161 research outputs found

    Compound Multiple Access Channel with Confidential Messages

    Full text link
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate regions of compound MAC and compound MAC with confidential messages.Comment: Accepted at IEEE ICC 2014. arXiv admin note: substantial text overlap with arXiv:1402.479

    Medindo a satisfação dos moradores do município de Mehregan, em Mashhad, na perspectiva da habitação sustentável

    Get PDF
    Demographic developments in Mashhad and surrounding rural areas which are now considered urban break points It is well established that these areas have become centers of attraction for low-income immigrants who intend to migrate to Mashhad, as well as low-income urban strata that have previously lived in Mashhad. Since all four types of worn-out urban textures, including urban heritage, non-urban, marginal and rural urban textures, are the middle and lower decay habitats, "The 5000 unit project of Mehregan Town of Mashhad" has played an important role in the physical and functional organization of these tissues and responding to the needs of the poor. In view of the above, and several years after the project was inaugurated, the superstructure and infrastructure problems of the project are the subject of research in this research. The research method in this study was descriptive-analytical and applied. According to the number of households in the city that formed the statistical population of the study, and based on Cochran's formula, the sample population was 366 persons. Also, Delphi method has distributed 32 questionnaires to expert experts. Descriptive and inferential statistical analysis of completed questionnaires and experts has been done with the help of nonparametric and parametric statistical methods. The results of field surveys showed that the observed frequency of low-satisfaction residents was 222 and above all, so it is safe to say that 95% of respondents are not satisfied with their residence in Mehregan town. It is believed that the residential units constructed in Mehregan town of Mashhad have poor compliance with the standards and standards of sustainable housing.Desenvolvimentos demográficos em Mashhad e áreas rurais circunvizinhas que agora são consideradas pontos de ruptura urbana Está bem estabelecido que essas áreas se tornaram centros de atração para imigrantes de baixa renda que pretendem migrar para Mashhad, bem como estratos urbanos de baixa renda que anteriormente morava em Mashhad. Como todos os quatro tipos de texturas urbanas desgastadas, incluindo herança urbana, texturas urbanas não urbanas, marginais e rurais, são habitats de decadência média e baixa, "O projeto da unidade de 5000 unidades da cidade de Mehregan, Mashhad" desempenhou um papel importante. a organização física e funcional desses tecidos e a resposta às necessidades dos pobres. Tendo em vista o exposto, e vários anos após a inauguração do projeto, os problemas de superestrutura e infraestrutura do projeto são objeto de pesquisa nesta pesquisa. O método de pesquisa neste estudo foi descritivo-analítico e aplicado. De acordo com o número de domicílios da cidade que formaram a população estatística do estudo, e com base na fórmula de Cochran, a população da amostra era de 366 pessoas. Além disso, o método Delphi distribuiu 32 questionários para especialistas. A análise estatística descritiva e inferencial dos questionários e especialistas preenchidos foi realizada com a ajuda de métodos estatísticos não paramétricos e paramétricos. Os resultados de pesquisas de campo mostraram que a frequência observada de residentes de baixa satisfação era 222 e, acima de tudo, portanto, é seguro dizer que 95% dos entrevistados não estão satisfeitos com sua residência na cidade de Mehregan. Acredita-se que as unidades residenciais construídas na cidade de Mashhad, em Mehregan, não cumpram com os padrões e padrões de habitação sustentável

    Desynchronization Attack on RAPP Ultralightweight Authentication Protocol

    Get PDF
    RAPP (RFID Authentication Protocol with Permutation) is a recently proposed efficient ultralightweight authentication protocol. The operation used in this protocol is totally different from the other existing ultralightweight protocols due to the use of new introduced data dependent permutations and avoidances of modular arithmetic operations and biased logical operations such as AND and OR. The designers of RAPP claimed that this protocol resists against desynchronization attacks since the last messages of the protocol is sent by the reader and not by the tag. This letter challenges this assumption and shows that RAPP is vulnerable against desynchronization attack. This attack has a remarkable probability of success and is effective whether Hamming weight-based or modular-based rotations are used by the protocol

    Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

    Get PDF
    Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of authentication protocols have been proposed in the literature. In 2010, Yeh et al’s proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. They claimed that this protocol is secure against DoS attack, replay attack, DATA forgery attack, and provides untraceability and forward secrecy. In 2012, Yoon showed that this protocol does not provide forward secrecy and DATA integrity. He improved the protocol and tried to eliminate the weaknesses and claimd that the improved protocol does not have the weaknesses of the primary protocol. In this paper, we show that the improved protocol has some weaknesses including DoS attack, back-end server impersonation, tag impersonation and DATA forgery attack. We also show that it can not provide forward secrecy of the reader and untraceability. We improve the protocol, which offers a high level of security and provides mutual authentication, untraceability and forward secrecy as well as resistance to DATA forgery, replay and DoS attacks, while retaining a competitive communication cost

    The effect of descriptive evaluation of elementary school third grade subjects on academic achievement of students

    Get PDF
    The goal of this research was the effect of descriptive evaluation of elementary school third grade subjects on academic achievement of students and its comparison with traditional evaluation. The statistical population of the research included all female third grade students of elementary schools in ZarrinShahr in academic year of 2012-2013 who were a total number of 742 students as well as the elementary school third grade teachers who were a number of 34 teachers. Among them a number of 147 students and 28 teachers were selected via cluster sampling. Research methodology in this study was of survey-descriptive type. The research tools were checklists and a questionnaire of opinion toll, made by the researcher. To assess the validity of the tools used, the face validity and content validity were used and the validity of the questionnaire was estimated as a=0.93. Chi square test was used to analyze the research questions. The results of the research showed that using different methods of descriptive evaluation has been effective in improving the students’ performances in such subjects as the Holy Quran, social sciences, arts, science & Persian, while it has not been effective in improving their performances in such subjects as heavenly gifts (the Holy Quran for elementary students) and mathematics. Finally, the results of opinion toll showed that the teachers found descriptive evaluation more suitable than traditional evaluation in evaluating all the third grade subjects of elementary school. Keywords: Evaluation, Descriptive evaluation, Traditional evaluation, Students’ performances

    Investigating the Efficacy of Sumac Topical Solution Against Permethrin-resistant Human Head Lice

    Get PDF
    Background: The present study aimed at determining the efficacy of applying Rhus coriaria (Sumac) solution for the treatment of Permethrin-resistant head louse in patients, who used permethrin for at least 2 consecutive periods, but have not been cured.Methods: This study is a before-after clinical trial performed on 100 patients with pediculosis aged between 2 and 50 years old and both sexes. All patients had used Permethrin at least twice consecutively (with at least 14 days interval) according to correct instructions (on the first and 7th day), but they have not been cured. Each patient received 60ml of Rhus coriaria solution for 3 consecutive days, and the treatment was repeated again for another 3 days; then, the patients were followed-up on the 4th, 10th, and14th days after the treatment.Results: The results showed a significant difference in the severity of head lice infection and itching before the treatment and 14 days after the treatment (P<0.001).Conclusion: Rhus coriaria solution was more effective in eliminating head-louse infestations on 4, 10, and 14 days after the treatment and itching disappeared in most of the patients, while negligible complications were observed

    An Improved Truncated Differential Cryptanalysis of KLEIN

    Get PDF
    KLEIN is a family of lightweight block ciphers which proposed at RFIDSec 2011 by Gong et al. It has a 64-bit state and 64, 80 or 96-bit key size which introduce its version. It uses 16 same 4-bit Sboxes combined with two AES\u27s MixColumn transformations for each round. This approach allows compact implementations of KLEIN in both low-end software and hardware. Such an innovative combination attracts the attention of cryptanalysts, and several security analyses have been published. The most successful one was represented in FSE\u2715 which was a truncated differential attack. They could attack up to 12, 13 and 14 rounds out of total number of 12, 16 and 20 rounds for KLEIN-64, -80 and -96, respectively. In this paper, by finding more efficient truncated differential paths and a slight improving in key recovery method we present two new truncated differential attacks on KLEIN, which recover the full secret key with better time and data complexities for the previously analyzed number of rounds. Also by using these truncated differential paths we are able to attack up to 14 and 15 rounds for KLEIN-80 and -96, respectively, which are the highest rounds ever analyzed
    • …
    corecore