首页 > 最新文献

9th International Conference on Information Technology (ICIT'06)最新文献

英文 中文
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique 基于改进模拟退火技术的分组密码分析
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.40
N. Nalini, G. R. Rao
Cryptanalysis of ciphers has been successfully demonstrated through several techniques such as brute force attack, linear and differential cryptanalysis and heuristic optimisation methods. To demonstrate the power of heuristic optimisation techniques for attacks of modern-day ciphers, we present for the first time systematic experiments on heuristic-based attacks of modified versions of data encryption standard (DES) with 48 bits. A novel contribution of this work lies in combining the features of differential cryptanalysis and heuristic optimisation methods. This is possible by using differential cryptanalysis to obtain 42 bits of the key whereas the remaining missing 14 key bits are obtained through heuristic optimisation methods by a choice of suitable composite fitness function to capture this combined use of both these approaches. The studies reported in this paper will be useful for the attacks of other similar ciphers.
密码分析已经通过暴力攻击、线性和差分密码分析以及启发式优化方法等几种技术成功地展示了。为了展示启发式优化技术对现代密码攻击的强大功能,我们首次对48位数据加密标准(DES)修改版本的启发式攻击进行了系统实验。这项工作的一个新颖贡献在于结合了差分密码分析和启发式优化方法的特点。这可以通过使用差分密码分析来获得42位密钥,而其余缺失的14位密钥则通过启发式优化方法获得,通过选择合适的复合适应度函数来捕获这两种方法的组合使用。本文的研究对其他类似密码的攻击具有一定的参考价值。
{"title":"Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique","authors":"N. Nalini, G. R. Rao","doi":"10.1109/ICIT.2006.40","DOIUrl":"https://doi.org/10.1109/ICIT.2006.40","url":null,"abstract":"Cryptanalysis of ciphers has been successfully demonstrated through several techniques such as brute force attack, linear and differential cryptanalysis and heuristic optimisation methods. To demonstrate the power of heuristic optimisation techniques for attacks of modern-day ciphers, we present for the first time systematic experiments on heuristic-based attacks of modified versions of data encryption standard (DES) with 48 bits. A novel contribution of this work lies in combining the features of differential cryptanalysis and heuristic optimisation methods. This is possible by using differential cryptanalysis to obtain 42 bits of the key whereas the remaining missing 14 key bits are obtained through heuristic optimisation methods by a choice of suitable composite fitness function to capture this combined use of both these approaches. The studies reported in this paper will be useful for the attacks of other similar ciphers.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency 提高RFID标签读取效率的智能查询树(IQT)协议
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.61
Naval Bhandari, A. Sahoo, S. Iyer
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanisms will become important. Various tag identifica tion (or anti-collision) algorithms have been proposed for RFID systems. This work focuses on methods to improve tag read efficiency in RFID Systems. In this paper, we propose an Intelligent Query Tree (IQT) Protocol for tag identification that exploits specific prefix patterns in the tags and make the identification process more efficient. IQT is a memoryless protocol that identifies RFID tags more efficiently in scenarios where tag IDs have some common prefix (e.g., common vendor ID or product ID). IQT is suitable for readers deployed in exclusive showrooms, shipment points of big malls, where the products may come from same manufacturer and may have same product IDs. We provide the worst case complexity analysis of IQT and show the performance improve ment of this protocol over traditional Query Tree protocol in different scenarios.
