t s ponted out tht the scheme [0] does not provde mutul uthentcton nd s pssword ndependent. To overcome these lmttons, n enhnced scheme hs been proposed []. It s shown tht the scheme s exposed to nsder ttck, does not provde users to choose the pssword, sesson key estblshment nd does not preserve user nonymty [4]. An mproved scheme hs lso been proposed to overcome these lws. Mjor drwbcks n the mproved scheme re server mntns n extr tble or the vlue o N correspondng to every user, where N denotes the number o tmes user regsters t the server. b wrong pssword detecton s slow. mrt crd uthentcton scheme bsed on one wy hsh uncton nd symmetrc key cryptogrphy hs been proposed [5]. It s clmed tht the scheme ressts mpersonton ttck, prllel sesson ttck, reply ttck nd modcton ttck. In ddton, t provdes mutul uthentcton nd genertes shred sesson key. However, t s ponted out tht the scheme ls to resst Denl-o-ervce ttck nd provde perect orwrd secrecy [6]. III. ECRITY REQIREMENT FOR MART CARD ATHENTICATION CHEME Ths secton descrbes mjor securty requrements or n del smrt crd uthentcton scheme. To consder ny uthentcton scheme s secure nd ecent, t hs to encompss the ollowng etures: erver need not to mntn pssword or vercton tble to uthentcte the vld user. ser nds dculty to remember the pssword t s ssued by the server. Hence, scheme s needed to llow the users to choose nd chnge ther pssword reely t ny tme wthout ny ntercton rom the server. ecure trnsmsson o pssword s desrble t the tme o regstrton. The pssword s not embedded n logn request or n other words t s not reveled to the server n pln text s prt o logn request. 4 The computtonl worklod o the smrt crd needs to be low. Even though the cpbltes o smrt crds re ncresng, they re stll lmted. Intense computtons need to be voded both t the crd reder sde s well s server sde. 5 Attcks such s Impersonton ttck, Prllel sesson ttck, relecton ttck, Onlne Pssword Guessng ttck, Olne Pssword Guessng ttck, Reply ttck, tolen Verer ttck, ttck on Perect Forwrd ecrecy, mrt Crd Loss ttck, Denl-o-ervce ttck, Dennng cco ttck, Mn-n-the-Mddle ttck must be wthstnd by the uthentcton scheme. 6 I n dversry tres to ccess the resources rom the server by enterng wrong pssword, t hs to detect quckly. 7 In tmestmp-bsed uthentcton schemes, the clock o the server nd ll user systems re to be synchronzed. In ddton, trnsmsson dely o the logn request needs to be lmted. However, t s necent rom the prctcl pont o vew. To overcome clock synchronzton problem nd the lmtton o trnsmsson dely tme, some o the schemes use nonce n plce o tmestmps. In order to check the reshness o the nonce, server needs to mntn n older nonce vlue or short spn o tme. 8 It s necessry tht not only server veres the legl users, but users lso very the legl server to cheve two wy uthentcton. Every uthentcton scheme must support mutul uthentcton. 9 esson keys re used to secure the communcton between user nd server tll the end o the sesson. Every smrt crd uthentcton scheme needs to support sesson key generton. 