138 research outputs found
Design of Dispersive Delay Structures (DDSs) Formed by Coupled C-Sections Using Predistortion with Space Mapping
The concept of space mapping is applied, for the first time, to the design of
microwave dispersive delay structures (DDSs). DDSs are components providing
specified group delay versus frequency responses for real-time radio systems.
The DDSs considered in this paper are formed by cascaded coupled C-sections. It
is first shown that aggressive space mapping does not provide sufficient
accuracy in the synthesis of DDSs. To address this issue, we propose a
predistortion space mapping technique. Compared to aggressive space mapping,
this technique provides enhanced accuracy, while compared to output space
mapping, it provides greater implementation simplicity. Two full-wave and one
experimental examples are provided to illustrate the proposed predistortion
space mapping technique
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
National Research Foundation (NRF) Singapor
Explanation of the Model Checker Verification Results
Immer wenn neue Anforderungen an ein System gestellt werden, müssen die Korrektheit und Konsistenz der Systemspezifikation überprüft werden, was in der Praxis in der Regel manuell erfolgt. Eine mögliche Option, um die Nachteile dieser manuellen Analyse zu überwinden, ist das sogenannte Contract-Based Design. Dieser Entwurfsansatz kann den Verifikationsprozess zur Überprüfung, ob die Anforderungen auf oberster Ebene konsistent verfeinert wurden, automatisieren. Die Verifikation kann somit iterativ durchgeführt werden, um die Korrektheit und Konsistenz des Systems angesichts jeglicher Änderung der Spezifikationen sicherzustellen.
Allerdings ist es aufgrund der mangelnden Benutzerfreundlichkeit und der Schwierigkeiten bei der Interpretation von Verifizierungsergebnissen immer noch eine Herausforderung, formale Ansätze in der Industrie einzusetzen. Stellt beispielsweise der Model Checker bei der Verifikation eine Inkonsistenz fest, generiert er ein Gegenbeispiel (Counterexample) und weist gleichzeitig darauf hin, dass die gegebenen Eingabespezifikationen inkonsistent sind. Hier besteht die gewaltige Herausforderung darin, das generierte Gegenbeispiel zu verstehen, das oft sehr lang, kryptisch und komplex ist. Darüber hinaus liegt es in der Verantwortung der Ingenieurin bzw. des Ingenieurs, die inkonsistente Spezifikation in einer potenziell großen Menge von Spezifikationen zu identifizieren.
Diese Arbeit schlägt einen Ansatz zur Erklärung von Gegenbeispielen (Counterexample Explanation Approach) vor, der die Verwendung von formalen Methoden vereinfacht und fördert, indem benutzerfreundliche Erklärungen der Verifikationsergebnisse der Ingenieurin bzw. dem Ingenieur präsentiert werden. Der Ansatz zur Erklärung von Gegenbeispielen wird mittels zweier Methoden evaluiert: (1) Evaluation anhand verschiedener Anwendungsbeispiele und (2) eine Benutzerstudie in Form eines One-Group Pretest-Posttest Experiments.Whenever new requirements are introduced for a system, the correctness and consistency of the system specification must be verified, which is often done manually in industrial settings. One viable option to traverse disadvantages of this manual analysis is to employ the contract-based design, which can automate the verification process to determine whether the refinements of top-level requirements are consistent. Thus, verification can be performed iteratively to ensure the system’s correctness and consistency in the face of any change in specifications.
Having said that, it is still challenging to deploy formal approaches in industries due to their lack of usability and their difficulties in interpreting verification results. For instance, if the model checker identifies inconsistency during the verification, it generates a counterexample while also indicating that the given input specifications are inconsistent. Here, the formidable challenge is to comprehend the generated counterexample, which is often lengthy, cryptic, and complex. Furthermore, it is the engineer’s responsibility to identify the inconsistent specification among a potentially huge set of specifications.