无线射频识别(RFID)有望成为各种产品标签的标准。随着越来越多的产品启用RFID,快速标签识别机制将变得重要。各种标签识别(或防碰撞)算法已经被提出用于RFID系统。这项工作的重点是提高RFID系统中标签读取效率的方法。在本文中,我们提出了一种用于标签识别的智能查询树(IQT)协议,该协议利用标签中的特定前缀模式,使识别过程更加高效。IQT是一种无内存协议,在标签ID有一些通用前缀(例如,通用供应商ID或产品ID)的情况下,它可以更有效地识别RFID标签。IQT读卡器适用于部署在大型商场的专属展厅、发货点,这些地方的产品可能来自同一厂家,可能具有相同的产品id。我们提供了IQT的最坏情况复杂性分析,并展示了在不同场景下该协议相对于传统查询树协议的性能改进。
{"title":"Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency","authors":"Naval Bhandari, A. Sahoo, S. Iyer","doi":"10.1109/ICIT.2006.61","DOIUrl":"https://doi.org/10.1109/ICIT.2006.61","url":null,"abstract":"Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanisms will become important. Various tag identifica tion (or anti-collision) algorithms have been proposed for RFID systems. This work focuses on methods to improve tag read efficiency in RFID Systems. In this paper, we propose an Intelligent Query Tree (IQT) Protocol for tag identification that exploits specific prefix patterns in the tags and make the identification process more efficient. IQT is a memoryless protocol that identifies RFID tags more efficiently in scenarios where tag IDs have some common prefix (e.g., common vendor ID or product ID). IQT is suitable for readers deployed in exclusive showrooms, shipment points of big malls, where the products may come from same manufacturer and may have same product IDs. We provide the worst case complexity analysis of IQT and show the performance improve ment of this protocol over traditional Query Tree protocol in different scenarios.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114914194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs 一种基于争用窗口的无线局域网QoS区分机制
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.6
Mayank Mishra, A. Sahoo
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS support. Hence, providing QoS in 802.11 WLANs is an important issue due to its large installation base. In this paper, we propose a priority based service differentiation mechanism at the MAC layer. The MAC assigns different contention windows to two priority classes to provide service differentiation. The MAC protocol was designed such that minimal change is required in 802.11 firmware and yet the performance is comparable to 802.11e MAC. When collision occurs, contention window is increased in a linear fashion and the new contention windows for high and low priority traffic become non-contiguous. This unique method of contention window management provides better relative performance between the two classes. We also propose an enhancement to our base protocol that further increases throughput at light load condition. We present our simulation experiment results that show that our protocol has performance comparable to 802.11e.
在无线局域网上运行实时应用程序正变得越来越普遍。这些应用程序需要QoS。但是最广泛使用的无线局域网IEEE 802.11并没有QoS支持。因此,在802.11 wlan中提供QoS是一个重要的问题,因为它的安装基数很大。在本文中,我们提出了一种基于优先级的MAC层服务区分机制。MAC将不同的争用窗口分配给两个优先级类,以提供服务差异化。MAC协议的设计使得在802.11固件中需要最小的更改,但性能可与802.11e MAC相媲美。当发生碰撞时,争用窗口以线性方式增加,高优先级和低优先级流量的新争用窗口变得不连续。这种独特的争用窗口管理方法在两个类之间提供了更好的相对性能。我们还提出了对基本协议的增强,以进一步提高轻负载条件下的吞吐量。仿真实验结果表明,我们的协议具有与802.11e相当的性能。
{"title":"A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs","authors":"Mayank Mishra, A. Sahoo","doi":"10.1109/ICIT.2006.6","DOIUrl":"https://doi.org/10.1109/ICIT.2006.6","url":null,"abstract":"Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS support. Hence, providing QoS in 802.11 WLANs is an important issue due to its large installation base. In this paper, we propose a priority based service differentiation mechanism at the MAC layer. The MAC assigns different contention windows to two priority classes to provide service differentiation. The MAC protocol was designed such that minimal change is required in 802.11 firmware and yet the performance is comparable to 802.11e MAC. When collision occurs, contention window is increased in a linear fashion and the new contention windows for high and low priority traffic become non-contiguous. This unique method of contention window management provides better relative performance between the two classes. We also propose an enhancement to our base protocol that further increases throughput at light load condition. We present our simulation experiment results that show that our protocol has performance comparable to 802.11e.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Electroencephalograph Signal Analysis During Bramari 脑电图信号分析
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.50
S. Patil, D. Bormane
Bramari is one part of the Pranayama, as traditionally conceived, involves much more than merely breathing for relaxation. Bramari is a term with a wide range of meanings. "The regulation of the incoming and outgoing flow of breath with retention". Bramari also denotes cosmic power, or the power of the entire universe which manifests itself as conscious living being in us through the phenomenon of breathing. Because of this connection between breath and consciousness. Pranayama has devised Bramari to stabilize energy and consciousness. A wavelet transformation is applied to electroencephalograph (EEG) records from persons under Bramari. Correlation dimension, Largest Lyapunov exponent, Approximate entropy and coherence values are analyzed. This model along with software is used to keep track on the improvement of the persons mind, aging, balance, flexibility, personnel values, mental values, social values, love, sex, knowledge, weight reduction and body fitness.
