首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击.  相似文献   

2.
A new modified remote user authentication scheme using smart cards   总被引:1,自引:0,他引:1  
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.  相似文献   

3.
Efficient password authenticated key agreement using bilinear pairings   总被引:3,自引:0,他引:3  
For providing a secure distributed computer environment, efficient and flexible user authentication and key agreement is very important. In addition to user authentication and key agreement, identity privacy is very useful for users. In this paper, we propose an efficient and flexible password authenticated key agreement scheme using bilinear pairings. The main merits include: (1) there is no need for any password or verification table in the server; (2) users can choose or change his own password freely; (3) both the server and a user can authenticate each other; (4) it can protect the user’s privacy; (5) the user and the server can generate a session key; (6) it does not have a serious synchronization-clock problem; (7) even if the secret information stored in a smart card is compromised, it can prevent the offline dictionary attack.  相似文献   

4.
Security of a key agreement protocol based on chaotic maps   总被引:2,自引:0,他引:2  
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev’s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.’s system. In order to address Bergamo et al.’ attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.’s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server’s communications.  相似文献   

5.
In this work, we study a completely integrable dissipative equation. The Burgers equation is extended by using the sense of the Kadomtsev–Petviashvili (KP) equation. The new established Burgers–KP equation is studied by using the tanh–coth method to obtain kink solutions and periodic solutions. We also apply the powerful Hirota’s bilinear method to establish exact N-soliton solutions for the derived integrable equation.  相似文献   

6.
The complex Monge–Ampère equation is a nonlinear equation with high degree; therefore getting its solution is very difficult. In the present paper how to get the solution of Dirichlet’s problem of the complex Monge–Ampère equation on the Cartan–Hartogs domain of the first type is discussed, using an analytic method. Firstly, the complex Monge–Ampère equation is reduced to a nonlinear ordinary differential equation, then the solution of Dirichlet’s problem of the complex Monge–Ampère equation is reduced to the solution of a two-point boundary value problem for a nonlinear second-order ordinary differential equation. Secondly, the solution of Dirichlet’s problem is given as a semi-explicit formula, and in a special case the exact solution is obtained. These results may be helpful for a numerical method approach to Dirichlet’s problem of the complex Monge–Ampère equation on the Cartan–Hartogs domain of the first type.  相似文献   

7.
In the weak-field approximation, some implications of duality in the Weyl–Dirac (WD) theory, using the Gregorash–Papini–Wood approach, are investigated. Any particle is in a permanent interaction with the ‘subquantic level’ (Madelung’s fluid) and, as a result of this interaction, the particle acquires the proper fluctuation curvature and the proper fluctuation energy, respectively. By fixing the fluctuations scale, the quantum fluid orders either by means of bright cnoidal oscillation modes inducing causality, or by means of dark cnoidal oscillation modes inducing acausality, and non-linear effects, respectively. The periodic mode is associated with the undulatory characteristic, and the solitonic one with the corpuscular one. By not fixing the fluctuations scale and keeping the symmetry, the quantum fluid orders like a two-dimensional (2D) lattice of vortices, so that the duality needs coherence. In the compatibility between quantum hydrodynamics in the Madelung’s representation and the wave mechanics, the self-gravitational field of the Weyl–Dirac type physical object is generated. El Naschie’s space–time implies, by means of transfinite heterotic string theory, the masses of nucleons, and, by the gravitational fractional quantum Hall effect, the dispersion of the wave-packet on the particle. The analysis of the fractal dimension of the physical object described by the WD theory shows that the waves, and corpuscle, respectively are 2D projections of a higher dimensional special string in El Naschie’s space–time (El Naschie’s string).  相似文献   

8.
The paper presents an alternative study of the bifurcation behavior of the Rose–Hindmarsh model using Lyapunov–Andronov’s theory. This is done on the basis of the obtained analytical formula expressing the first Lyapunov’s value (this is not Lyapunov exponent) at the boundary of stability. From the obtained results the following new conclusions are made: Transition to chaos and the occurrence of chaotic oscillations in the Rose–Hindmarsh system take place under hard stability loss.  相似文献   

9.
The appearance of the theory of zero-knowledge, presented by Goldwasser, Micali and Rackoff in 1985, opened a way to secure identification schemes. The first application was the famous Fiat-Shamir scheme based on the problem of modular square roots extraction. In the following years, many other schemes have been proposed, some Fiat-Shamir extensions but also new discrete logarithm based schemes. Therefore, all of them were based on problems from number theory. Their main common drawback is high computational load because of arithmetical operations modulo large integers. Implementation on low-cost smart cards was made difficult and inefficient.With the Permuted Kernels Problem (PKP), Shamir proposed the first efficient scheme allowing for an implementation on such low-cost smart cards, but very few others have afterwards been suggested.In this paper, we present an efficient identification scheme based on a combinatorial -complete problem: the Permuted Perceptrons Problem (PPP). This problem seems hard enough to be unsolvable even with very small parameters, and some recent cryptanalysis studies confirm that position. Furthermore, it admits efficient zero-knowledge proofs of knowledge and so it is well-suited for cryptographic purposes. An actual implementation completes the optimistic opinion about efficiency and practicability on low-cost smart cards, and namely with less than 2KB of EEPROM and just 100 Bytes of RAM and 6.4 KB of communication.  相似文献   