0 It s better tht the user s dentty s nonymous. It s necessry tht n ecent remote user uthentcton scheme preserves strong nonymty not only rom the evesdropper but lso rom the server. IV. CONCLION ecurty nd ecency re the mn ctors or ny uthentcton scheme rom the user s perspectve. In vew o the ct, severl smrt crd bsed remote user uthentcton schemes hve been proposed. Ths pper descrbes vrous possble ttcks nd prmry requrements to consder ny smrt crd bsed uthentcton scheme s secure nd ecent or prctcl pplctons. These ssues re helpul to desgn nd develop secure nd ecent smrt crd uthentcton scheme. ACKNOWLEDGMENT The uthors would lke to thnk ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind or provdng the cdemc support. REFERENCE [] R. M. Needhm nd M. D. chroeder, sng encrypton or uthentcton n lrge networks o computers, Communctons o the ACM, vol., no., pp , 978. [] K.. Booth, Authentcton o sgntures usng publc key encrypton, Communctons o the ACM, vol. 4, no., pp , 98. [] L. Lmport, Pssword uthentcton wth nsecure communcton, Communctons o the ACM, vol. 4, no., pp , 98. [4] M.. Hwng nd L. H. L, A new remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no., pp. 8-0, 000. [5] C. K. Chn nd L. M. Cheng, Cryptnlyss o remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no. 4, pp , 000. [6] J. J. hen, C. W. Ln, nd M.. Hwng, A moded remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no., pp , 00. [7] K. C. Leung, L. M. Cheng, A.. Fong, nd C. K. Chn, Cryptnlyss o moded remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no. 4, pp. 4-45, 00. [8] A. K. Awsth nd. Ll, An enhnced remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp ,
6 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 [9] M. Kumr, New remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp , 004. [0] H. M. un, An ecent remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no. 4, pp , 000. [] C. L. Hsu, ecurty o two remote user uthentcton schemes usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no. 4, pp , 00. [] H. Y. Chen, J. K. Jn, nd Y. M. Tseng, An ecent nd prctcl soluton to remote uthentcton: smrt crd, Computers nd ecurty, vol., no. 4, pp. 7-75, 00. []. W. Lee, H.. Km, nd K. Y. Yoo, Improvement o Chen et l.'s remote user uthentcton scheme usng smrt crds, Computer tndrds nd Interces, vol. 7, no., pp. 8-8, 005. [4]. K. ood, A. K. rje, nd K. ngh, ecure dynmc dentty-bsed remote user uthentcton scheme, n Proc. 6 th Interntonl Conerence on Dstrbuted Computng nd Internet Technologes, Bhubneswr, Ind, 00, pp [5] W. C. Ku nd. M. Chen, Weknesses nd mprovements o n ecent pssword bsed remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp , 004. [6] E. J. Yoon, E. K. Ryu, nd K. Y. Yoo, Further mprovement o n ecent pssword bsed remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp. 6-64, 004. [7] X. M. Wng, W. F. Zhng, J.. Zhng, nd M. K. Khn, Cryptnlyss nd mprovement on two ecent remote user uthentcton scheme usng smrt crds, Computer tndrds nd Interces, vol. 9, no. 5, pp , 007. [8] E. J. Yoon, E. J. Lee, nd K. Y. Yoo, Cryptnlyss o Wng et l. s remote user uthentcton scheme usng smrt crds, n Proc. 5 th Interntonl Conerence on Inormton Technology: New Genertons, Ls Vegs, Nevd, A, 008, pp [9] P. Kocher, J. Je, nd B. Jun, Derent power nlyss, n Proc. Advnces n Cryptology, Clorn, A, 999, pp [0] T.. Messerges, E. A. Dbbsh, nd R. H. lon, Exmnng smrt crd securty under the thret o power nlyss ttcks, IEEE Trnsctons on Computers, vol. 5, no. 5, pp , 00. [] W.. Jung, Ecent pssword uthentcted key greement usng smrt crds, Computers nd ecurty, vol., no., pp. 67-7, 004. [] H. T. Lw, J. F. Ln, nd W. C. Wu, An ecent nd complete remote user uthentcton scheme usng smrt crds, Mthemtcl nd Computer Modellng, vol. 44, no. -, pp. -8, 006. [] K. Hung, Q. Ou, X. Wu, nd Y. ong, Cryptnlyss o remote user uthentcton scheme usng smrt crds, n Proc. 5 th Interntonl Conerence on