Bramari是调息法(Pranayama)的一部分,传统上认为,它不仅仅是为了放松而呼吸。Bramari是一个含义广泛的术语。“调节呼吸的进出,保持呼吸”。梵天也表示宇宙的力量,或者整个宇宙的力量,它通过呼吸的现象表现为我们体内有意识的生命。因为呼吸和意识之间的这种联系。Pranayama设计了Bramari来稳定能量和意识。将小波变换应用于Bramari下的脑电图记录。分析了相关维数、最大李雅普诺夫指数、近似熵和相干值。该模型与软件一起用于跟踪人的心智、衰老、平衡、柔韧性、个人价值观、心理价值观、社会价值观、爱情、性、知识、减肥和健身的改善情况。
{"title":"Electroencephalograph Signal Analysis During Bramari","authors":"S. Patil, D. Bormane","doi":"10.1109/ICIT.2006.50","DOIUrl":"https://doi.org/10.1109/ICIT.2006.50","url":null,"abstract":"Bramari is one part of the Pranayama, as traditionally conceived, involves much more than merely breathing for relaxation. Bramari is a term with a wide range of meanings. \"The regulation of the incoming and outgoing flow of breath with retention\". Bramari also denotes cosmic power, or the power of the entire universe which manifests itself as conscious living being in us through the phenomenon of breathing. Because of this connection between breath and consciousness. Pranayama has devised Bramari to stabilize energy and consciousness. A wavelet transformation is applied to electroencephalograph (EEG) records from persons under Bramari. Correlation dimension, Largest Lyapunov exponent, Approximate entropy and coherence values are analyzed. This model along with software is used to keep track on the improvement of the persons mind, aging, balance, flexibility, personnel values, mental values, social values, love, sex, knowledge, weight reduction and body fitness.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique 基于改进志村技术的网络搜索质量主客观度量聚合
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.24
R. Ali, M. Beg
Web searching is perhaps the second most popular activity on Internet. Millions of users search the Web daily for their purpose. But as there are a number of search engines available, there must be some procedure to evaluate them. In this paper, we try to present an effort in this regard. For subjective measure, we are taking into account the "satisfaction " a user gets when presented with search results. The feedback of the user is inferred from watching the actions of the user on the search results presented before him in response to his query. For objective measures, we use Vector space model and Boolean similarity measures. All the three measures are aggregated using modified Shimura technique of rank aggregation. The aggregated ranking is then compared with the original ranking given by the search engine. The correlation coefficient thus obtained is averaged for a set of queries. We show our experimental results pertaining to seven public search engines and fifteen queries.
