45,220 research outputs found
The Pairing Problem with User Interaction
Bluetooth-like applications face the pairing problem: two devices want to establish a relationship between them without any prior private information. Hoepman studied the ephemeral pairing problem by regarding the human operator of the devices as a messenger in an authenticated and/or private low-bandwidth channel between the nodes. Here we study the pairing problem with user interaction in which the operator can participate by doing extra (simple) computations
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
Shake well before use: Authentication based on Accelerometer Data
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method
Green\u27s Function Application for Pairing Correlations and the Optical Potential
Pairing in asymmetric nuclear matter has been studied incorporating the effect of finite total momentum. We employ the generalized Cooper eigenvalue equation, which can be used to demonstrate the pairing instability and also generates reasonable pairing gaps compared to the traditional Bardeen-Cooper-Schrieffer (BCS) gap equation. From phase space arguments and the resulting strength of the pairing gap, we learn that the Larkin-Ovchinnikov-FuldeFerrell phase with a finite total momentum is favored over the conventional phase in asymmetric nuclear matter, but not in symmetric nuclear matter. To address open questions in neutron star cooling, neutron matter pairing gaps of the 1S0 and the 3P2 â3 F2 channels in a wide range of densities have been calculated using three different realistic interactions. Instead of the mean-field BCS procedure, we incorporate the influence of short- and longrange correlations in calculating the pairing gaps. Short-range correlations are treated to include the fragmentation of single-particle states, suppressing the gaps substantially. Longrange correlations dress the pairing interaction via density and spin modes, and provide a smaller correction. The results provide input for neutron-star cooling scenarios and are parametrized in a user friendly way. The results are of particular relevance in view of the recent observational data on Cassiopeia A. To study the nucleon-nucleus scattering problem in an ab-initio way, the optical potential in the momentum vector basis beyond the mean- field has been calculated employing the T Ă Ï folding as the first step of the self-consistent Greenâs function method. The deuteron pole structure of T â matrix has been properly avoided using the spectral functions from the dispersive optical model. A comparison of the resulting real and imaginary part of the self-energy at 100 MeV with the corresponding dispersive-optical-model potentials shows reasonable agreement
An identity-based key infrastructure suitable for messaging applications
AbstractâIdentity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended to propose an IBE infrastructure for
messaging applications. The proposed infrastructure requires one registration authority and at least one public key generator and they secret share the master secret key. In addition, the PKG also shares the same master secret with each user in the system in a different way. Therefore, the PKG will never be able to learn the private keys of users under non-collusion assumption. We discuss different aspects of the proposed infrastructure such as security, key revocation, uniqueness of the identities that constitute the main drawbacks of other IBE schemes. We demonstrate that our infrastructure solves many of these drawbacks under certain assumptions
Axially deformed solution of the Skyrme-Hartree-Fock-Bogolyubov equations using the transformed harmonic oscillator basis (III) hfbtho (v3.00): a new version of the program
We describe the new version 3.00 of the code HFBTHO that solves the nuclear
Hartree-Fock (HF) or Hartree-Fock-Bogolyubov (HFB) problem by using the
cylindrical transformed deformed harmonic oscillator basis. In the new version,
we have implemented the following features: (i) the full Gogny force in both
particle-hole and particle-particle channels, (ii) the calculation of the
nuclear collective inertia at the perturbative cranking approximation, (iii)
the calculation of fission fragment charge, mass and deformations based on the
determination of the neck (iv) the regularization of zero-range pairing forces
(v) the calculation of localization functions (vi)MPI interface for large-scale
mass table calculations.Comment: 29 pages, 3 figures, 4 tables; Submitted to Computer Physics
Communication
Solution of the Skyrme-Hartree-Fock-Bogolyubov equations in the Cartesian deformed harmonic-oscillator basis. (VII) HFODD (v2.49t): a new version of the program
We describe the new version (v2.49t) of the code HFODD which solves the
nuclear Skyrme Hartree-Fock (HF) or Skyrme Hartree-Fock-Bogolyubov (HFB)
problem by using the Cartesian deformed harmonic-oscillator basis. In the new
version, we have implemented the following physics features: (i) the isospin
mixing and projection, (ii) the finite temperature formalism for the HFB and
HF+BCS methods, (iii) the Lipkin translational energy correction method, (iv)
the calculation of the shell correction. A number of specific numerical methods
have also been implemented in order to deal with large-scale multi-constraint
calculations and hardware limitations: (i) the two-basis method for the HFB
method, (ii) the Augmented Lagrangian Method (ALM) for multi-constraint
calculations, (iii) the linear constraint method based on the approximation of
the RPA matrix for multi-constraint calculations, (iv) an interface with the
axial and parity-conserving Skyrme-HFB code HFBTHO, (v) the mixing of the HF or
HFB matrix elements instead of the HF fields. Special care has been paid to
using the code on massively parallel leadership class computers. For this
purpose, the following features are now available with this version: (i) the
Message Passing Interface (MPI) framework, (ii) scalable input data routines,
(iii) multi-threading via OpenMP pragmas, (iv) parallel diagonalization of the
HFB matrix in the simplex breaking case using the ScaLAPACK library. Finally,
several little significant errors of the previous published version were
corrected.Comment: Accepted for publication to Computer Physics Communications. Program
files re-submitted to Comp. Phys. Comm. Program Library after correction of
several minor bug
- âŠ