10.
Some manufacturers sponsor “free” retailer gift cards to be given to consumers who purchase their products. These gift cards are paid for by the manufacturer and are redeemable on all products at the retailer. We develop a model of such a supply chain. We analyze cases in which the gift cards’ redemption rate is constant or increasing in gift card value. The results indicate that in addition to the redemption rate and consumers’ valuation for gift card dollars, the profitability of manufacturer-sponsored gift cards depends on the average gross margin of the retailer and the type of purchases consumers make with gift cards. Furthermore, we show that under certain conditions, free gift cards will increase the expected profits of the retailer and manufacturer as well as decrease the retail price of the product. These conditions include a retailer with large average gross margin and consumers using gift cards to purchase products they would not buy with cash otherwise. Furthermore, all consumers, including those who do not redeem the gift card, are more likely to benefit from a reduced retail price when their probability of redeeming the gift card after purchase is equal to their estimated redemption probability at purchase time. We show the conditions under which gift cards are more profitable than cash mail-in rebates. We develop an incentive scheme to improve the performance of supply chains with gift cards.  相似文献   

11.
In this paper we use Adomian’s decomposition method for solving linear and nonlinear Klein–Gordon and sine-Gordon equations. Analytic and numerical studies are presented. The obtained results show improvements over existing techniques.  相似文献   

12.
The nonlinear Klein–Gordon equation is used to model many nonlinear phenomena. In this paper, we propose a numerical scheme to solve the one-dimensional nonlinear Klein–Gordon equation with quadratic and cubic nonlinearity. Our scheme uses the collocation points and approximates the solution using Thin Plate Splines (TPS) radial basis functions (RBF). The implementation of the method is simple as finite difference methods. The results of numerical experiments are presented, and are compared with analytical solutions to confirm the good accuracy of the presented scheme.  相似文献   

13.
In ACM conference on electronic commerce (EC’03), Han et al. [Identity-based confirmer signatures from pairings over elliptic curves, in: Proceedings of ACM Conference on Electronic Commerce Citation 2003, San Diego, CA, USA, June 09–12, 2003, pp. 262–263] proposed an ID-based confirmer signature scheme using pairings (the scheme is in fact an ID-based undeniable signature scheme). In this paper, we show that this signature scheme is not secure and the signer can deny any signature, even if it is a valid signature, and any one can forge a valid confirmer signature of a signer with identity ID on an arbitrary message and confirm this signature to the verifier.  相似文献   

14.
In this paper, a numerical solution of the generalized Burgers–Huxley equation is presented. This is the application of spectral collocation method. To reduce roundoff error in this method we use Darvishi’s preconditionings. The numerical results obtained by this method have been compared with the exact solution. It can be seen that they are in a good agreement with each other, because errors are very small and figures of exact and numerical solutions are very similar.  相似文献   

15.
In this paper, a convergence proof of the Adomian decomposition method (ADM) applied to the generalized nonlinear Burgers–Huxley equation is presented. The decomposition scheme obtained from the ADM yields an analytical solution in the form of a rapidly convergent series. The direct symbolic–numeric scheme is shown to be efficient and accurate.  相似文献   

16.
The game of 'Mousetrap, a problem in permutations, first introduced by Arthur Cayley in 1857 and independently addressed by Cayley and Adolph Steen in 1878, has been largely unexamined since. The game involves permutations of n cards numbered consecutively from 1 to n. The cards are laid out face up in some order and the game is played by counting on the cards, beginning the count with 1. If at any time the number of the count matches the number on the card, this is called a hit and the card is thrown out. The counting begins again with 1 on the next card and returns to the first card when the nth card is reached. Each time a card is hit, that card is removed and the counting starts over at 1. The game continues until all the cards have been hit and thrown out (the player wins) or until the counting reaches n with no cards having been hit (the cards win). The game is re-introduced here and a summary of both Cayley's and Steen's work is presented. Computer programs, written to generate the types of permutations dealt with by Steen, uncovered discrepancies in his work. Further examination of these discrepancies lead to the discovery of a combinatorial pattern of coefficients which Steen was unable to recognize because of his computational errors. Corrected versions of Steen's erroneous formulas are presented.  相似文献   

17.
In this article, a conservative compact difference scheme is presented for the periodic initial‐value problem of Klein–Gordon–Schrödinger equation. On the basis of some inequalities about norms and the priori estimates, convergence of the difference solution is proved with order O(h42) in maximum norm. Numerical experiments demonstrate the accuracy and efficiency of the compact scheme. © 2013 Wiley Periodicals, Inc. Numer Methods Partial Differential Eq, 2013  相似文献   

18.
In this paper, we study a predator–prey system with an Ivlev-type functional response and impulsive control strategies containing a biological control (periodic impulsive immigration of the predator) and a chemical control (periodic pesticide spraying) with the same period, but not simultaneously. We find conditions for the local stability of the prey-free periodic solution by applying the Floquet theory of an impulsive differential equation and small amplitude perturbation techniques to the system. In addition, it is shown that the system is permanent under some conditions by using comparison results of impulsive differential inequalities. Moreover, we add a forcing term into the prey population’s intrinsic growth rate and find the conditions for the stability and for the permanence of this system.  相似文献   

19.
A generalization of the Nottale’s scale relativity theory is elaborated: the generalized Schrödinger equation results as an irrotational movement of Navier–Stokes type fluids having an imaginary viscosity coefficient. Then ψ simultaneously becomes wave-function and speed potential. In the hydrodynamic formulation of scale relativity theory, some implications in the gravitational morphogenesis of structures are analyzed: planetary motion quantizations, Saturn’s rings motion quantizations, redshift quantization in binary galaxies, global redshift quantization etc. The correspondence with El Naschie’s ε(∞) space–time implies a special type of superconductivity (El Naschie’s superconductivity) and Cantorian-fractal sequences in the quantification of the Universe.  相似文献   

20.
In this work, we prove that on a metrically convex complete metric space, the Mizoguchi–Takahashi theorem is equivalent to Nadler’s theorem. Also, we obtain its equivalence on a compact metric space.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号