网络搜索可能是互联网上第二大最受欢迎的活动。数以百万计的用户每天在网上搜索他们的目的。但是,由于有许多可用的搜索引擎,必须有一些程序来评估它们。在本文中,我们试图提出这方面的努力。对于主观衡量,我们考虑的是用户在看到搜索结果时的“满意度”。用户的反馈是通过观察用户对呈现在他面前的搜索结果的行为来推断的,以回应他的查询。对于客观度量,我们使用向量空间模型和布尔相似度量。采用改进的Shimura秩聚集技术对这三个指标进行聚合。然后将聚合排名与搜索引擎给出的原始排名进行比较。这样得到的相关系数是一组查询的平均值。我们展示了关于七个公共搜索引擎和15个查询的实验结果。
{"title":"Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique","authors":"R. Ali, M. Beg","doi":"10.1109/ICIT.2006.24","DOIUrl":"https://doi.org/10.1109/ICIT.2006.24","url":null,"abstract":"Web searching is perhaps the second most popular activity on Internet. Millions of users search the Web daily for their purpose. But as there are a number of search engines available, there must be some procedure to evaluate them. In this paper, we try to present an effort in this regard. For subjective measure, we are taking into account the \"satisfaction \" a user gets when presented with search results. The feedback of the user is inferred from watching the actions of the user on the search results presented before him in response to his query. For objective measures, we use Vector space model and Boolean similarity measures. All the three measures are aggregated using modified Shimura technique of rank aggregation. The aggregated ranking is then compared with the original ranking given by the search engine. The correlation coefficient thus obtained is averaged for a set of queries. We show our experimental results pertaining to seven public search engines and fifteen queries.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Simple Geometric Approach for Ear Recognition 一种简单的几何方法用于耳朵识别
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.20
Dasari Shailaja, Phalguni Gupta
With the increase in need for strong security systems, the biometric systems are becoming more and more popular. These systems are based on human traits which, unlike passwords or pins, cannot be lost, stolen or forgotten. One such trait is ear. With the initial doubts on uniqueness of ear, ear biometrics could not attract much attention. But after it has been said that it is almost impossible to find two ears with all the parts identical, ear biometrics has gained its pace. In this paper a simple scale and rotation invariant two-stage geometric approach which is based on the concept of max-line, the longest line that has both its end-points on the edges of the ear, is proposed.
随着人们对强大的安全系统需求的增加,生物识别系统越来越受欢迎。这些系统基于人类的特征,与密码或pin不同,这些特征不会丢失、被盗或遗忘。其中一个特征就是耳朵。由于最初对耳朵的唯一性存在质疑,耳朵生物识别技术并没有引起太多关注。但自从有人说几乎不可能找到两只耳朵的所有部分都完全相同之后,耳朵生物识别技术就得到了发展。本文提出了一种简单的尺度和旋转不变的两阶段几何方法,该方法基于最大线的概念,即端点都在耳朵边缘上的最长线。
{"title":"A Simple Geometric Approach for Ear Recognition","authors":"Dasari Shailaja, Phalguni Gupta","doi":"10.1109/ICIT.2006.20","DOIUrl":"https://doi.org/10.1109/ICIT.2006.20","url":null,"abstract":"With the increase in need for strong security systems, the biometric systems are becoming more and more popular. These systems are based on human traits which, unlike passwords or pins, cannot be lost, stolen or forgotten. One such trait is ear. With the initial doubts on uniqueness of ear, ear biometrics could not attract much attention. But after it has been said that it is almost impossible to find two ears with all the parts identical, ear biometrics has gained its pace. In this paper a simple scale and rotation invariant two-stage geometric approach which is based on the concept of max-line, the longest line that has both its end-points on the edges of the ear, is proposed.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R 在IEEE-754R中实现二进制-编码-十进制格式的密集十进制转换
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.78
Amir Kaivani, A. Zakerolhosseini, S. Gorgin, M. Fazlali
The binary coded decimal (BCD) encoding has always dominated the decimal arithmetic algorithms and their hardware implementation. Due to importance of decimal arithmetic, the decimal format defined in IEEE 754 floating point standard has been revisited. It uses densely packed decimal (DPD) encoding to store significant part of a decimal floating point number. Furthermore in recent years reversible logic has attracted the attention of engineers for designing low power CMOS circuits, as it is not possible to realize quantum computing without reversible logic implementation. This paper derives the reversible implementation of DPD converter to and from conventional BCD format using in IEEE754R.
