Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key with the help of an authenticated server over an insecure channel. Owning to the significanc...
详细信息
Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key with the help of an authenticated server over an insecure channel. Owning to the significance in building a secure communication channel, a number of approaches have been suggested over the years. However, the lack of formal security proof is a major issue in the related literature. In this paper, we propose a simple 3PAKE protocol based upon elliptic curve cryptography along with formal security proof under the decisional Diffie-Hellman assumption. Experimental results by using the automated validation of Internet security protocols and applications tool also show that the proposed protocol is secure against various malicious attacks. Compared with previous work, the proposed protocol has lower computation costs and lighter communication loads.
Accurately discriminating different floors is a very important task in indoor fingerprinting localization, which can be used to reduce space search domain and improve localization accuracy. There exist some research w...
详细信息
ISBN:
(纸本)9781479940998
Accurately discriminating different floors is a very important task in indoor fingerprinting localization, which can be used to reduce space search domain and improve localization accuracy. There exist some research works for floor identification at present; however, the accuracy is not high. To achieve higher accuracy, this paper proposes a hybrid floor identification algorithm using Bayesian classification and special AP. By extracting the distribution feature of APs in different floors with training data, the proposed approach can determine floor efficiently with 100% accuracy.
Compositional verification provides a way for deducing properties of a complete program from properties of its constituents. In particular, the assume-guarantee style of reasoning splits a specification into assumptio...
详细信息
Depth of field (DoF) is a depth range outside of which objects are blurred. DoF has been widely used in photography and films by artists and is expected to be applied to realistic image rendering and virtual reality a...
详细信息
During open source software development and maintenance, bug fixing is a result of developer collaboration. Understanding the structure of developer collaboration could be helpful for effective and efficient bug fixin...
详细信息
In China, hundreds of millions of migrant workers have moved to cities or coastal regions for more or better-paid jobs and have left their children behind at their rural homes. Separated by thousands of kilometers, th...
详细信息
ISBN:
(纸本)9781450313315
In China, hundreds of millions of migrant workers have moved to cities or coastal regions for more or better-paid jobs and have left their children behind at their rural homes. Separated by thousands of kilometers, these "left-behind" children and their migrant parents use mobile phones as their primary-and often only-method of maintaining family connections. To better understand the use of technology in this long-distance communication, we conducted a multi-phased study using interviews and surveys in three different Chinese rural areas. In this paper, we report our findings on how these children communicate with their migrant parents and what information they exchange. We also discuss design implications derived from these findings that may improve communication between left-behind children and their parents. Copyright 2013 ACM.
X10 is a HPC (High Performance Computing) programming language proposed by IBMfor supporting a PGAS (Partitioned Global Address Space) programming model offering a shared address space. The address space can be furthe...
详细信息
In this paper, an optimized mechanism for Semiconductor wafer fabrication (SWF) by integrating the Adaptive neuro-fuzzy inference system (ANFIS) with Sim- ulated annealing (SA) algorithm is proposed. In this ap- proac...
详细信息
In this paper, an optimized mechanism for Semiconductor wafer fabrication (SWF) by integrating the Adaptive neuro-fuzzy inference system (ANFIS) with Sim- ulated annealing (SA) algorithm is proposed. In this ap- proach, aiming to solve the rush order problem which sig- nificantly affect the cycle time and impact the Work in process (WIP) of lots due to the high priority, we build an ANFIS based prediction model which will be embedded into releasing to forecast product codes and quantities of the contingent rush orders. Then a scheduler based on SA algorithm is constructed, the coding of which represents a combination of scheduling policies, including lot releas- ing policies, dispatching rules, batching rules and setting- up rules. When the SA finished its optimization process, an optimal scheduling policy is produced. By using the proposed approach??? we will find that the system can be optimized to a large extent and give a better performance.
Memristors offer many potential advantages over more traditional memory-cell technologies, including the potential for extreme densities, and fast read times. Current devices, however, are plagued by problems of yield...
详细信息
ISBN:
(纸本)9781450320535
Memristors offer many potential advantages over more traditional memory-cell technologies, including the potential for extreme densities, and fast read times. Current devices, however, are plagued by problems of yield, and durability. We present a limit study of an aggressive neural network application that has a high update rate and a strict latency requirement, analog neural branch predictor. Of course, traditional analog neural network (ANN) implementations of branch predictors are not built with the idea that the underlying bits are likely to fail due to both manufacturing and wear-out issues. Without some careful precautions, a direct one-to-one replacement will result in poor behavior. We propose a hybrid system that uses SRAM front-end cache, and a distributed-sum scheme to overcome memristors' limitations. Our design can leverage devices with even modest durability (surviving only hours of continuous switching) to provide a system lasting 5 or more years of continuous operation. In addition, these schemes allow for a fault-tolerant design as well. We find that, while a neural predictor benefits from larger density, current technology parameters do not allow high dense, energy-efficient design. Thus, we discuss a range of plausible memristor characteristics that would;as the technology advances;make them practical for our application. Copyright 2013 ACM.
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expr...
详细信息
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In our construction, the access policy can be expressed as any non-monotone access structure. Meanwhile, the ciphertext size is independent on the number of attributes used in the scheme. We prove that our scheme is semantic secure in so-called Selective-Set model based on the n-DBDHE assumption. To the best of our knowledge, this is the first multi-authority attribute based encryption scheme realizing such expressive access policy and constant ciphertext size.
暂无评论