Wreless Communctons, Networkng nd Moble Computng, Bejng, Chn, 009, pp. -4. [4] Z. H. hen, A new moded remote user uthentcton scheme usng smrt crds, Appled Mthemtcs-A Journl o Chnese nverstes, vol., no., pp. 7-76, 008. [5] W. H. Yng nd. P. heh, Pssword uthentcton schemes wth smrt crds, Computers nd ecurty, vol. 8, no. 8, pp. 77-7, 999. [6] J. J. hen, C. W. Ln, nd M.. Hwng, ecurty enhncement or the tmestmp-bsed pssword uthentcton scheme usng smrt crds, Computers nd ecurty, vol., no. 7, pp , 00. [7]. T. Wu nd B. C. Cheu, A user rendly remote uthentcton scheme wth smrt crds, Computers nd ecurty, vol., no. 6, pp , 00. [8] N. Y. Lee nd Y. C. Chu, Improved remote uthentcton scheme wth smrt crd, Computer tndrds nd Interces, vol. 7, no., pp , 005. [9] M. Holbl nd T. Welzer, Cryptnlyss nd mprovement o n mproved remote uthentcton scheme wth smrt crd, n Proc. rd Interntonl Conerence on Avlblty, Relblty nd ecurty, Brcelon, pn, 008, pp [0] M. L. Ds, A. xen, nd V. P. Gult, A dynmc -bsed remote user uthentcton scheme, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp. 69-6, 004. [] I. E. Lo, C. C. Lee, nd M.. Hwng, ecurty enhncement or dynmc -bsed remote user uthentcton scheme, In Proc. Interntonl Conerence on Next Generton Web ervces Prctces, eoul, Kore, 005, pp [] Q. Xe, J. L. Wng, D. R. Chen, nd X. Y. Yu, A novel user uthentcton scheme usng smrt crds, n Proc. Interntonl Conerence on Computer cence nd otwre Engneerng, Wuhn, Hube, Chn, 008, pp [] Y. Y. Wng, J. Y. Lu, F. X. Xo, nd J. Dn, A more ecent nd secure dynmc -bsed remote user uthentcton scheme, Computer Communctons, vol., no. 4, pp , 009. [4] M. K. Khn, Enhncng the securty o More ecent nd secure dynmc -bsed remote user uthentcton scheme, n Proc. rd Interntonl Conerence on Network nd ystem ecurty, Queenslnd, Austrl, 009, pp [5] R. ong, Advnced smrt crd bsed pssword uthentcton protocol, Computer tndrds nd Interces, vol., no. 5-6, pp. -5, 00. [6] R.. Pppl, Jdhr, C. D., nd. Tpsw, Comments on symmetrc key encrypton bsed smrt crd uthentcton scheme, n Proc. nd Interntonl Conerence on Computer Technology nd Development, Cro, Egypt, 00, pp Rv ngh Pppl hs receved B.E. Computer cence nd Engneerng rom J. E. C., Jblpur, Ind n 005 nd M.Tech. Computer cence nd Engneerng rom. A. T. I., Vdsh, Ind n 008. At present, he s pursung Full Tme Ph.D. n Inormton Technology t ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind. Hs reserch res o nterest nclude Cryptogrphy, Network ecurty Authentcton, Key Mngement, Dgtl gnture nd Hsh Functon. Jdhr C. D. hs obtned Ph.D. Computer cence nd Engneerng rom Ntonl Insttute o Technology, Truchrppll-5, Ind. He s presently workng s Assstnt Proessor t Deence Insttute o Advnce Technology, Pune, Ind. Hs prmry reserch re ncludes Network ecurty Authentcton, Key Mngement, Dgtl gnture nd Hsh Functon, ecurty ssues n Cloud Computng, ecurty Issues n Voce-over-IP, Cyber ecurty, Computer Networks, Adhoc Networks nd Cryptogrphy nd Ellptc Curve Cryptogrphy. hshkl Tpsw hs obtned her Ph.D. Computer Engneerng rom Indn Insttute o Technology, Roorkee, Ind n 00, M.Tech Computer cence rom nversty o Delh, Ind n 99 nd B.E. Electroncs Engneerng rom Jwj nversty, Gwlor, Ind n 986. he s Proessor n Inormton Technology Deprtment, ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind. Her prmry reserch res o nterest re Artcl Intellgence, Neurl Networks, Fuzzy Logc, Dgtl Imge Processng, Computer Networks, Moble Networks, Adhoc Networks, Network ecurty etc.