二进制编码的十进制(BCD)编码一直主导着十进制算法及其硬件实现。由于十进制算术的重要性,IEEE 754浮点标准中定义的十进制格式已被重新审视。它使用密集压缩十进制(DPD)编码来存储十进制浮点数的有效部分。此外,近年来可逆逻辑在设计低功耗CMOS电路时引起了工程师们的注意,因为没有可逆逻辑的实现就不可能实现量子计算。本文推导了在IEEE754R中实现传统BCD格式与DPD格式转换的可逆实现。
{"title":"Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R","authors":"Amir Kaivani, A. Zakerolhosseini, S. Gorgin, M. Fazlali","doi":"10.1109/ICIT.2006.78","DOIUrl":"https://doi.org/10.1109/ICIT.2006.78","url":null,"abstract":"The binary coded decimal (BCD) encoding has always dominated the decimal arithmetic algorithms and their hardware implementation. Due to importance of decimal arithmetic, the decimal format defined in IEEE 754 floating point standard has been revisited. It uses densely packed decimal (DPD) encoding to store significant part of a decimal floating point number. Furthermore in recent years reversible logic has attracted the attention of engineers for designing low power CMOS circuits, as it is not possible to realize quantum computing without reversible logic implementation. This paper derives the reversible implementation of DPD converter to and from conventional BCD format using in IEEE754R.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134513744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme 基于元胞自动机的远程相互认证方案
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.35
S. Tripathy, Sukumar Nandi, A. Chowdhury
Mutual authentication between a service provider and its users is essential to prevent unauthorized adversaries from misutilizing system resources. The traditional method of password table lookups is not scalable and is susceptible to overloading. Therefore this paper proposes a cellular automata based remote-mutual authentication (CARMA) Scheme to reduce the complexity of encryption and hash-based cryptosystems, as well as avoid table lookups. CARMA also uses cache-based nonces to avoid synchronization problems and thwart replay attacks. The inherent parallelism of cellular automata provides for its fast implementation.
服务提供者与其用户之间的相互身份验证对于防止未经授权的攻击者滥用系统资源至关重要。传统的密码表查找方法是不可扩展的,并且容易超载。因此,本文提出了一种基于元胞自动机的远程相互认证(CARMA)方案,以降低加密和基于哈希的密码系统的复杂性,并避免表查找。CARMA还使用基于缓存的随机数来避免同步问题并阻止重放攻击。元胞自动机固有的并行性为其快速实现提供了条件。
{"title":"CARMA: Cellular Automata Based Remote Mutual Authentication Scheme","authors":"S. Tripathy, Sukumar Nandi, A. Chowdhury","doi":"10.1109/ICIT.2006.35","DOIUrl":"https://doi.org/10.1109/ICIT.2006.35","url":null,"abstract":"Mutual authentication between a service provider and its users is essential to prevent unauthorized adversaries from misutilizing system resources. The traditional method of password table lookups is not scalable and is susceptible to overloading. Therefore this paper proposes a cellular automata based remote-mutual authentication (CARMA) Scheme to reduce the complexity of encryption and hash-based cryptosystems, as well as avoid table lookups. CARMA also uses cache-based nonces to avoid synchronization problems and thwart replay attacks. The inherent parallelism of cellular automata provides for its fast implementation.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Programmable Parallel Structure to perform Galois Field Exponentiation 一种执行伽罗瓦场求幂的可编程并行结构
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.18
Kundan Kumar, Debdeep Mukhopadhyay, D. R. Chowdhury
In this paper we propose a new exponentiation architecture in GF(2m). The core of the architecture is a parallel structure for multiplication and squaring, which is based on the state transitions of programmable cellular automata (CA). The proposed architecture requires hardware of the order m2 and the time complexity is m. The performance of the design outperformed existing architectures based on systolic array and cellular automata. The design can thus be effectively applied in public key cryptosystems like ElGamal and Diffie-Hellman Key exchange. The regular, cascadable structure of the cellular automata leads to extremely scalable VLSI design.
