76 research outputs found
Lightweight password hashing scheme for embedded systems
Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized. The limited and old-fashioned solutions led the international cryptographic community to conduct the Password Hashing Competition (PHC). The competition will propose a small portfolio of schemes suitable for widespread usage until 2015. Embedded systems form a special application domain, utilizing devices with inherent computational limitations. Lightweight cryptography focuses in designing schemes for such devices and targets moderate levels of security. In this paper, a lightweight poly PHS suitable for lightweight cryptography is presented. At first, we design two lightweight versions of the PHC schemes Catena and PolyPassHash. Then, we integrate them and implement the proposed scheme – called LightPolyPHS. A fair comparison with similar proposals on mainstream computer is presented
Relevance of Induced Gauge Interactions in Decoherence
Decoherence in quantum cosmology is shown to occur naturally in the presence
of induced geometric gauge interactions associated with particle production.A
new 'gauge '-variant form of the semiclassical Einstein equations is also
presented which makes the non-gravitating character of the vacuum polarisation
energy explicit.Comment: 10 pages, LATEX, IC/94/16
Chigutisaurid temnospondyls from the Late Triassic of India and a review of the Family Chigutisauridae
Volume: 38Start Page: 313End Page: 33
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
Forrest et al introduced a new intrusion detection approach that identifies anomalous sequences of system calls executed by programs. Since their work, anomaly detection on system call sequences has become perhaps the most successful approach for detecting novel intrusions. A natural way for learning sequences is to use a finite-state automaton (FSA). However, previous research seemed to indicate that FSA-learning is computationally expensive, that it cannot be completely automated, or that the space usage of the FSA may be excessive. We present a new approach in this paper that overcomes these difficulties. Our approach builds a compact FSA in a fully automatic and efficient manner, without requiring access to source code for programs. The space requirements for the FSA is low --- of the order of a few kilobytes for typical programs. The FSA uses only a constant time per system call during the learning as well as detection period. This factor leads to low overheads for intrusion detection. Unlike many of the previous techniques, our FSA-technique can capture both short term and long term temporal relationships among system calls, and thus perform more accurate detection. For instance, the FSA can capture common program structures such as branches, joins, loops etc. This enables our approach to generalize and predict future behaviors from past behaviors. For instance, if a program executed a loop once in an execution, the FSA approach can generalize and predict that the same loop may be executed zero or more times in subsequent executions. As a result, the training periods needed for our FSA based approach are shorter. Moreover, false positives are reduced without increasing the likelihood of missing attacks. This paper describes our FSA based technique and presents a ..
Comparison of Indian clinical practice guidelines for the management of hypertension with the World Health Organization, International Society of Hypertension, American, and European guidelines
Hypertension is the leading risk factor for preventable cardiovascular diseases and all-cause mortality globally, with majority of the hypertension-attributed deaths occurring in low- and middle-income countries like India. Several international and national clinical practice guidelines (CPGs) provide evidence-informed recommendations to achieve optimal control. CPGs produced by the World Health Organization, International Society for Hypertension, American (AHA/ACC-2017), and European (ESC/ESH-2018) are “major” as they are widely used and are highly cited. We compared the main recommendations for the pharmacological management of hypertension among the major CPGs and the two existing Indian CPGs for similarities and shortcomings. Several deviations from the major CPGs were observed among Indian CPGs. Important shortcomings pertain to Indian CPGs’ low priority for initial combination therapy and the use of single pill combinations. Having multiple CPGs providing conflicting recommendations might discourage the adoption of evidence-based practices. There is a need for updating Indian CPGs based on up-to-date evidence
- …