483 research outputs found

    Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Get PDF
    Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography

    Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    Get PDF
    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Full text link
    This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements

    To study the procurement process and develop a conceptual framework model in the Pakistani construction industry

    Get PDF
    Procurement of equipment and materials in any construction project holds a tremendous significance for the project to be completed on time and within the budget. In this research, procurement in the Pakistan’s construction industry has been studied and a conceptual framework in terms of e-procurement portal has been suggested to smoothly execute the process of e-procurement by mitigating the barriers involved in the concerned process. A questionnaire survey form has been developed and 100 responses have been recorded to take the input from industry experts on the proposed procurement framework. A total of 84 respondents out of 100 thought that the proposed framework will be a better way to solve the problems that come up during the procurement process. Furthermore, it was also found that the main reason for procurement delays in construction projects is lack of communication and coordination among different departments within an organization, to which the suggested framework can be used as a potential tool to deal with

    Melanotic Neuroectodermal Tumour of Infancy: A Rare Brain Tumour of Childhood

    Get PDF
    Melanotic neuroectodermal tumour of infancy is a rare, mostly benign but locally aggressive tumour of neural crest cellorigin occurring in infants. The most commonly affected anatomic site is the maxilla. Such tumours of the brain and skull are very rare. We present the case of an 8 months old baby girl whose presenting complaint was a swelling in the scalp for 6 months. She was otherwise asymptomatic. CT imaging confirmed the presence of an osteolytic tumour in the anterior parasagittal skull with dural involvement. The tumour was surgically excised enbloc. The patient has been well at 2 years follow-up without any evidence of recurrence

    Trade diversification and Economic Growth of Pakistan

    Get PDF
    Objective: This paper examines Verdoorn hypothesis for Pakistan with its trading partners, Bangladesh, India, Indonesia and Malaysia. The another objective of this paper is to analyse shortrun and longrun association between intra-industry trade and its determinants, population growth, free trade agreement, term of trade and economic growth. Research Gap: In Authors’ best knowledge, few research papers have analysed benefits of intra-industry trade and incorporate its determinants for four trading partners countries Bangladesh, India, Indonesia, and Malaysia. Design/Methodology/Approach: Grubel and Lloyd Index employed to estimate Intra-Industry Trade. The paper also estimates ARDL cointegration test, with three estimators Pooled Mean Group (PMG), Mean Group (MG), and Dynamic Fixed Effect (DFE), and Error Correction Model to find out shortrun and long-run association between intra-industry trade and its factors for Pakistan with its trading Partners by using panel data from 2000 to 2002. The Main Findings: Verdoorn Index has found positive for Pakistan and ARDL model also found long-run cointegration with speed of adjustment 1.6014. Population growth and terms of trade are positively associated with intra-industry Trade in the shortrun but these variables are insignificant with intra-industry trade in the long-run for Pakistan. The free trade agreement and real GDP, both, are positively associated long-run and shortrun with intra-industry trade. Theoretical / Practical Implications of the Findings: The policymakers should diversify Pakistan international trade and improve infrastructure to reduce transport cost and other cost to expand economic growth. Originality/Value: Some research papers have analysed IIT for Pakistan but these research papers do not consider impact of these determinants on Intra-industry trade for Pakistan and its trading partners

    PRIMARY GASTROINTESTINAL STROMAL TUMOUR OF THE PROSTATE: A CASE REPORT OF A RARE TUMOUR

    Get PDF
    A 70-year-old gentleman underwent prostatectomy for bladder outlet obstruction due to enlarged prostate and was found to have primary extragastrointestinal stromal tumour (EGIST). He has been started on imatinib therapy and is presently on follow-up. Prostatic EGIST should be one of the differential diagnoses in patients with enlarged prostate with normal prostate-specific antigen levels.Key words: Prostate, gastrointestinal stromal tumour, PSA 
    • 

    corecore