This PhD thesis proposes a counterexample explanation approach for formal methods that simplifies and encourages their use by presenting user-friendly explanations of the verification results. The proposed counterexample explanation approach identifies and explains relevant information from the verification result in what seems like a natural language statement. The counterexample explanation approach extracts relevant information by identifying inconsistent specifications from among the set of specifications, as well as erroneous states and variables from the counterexample. The counterexample explanation approach is evaluated using two methods: (1) evaluation with different application examples, and (2) a user-study known as one-group pretest and posttest experiment
DSH: Deniable secret handshake framework
National Research Foundation (NRF) Singapor
Fully Secure Cipertext-Policy Hiding CP-ABE
Lecture Notes in Computer Science, 2011, Volume 6672/2011, 24-39</p
Shrinking of Cluster Ellipticals: a Tidal Stripping explanation and Implications for the Intra-Cluster Light
We look for evidence of tidal stripping in elliptical galaxies through the
analysis of homogeneous CCD data corresponding to a sample of 228 elliptical
galaxies belonging to 24 clusters of galaxies at . We
investigate departures from the standard magnitude-isophotal size relation, as
a function of environmental (cluster-centric distance, local galaxy density)
and structural (cluster velocity dispersion, Bautz-Morgan type) properties. We
find that, for any particular galaxy luminosity, the ellipticals in the inner
and denser regions of the clusters are about 5% smaller than those in the outer
regions, which is in good agreement with the finding of Strom & Strom (1978)
based on photographic photometry. The null hypothesis (ie., galaxy sizes are
independent of the cluster-centric distance or density) is rejected at a
significance level of better than 99.7%. Numericals models of Aguilar & White
(1986) predict that tidal stripping can lead to changes in the whole structure
of ellipticals producing shrinkage and brightening of the galaxy, qualitatively
consistent with our measurements and also with the findings of Trujillo et al.
(2002), that more centrally concentrated ellipticals populate denser regions.
Our observational results can be interpreted as evidence for stripping of stars
from ellipticals in the central/denser regions of clusters, contributing to the
intra-cluster light observed in these structures.Comment: AJ Accepted, 15 pages, 9 figure
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
Efficient user revocation is a necessary but challenging problem in many
multi-user cryptosystems. Among known approaches, server-aided revocation
yields a promising solution, because it allows to outsource the major workloads
of system users to a computationally powerful third party, called the server,
whose only requirement is to carry out the computations correctly. Such a
revocation mechanism was considered in the settings of identity-based
encryption and attribute-based encryption by Qin et al. (ESORICS 2015) and Cui
et al. (ESORICS 2016), respectively.
In this work, we consider the server-aided revocation mechanism in the more
elaborate setting of predicate encryption (PE). The latter, introduced by Katz,
Sahai, and Waters (EUROCRYPT 2008), provides fine-grained and role-based access
to encrypted data and can be viewed as a generalization of identity-based and
attribute-based encryption. Our contribution is two-fold. First, we formalize
the model of server-aided revocable predicate encryption (SR-PE), with rigorous
definitions and security notions. Our model can be seen as a non-trivial
adaptation of Cui et al.'s work into the PE context. Second, we put forward a
lattice-based instantiation of SR-PE. The scheme employs the PE scheme of
Agrawal, Freeman and Vaikuntanathan (ASIACRYPT 2011) and the complete subtree
method of Naor, Naor, and Lotspiech (CRYPTO 2001) as the two main ingredients,
which work smoothly together thanks to a few additional techniques. Our scheme
is proven secure in the standard model (in a selective manner), based on the
hardness of the Learning With Errors (LWE) problem.Comment: 24 page
RSA-based certificateless public key encryption
Singapore Management Universit
Inactivity of Parliamentarians in National Parliament of Bangladesh: Impacts on Parliamentary Democracy
There is a growing interest in the inactive role of parliamentarians in measuring the success of parliamentary democracy. In this research firstly, it explored the inactive role of the parliamentarians among the eighth, ninth and tenth parliament of Bangladesh national parliment, where it observed that the parliamentarians of both oppositions and the ruling party remained inactive in lawmaking to oversight functions. The main causes of this inactivity of the parliamentarians are apathy to discuss and debate in the parliament, seventy articles of the constitution, the dearth of knowledge of the parliamentary norms, and business politics nexus. The impacts of this inactivity of the parliamentarians are the declining of parliament, which is taking place by the executive and this inactivity serves as a barrier to the process of institutionalization of parliamentary democracy
- …