Semi-quantum private comparison protocol under an. almost-dishonest third party
Sem-quntum prvte comprson protocol under n lmost-dshonest thrd prty Wen-Hn Chou Tzonelh Hwng nd Jun Gu Deprtment of Computer Scence nd nformton Engneerng Ntonl Cheng Kung Unversty No. Unversty Rd. Tnn
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationEnergy Efficient Session Key Establishment in Wireless Sensor Networks
Energy Effcent Sesson ey Estlshment n Wreless Sensor Networks Y Cheng nd Dhrm P. Agrwl OBR Center for Dstruted nd Mole Computng, Deprtment of ECECS Unversty of Cncnnt, Cncnnt, OH 45 {chengyg, dp}@ececs.uc.edu
More informationSimplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors
The Interntonl Arb Journl of Informton Technology, Vol., No., Mrch 04 Smplfed Algorthm nd Hrdwre Implementton for the (4,, 8 Extended Goly Soft Decoder Up to 4 Errors Dongfu Xe College of Mechncl nd Electrcl
More informationAn Optimal Method for Using Multiple Gateways in Cellular IP Networks
Bond Unversty epublctons@bond Informton Technology ppers Bond Busness School Aprl 2004 An Optml Method for Usng Multple Gtewys n ellulr IP Networks Zheng d Wu Bond Unversty, Zheng_D_Wu@bond.edu.u Follow
More informationEfficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment
Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro
More informationSinusoidal Steady State Analysis
CHAPTER 8 Snusodl Stedy Stte Anlyss 8.1. Generl Approch In the prevous chpter, we hve lerned tht the stedy-stte response of crcut to snusodl nputs cn e otned y usng phsors. In ths chpter, we present mny
More informationVI.C CIRCUIT BREAKERS
VI.C CIRCUIT BREAKERS DMS #84474 Pge of 28 Revsed : GUIDE FOR DETERMINATION OF CIRCUIT BREAKER LOAD CURRENT CAPABILITY RATINGS PENNSYLVANIA-NEW JERSEY-MARYLAND INTERCONNECTION PLANNING AND ENGINEERING
More informationMath Circles Finite Automata Question Sheet 3 (Solutions)
Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how
More informationPre-distortion Linearization for 64-QAM Modulation in Ka-Band Satellite Link
IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.8 No.8, August 008 47 Pre-dstorton Lnerzton for 64-QAM Modulton n K-Bnd Stellte Lnk P. Sojood Srdrood,, G.R. solt nd P. Prvnd Summry
More informationCHAPTER 2 LITERATURE STUDY
CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:
More informationChinese Remainder. Discrete Mathematics Andrei Bulatov
Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators
More informationi S1 V IN i C1 i N i C2 i S2
ENGINEERING FOR RURAL DEVELOPMENT Jelgv, 0.-.05.05. VOLTAGE BALANCE CONTROL OF TWO-LEVEL DC-DC CONVERTER Ksprs Krocs, Ugs Srmels, Vesturs Brzs Insttute of Physcl Energetcs; Rg Techncl Unversty kselt@nbox.lv
More informationA Key Set Cipher for Wireless Sensor Networks
A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing
More informationproblems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance
palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns
More informationMAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES
MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion
More informationAn Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng
More informationRough Set Approach for Categorical Data Clustering 1
Interntonl Journl of Dtbse Theory nd Applcton Vol., No., Mrch, Rough Set Approch for Ctegorcl Dt Clusterng Tutut Herwn*, Rozd Ghzl, Iwn Tr Ryd Ynto, nd Mustf Mt Ders Deprtment of Mthemtcs Educton nversts
More informationBnB-ADOPT + with Several Soft Arc Consistency Levels
BnB-ADOPT + wth Severl Soft Arc Consstency Levels Ptrc Guterrez nd Pedro Meseguer Astrct. Dstruted constrnt optmzton prolems cn e solved y BnB-ADOPT +, dstruted synchronous serch lgorthm. In the centrlzed
More informationWeb-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare
We-sed Remote Humn Pulse Montorng System wth Intellgent Dt Anlyss for Home Helthcre Chh-Mng Chen Grdute Insttute of Lrry, Informton nd Archvl Studes, Ntonl Chengch Unversty, Tpe 6, Twn, R.O.C. chencm@nccu.edu.tw
More informationNFC Communications-based Mutual Authentication Scheme for the Internet of Things
Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma
More informationPerformance Evaluation of Survivable Multifiber WDM Networks
