76 research outputs found

    Lightweight password hashing scheme for embedded systems

    Get PDF
    Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized. The limited and old-fashioned solutions led the international cryptographic community to conduct the Password Hashing Competition (PHC). The competition will propose a small portfolio of schemes suitable for widespread usage until 2015. Embedded systems form a special application domain, utilizing devices with inherent computational limitations. Lightweight cryptography focuses in designing schemes for such devices and targets moderate levels of security. In this paper, a lightweight poly PHS suitable for lightweight cryptography is presented. At first, we design two lightweight versions of the PHC schemes Catena and PolyPassHash. Then, we integrate them and implement the proposed scheme – called LightPolyPHS. A fair comparison with similar proposals on mainstream computer is presented

    Relevance of Induced Gauge Interactions in Decoherence

    Full text link
    Decoherence in quantum cosmology is shown to occur naturally in the presence of induced geometric gauge interactions associated with particle production.A new 'gauge '-variant form of the semiclassical Einstein equations is also presented which makes the non-gravitating character of the vacuum polarisation energy explicit.Comment: 10 pages, LATEX, IC/94/16

    Chigutisaurid temnospondyls from the Late Triassic of India and a review of the Family Chigutisauridae

    Full text link
    Volume: 38Start Page: 313End Page: 33

    A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors

    Full text link
    Forrest et al introduced a new intrusion detection approach that identifies anomalous sequences of system calls executed by programs. Since their work, anomaly detection on system call sequences has become perhaps the most successful approach for detecting novel intrusions. A natural way for learning sequences is to use a finite-state automaton (FSA). However, previous research seemed to indicate that FSA-learning is computationally expensive, that it cannot be completely automated, or that the space usage of the FSA may be excessive. We present a new approach in this paper that overcomes these difficulties. Our approach builds a compact FSA in a fully automatic and efficient manner, without requiring access to source code for programs. The space requirements for the FSA is low --- of the order of a few kilobytes for typical programs. The FSA uses only a constant time per system call during the learning as well as detection period. This factor leads to low overheads for intrusion detection. Unlike many of the previous techniques, our FSA-technique can capture both short term and long term temporal relationships among system calls, and thus perform more accurate detection. For instance, the FSA can capture common program structures such as branches, joins, loops etc. This enables our approach to generalize and predict future behaviors from past behaviors. For instance, if a program executed a loop once in an execution, the FSA approach can generalize and predict that the same loop may be executed zero or more times in subsequent executions. As a result, the training periods needed for our FSA based approach are shorter. Moreover, false positives are reduced without increasing the likelihood of missing attacks. This paper describes our FSA based technique and presents a ..

    ERRATUM: "Analysis on a Fractal Set," Raut and Datta

    Full text link

    Comparison of Indian clinical practice guidelines for the management of hypertension with the World Health Organization, International Society of Hypertension, American, and European guidelines

    Full text link
    Hypertension is the leading risk factor for preventable cardiovascular diseases and all-cause mortality globally, with majority of the hypertension-attributed deaths occurring in low- and middle-income countries like India. Several international and national clinical practice guidelines (CPGs) provide evidence-informed recommendations to achieve optimal control. CPGs produced by the World Health Organization, International Society for Hypertension, American (AHA/ACC-2017), and European (ESC/ESH-2018) are “major” as they are widely used and are highly cited. We compared the main recommendations for the pharmacological management of hypertension among the major CPGs and the two existing Indian CPGs for similarities and shortcomings. Several deviations from the major CPGs were observed among Indian CPGs. Important shortcomings pertain to Indian CPGs’ low priority for initial combination therapy and the use of single pill combinations. Having multiple CPGs providing conflicting recommendations might discourage the adoption of evidence-based practices. There is a need for updating Indian CPGs based on up-to-date evidence
    • …
    corecore