本文提出了GF(2m)中的一种新的求幂结构。该体系结构的核心是基于可编程元胞自动机(CA)状态转换的乘法和平方并行结构。该架构对硬件的要求为m2阶,时间复杂度为m。该设计的性能优于基于收缩阵列和元胞自动机的现有架构。因此,该设计可以有效地应用于ElGamal和Diffie-Hellman密钥交换等公钥密码系统中。元胞自动机的规则,可级联结构导致极具可扩展性的VLSI设计。
{"title":"A Programmable Parallel Structure to perform Galois Field Exponentiation","authors":"Kundan Kumar, Debdeep Mukhopadhyay, D. R. Chowdhury","doi":"10.1109/ICIT.2006.18","DOIUrl":"https://doi.org/10.1109/ICIT.2006.18","url":null,"abstract":"In this paper we propose a new exponentiation architecture in GF(2m). The core of the architecture is a parallel structure for multiplication and squaring, which is based on the state transitions of programmable cellular automata (CA). The proposed architecture requires hardware of the order m2 and the time complexity is m. The performance of the design outperformed existing architectures based on systolic array and cellular automata. The design can thus be effectively applied in public key cryptosystems like ElGamal and Diffie-Hellman Key exchange. The regular, cascadable structure of the cellular automata leads to extremely scalable VLSI design.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Promoter recognition using dinucleotide features : a case study for E.Coli 利用二核苷酸特征识别启动子:大肠杆菌的案例研究
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.75
T. Rani, S. Bhavani, R. Bapi
Promoter recognition is based upon two complementary methods, a motif based method and a global signal based method. The literature is abound with motif search methods. But as the motifs of a promoter are consensus patterns of very short length and the chance of finding putative promoters is high, global feature methods gain importance. In this paper a simple global feature extraction method is proposed for the recognition of sigma-70 promoters in E.coli. It is shown that a simple feed forward neural network classifier achieves a precision of nearly 80% in contrast to the high end classifiers and heavy features proposed in the literature achieving a similar performance. Additionally, a scheme is proposed for locating promoter regions in a given DNA segment.
启动子识别基于两种互补的方法,基于基序的方法和基于全局信号的方法。文献中有大量的母题搜索方法。但由于启动子的基序是非常短的长度的共识模式,并且发现假定启动子的机会很高,因此全局特征方法变得重要。本文提出了一种简单的全局特征提取方法来识别大肠杆菌中的sigma-70启动子。研究表明,与文献中提出的高端分类器和重特征相比,简单的前馈神经网络分类器的准确率接近80%。此外,还提出了一种在给定DNA片段中定位启动子区域的方案。
{"title":"Promoter recognition using dinucleotide features : a case study for E.Coli","authors":"T. Rani, S. Bhavani, R. Bapi","doi":"10.1109/ICIT.2006.75","DOIUrl":"https://doi.org/10.1109/ICIT.2006.75","url":null,"abstract":"Promoter recognition is based upon two complementary methods, a motif based method and a global signal based method. The literature is abound with motif search methods. But as the motifs of a promoter are consensus patterns of very short length and the chance of finding putative promoters is high, global feature methods gain importance. In this paper a simple global feature extraction method is proposed for the recognition of sigma-70 promoters in E.coli. It is shown that a simple feed forward neural network classifier achieves a precision of nearly 80% in contrast to the high end classifiers and heavy features proposed in the literature achieving a similar performance. Additionally, a scheme is proposed for locating promoter regions in a given DNA segment.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
9th International Conference on Information Technology (ICIT'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1