erformnce Evluton of Survvble ultfber WD Networks Yunqu Luo nd Nrwn Ansr Advnced Networkng Lbortory Deprtment of Electrcl nd Computer Engneerng New Jersey Intute of Technology Unvery Heghts, Newrk, NJ
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationSuperposition, Thevenin and Norton. Superposition
Superposton, Thevenn nd Norton OUTINE Superposton Thevenn Equvlent Crcut Norton Equvlent Crcut Mxmum Power Theorem ecture 6, 9/1/05 Redng Chpter.6-.8 ecture 6, Slde 1 Superposton A lner crcut s one constructed
More informationAn Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks
An Improved Prole-Based Locaton Cachng wth Fxed Local Anchor Based on Group Deregstraton or Wreless Networks Md. Kowsar Hossan, Mousume Bhowmck, Tumpa Ran Roy 3 Department o Computer Scence and Engneerng,
More informationAlgorithms for Memory Hierarchies Lecture 14
Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationRek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.
clble Multicst ecurity in Dynmic Groups. Rek Molv, Alin Pnnetrt Institut Eurecom, ophi-antipolis, Frnce. fmolv,pnnetrg@eurecom.fr Abstrct In this pper we propose new frmework for multicst security bsed
More informationA Comparison of South East Asian Face Emotion Classification Based on Optimized Ellipse Data Using Clustering Technique
A Comprson of South Est Asn Fce Emoton Clssfcton Bsed on Optmzed Ellpse Dt Usng Clusterng Technque K. Muthukruppn, S. Thrugnnm, R. Ngrjn, M. Rzon, S. Ycob, M. Muthukumrn3, nd T. Rmchndrn3 School of Scence
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationReinforcement Learning for Fuzzy Control with Linguistic States
54545454543 Journl of Uncertn Systems ol., No., pp.54-66, 8 Onlne t: www.jus.org.uk Renforcement Lernng for Fuzzy Control wth Lngustc Sttes Mohmmd Hossen Fzel Zrnd,*, Jvd Jouzdn, Mrym Fzel Zrnd Deprtment
More informationA Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM
A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:
More informationDomination and Independence on Square Chessboard
Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion
More informationFigure 1. DC-DC Boost Converter
EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton
More informationCONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS
CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS S. Srvnn 1, R. Poovzhk 2 nd N. R. Shnker 3 1 Deprtment of Mthemtcs, R.M.D. Engneerng College, Kvrpett, Tml
More informationClick Here to BEGIN: Independent Agent Contracting Link
LOA Guide : Getting Contrcted with AllWell Centene Medicre Advntge This guide is for ll gents who ssign commissions to n gency. You will NOT need to provide ny gency informtion in this contrcting; s ll
More informationSequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12
9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil
More informationA Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks
Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering
More informationTest 2. ECON3161, Game Theory. Tuesday, November 6 th
Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)
More informationExercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION
Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationA Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions
A Novel Control Method for nput Output Hrmonc Elmnton of the PWM Boost Type Rectfer Under Unblnced Opertng Condtons A. V. Stnkovc T. A. Lpo Electrcl nd Computer Engneerng Clevelnd Stte Unversty Deprtment
More informationA Substractive Clustering Based Fuzzy Hybrid Reference Control Design for Transient Response Improvement of PID Controller
IB J. Eng. Sc. Vol. 4, No., 009, 67-86 67 A Substrctve lusterng Bsed Fuzzy Hybrd Reference ontrol Desgn for rnsent Response Improvement of PID ontroller Endr Joelnto & Prlndungn H. Stnggng Instrumentton
More informationEFFECTIVE CURRENT CONTROL DESIGN AND ANALYSIS OF SINGLE PHASE INVERTER FOR POWER QUALITY IMPROVEMENT
VOL., NO. 7, APRIL 5 IN 89-668 ARPN Journl of Engneerng nd Appled cences 6-5 Asn Reserch Publshng Network (ARPN). All rghts reserved. EFFECTIVE CURRENT CONTROL DEIGN AND ANALYI OF INGLE PHAE INVERTER FOR
More informationInternational Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 48(Prnt), ISSN 97 499(Onlne) Volume 4, Issue 5, July August (2), IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 97-48 (Prnt) ISSN 97-499 (Onlne) Volume 4,
More informationA New Medium Access Control Protocol for TDD Mode Wideband CDMA Wireless Local Area Networks
A New Medum Access ontrol Protocol for TDD Mode Wdebnd DMA Wreless Locl Are Networks In F. Akyldz nd Xudong Wng Brodbnd nd Wreless Networkng Lb, School of Electrcl nd omuter Engneerng Georg Insttute of
More informationBit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection
011 Internatonal Conerence on Inormaton and Electroncs Engneerng IPCSIT vol.6 (011) (011) IACSIT Press, Sngapore Bt Error Proalty o Cooperatve Dversty or M-ary QAM OFDM-ased system wth Best Relay Selecton
More informationSynchronous Generator Line Synchronization
Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected
More informationY9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System
Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl
More informationTriangles and parallelograms of equal area in an ellipse
1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper
More informationLecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is
More informationSection 16.3 Double Integrals over General Regions
Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationCross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks
Ths full text pper ws peer revewed t the drecton of IEEE Communctons Socety subject mtter experts for publcton n the IEEE INFOCOM 28 proceedngs. Cross-lyer Qulty of Servce Support for UWB Wreless Multmed
More informationCS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates
Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the
More informationMATH 118 PROBLEM SET 6
MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the
More informationVRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,
VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationAn One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 2405 An One-wy Hsh Function Bsed Lightweight Mutul Authentiction FID Protocol Xuping en Institute of Softwre nd Intelligent echnology, HngZhou Dinzi University,
More information458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016
458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 Generlzed Cross-Lyer Desgns for Generc Hlf-Duplex Multcrrer Wreless Networks Wth Frequency-Reuse Rozt Rshtch, Student Member,
More informationMisty. Sudnow Dot Songs
Sudnow Dot Songs isty T The Dot Song is nottionl system tht depicts voiced chords in wy where the non-music reder cn find these firly redily. But the Dot Song is not intended be red, not s sight reder
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:
More informationStudy on SLT calibration method of 2-port waveguide DUT
Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion
More informationGuidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014
Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,
More informationAn Efficient and Flexible Decentralized Multicast Key Distribution Scheme
IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department
More informationEE Controls Lab #2: Implementing State-Transition Logic on a PLC
Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre
More informationMETHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin
METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or
More informationAnalysis and Enhancement of Bandwidth Request Strategies in IEEE Networks
Ths ull text paper was peer revewed at the drecton o EEE Communcatons Socety subject matter experts or publcaton n the EEE CC proceedngs nalyss and Enhancement o Bandwdth Request Strateges n EEE 8.6 etworks
More informationUniversity of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009
Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:
More informationTopic 20: Huffman Coding
Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding
More informationSynchronous Machine Parameter Measurement
Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions
More informationA COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE
A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE
More informationPerformance Evaluation of an Optical Packet Scheduling Switch
Performnce Evluton of n Optcl Pcket Schedulng Swtch Kyrkos Vlchos, memer IEEE, Kyrk Seklou nd Emmnuel Vrvrgos Reserch Acdemc Computer echnology Insttute, RA-CI, Unversty of Ptrs, GR-26500, RIO, Ptrs, Greece,
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationCryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee
More informationA Cluster-based TDMA System for Inter-Vehicle Communications *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,
More informationLECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY
LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd
More informationABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC
User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationVector Calculus. 1 Line Integrals
Vector lculus 1 Line Integrls Mss problem. Find the mss M of very thin wire whose liner density function (the mss per unit length) is known. We model the wire by smooth curve between two points P nd Q
More informationBUBBLE BOBBLE 1 o C r t n o s l 2 t e G t g n i a t S r d e t 3 a B s c i Pl y a 4 a G m S e r c e n e 5 in r Sco g 6 ms e It 7 a P s s o w d r
BUBBLE BOBBLE 1 Control s 2 Gettin g Strted 3 Bsc i Ply 4 Gm e Sce r en 5 Scoring 6 Items 7 Psswor d 1 Control s Bsic Controls Move left pssword Jump Blow s Confirm/Puse/Resume Menu nd right/enter nvigtion
More informationChapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse
Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented
More informationContent Based Color Image Retrieval via Wavelet Transforms
8 IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.7 No., December 7 Content Bsed Color Imge Retrevl v Wvelet Trnsforms Mrs.Y. M. Lth Dr.B.C.Jng V.S.K.Reddy, GNITS,JNTU,Ind Rector,JNTU,Ind
More informationA Multi-Agent Solution to Distribution System Management by Considering Distributed Generators
Pge of 0 IEEE PES Trnsctons on Power Systems 0 0 0 0 0 0 A Mult-Agent Soluton to Dstrbuton System Mngement by Consderng Dstrbuted Genertors Abstrct A trdtonl dstrbuton networ crres electrcty from centrl
More informationModule 9. DC Machines. Version 2 EE IIT, Kharagpur
Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols
More informationExample. Check that the Jacobian of the transformation to spherical coordinates is
lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationMulti-beam antennas in a broadband wireless access system
Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,
More informationSoftware Pipelining for the Pegasus IR
Softwre Ppelnng for the Pegsus IR Cod Hrtwg chrtwg@cs.cmu.edu Ele Krevt ekrevt@cs.cmu.edu Abstrct Modern processors, especll VLIW processors, often hve the blt to eecute multple nstructons smultneousl.
More informationEE 330 Lecture 22. Small Signal Analysis Small Signal Analysis of BJT Amplifier
EE Lecture Small Sgnal Analss Small Sgnal Analss o BJT Ampler Revew rom Last Lecture Comparson o Gans or MOSFET and BJT Crcuts N (t) A B BJT CC Q R EE OUT R CQ t DQ R = CQ R =, SS + T = -, t =5m R CQ A
More informationDataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)
The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:
More informationSecure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,
More informationFigure 1. DC-DC Boost Converter
EE36L, Power Electroncs, DC-DC Boost Converter Verson Feb. 8, 9 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton
More informationRational Secret Sharing without Broadcast
Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept
More informationELECTRONIC WAVELENGTH TRANSLATION IN OPTICAL NETWORKS. Milan Kovacevic and Anthony Acampora. Center for Telecommunications Research
ELECTRONIC WAVELENGTH TRANSLATION IN OPTICAL NETWORKS Mlan Kovacevc Anthony Acampora Department of Electrcal Engneerng Center for Telecommuncatons Research Columba Unversty, New York, NY 0027-6699 Abstract
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationApplication Note. Differential Amplifier
Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble
More informationEnergy Harvesting Two-Way Channels With Decoding and Processing Costs
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student
More informationCAL. NX15 DUO-DISPLAY QUARTZ
L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More information