11,773 research outputs found

    Eavesdropping on GSM: state-of-affairs

    Get PDF
    In the almost 20 years since GSM was deployed several security problems have been found, both in the protocols and in the - originally secret - cryptography. However, practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies. This could change due to recently developed open-source equipment and software that can capture and digitize signals from the GSM frequencies. This might make practical attacks against GSM much simpler to perform. Indeed, several claims have recently appeared in the media on successfully eavesdropping on GSM. When looking at these claims in depth the conclusion is often that more is claimed than what they are actually capable of. However, it is undeniable that these claims herald the possibilities to eavesdrop on GSM using publicly available equipment. This paper evaluates the claims and practical possibilities when it comes to eavesdropping on GSM, using relatively cheap hardware and open source initiatives which have generated many headlines over the past year. The basis of the paper is extensive experiments with the USRP (Universal Software Radio Peripheral) and software projects for this hardware.Comment: 5th Benelux Workshop on Information and System Security (WISSec 2010), November 201

    On the type and the standardform of induced UA representations

    Get PDF
    We derive to which of the three types an irreducible UA representation which is obtained with the procedure of generalised induction belongs. We analyse the question whether or not the irreducible induced UA representations are on standardform. The results hold as well for induced PUA representations

    On the determination of factor systems of PUA representations

    Get PDF
    A method is developed to obtain a complete set of inequivalent factor systems of PUA � representations of a group with a subgroup of index two from the factor systems of this subgroup

    Twistor space, Minkowski space and the conformal group

    Get PDF
    It is shown that the conformal group of compactified Minkowski space is isomorphic to a group of rays of semilinear transformations of twistor space. The action of the conformal group on twistor space is given by an explicit realisation of this isomorphism. In this way we determine the transformation of twistor space under space inversion and time inversion

    Multiconditional Approximate Reasoning with Continuous Piecewise Linear Membership Functions

    Get PDF
    It is shown that, for some intersection and implication functions, an exact and efficient algorithm exists for the computation of inference results in multiconditional approximate reasoning on domains which are finite intervals of the real numbers, when membership functions are restricted to functions which are continuous and piecewise linear. An implementation of the algorithm is given in the functional programming language Miranda

    On the factor systems of the Shubnikov space groups

    Get PDF
    The procedure of Backhouse for the determination of a complete set of inequivalent factor systems of the symmorphic Shubnikov space groups of type I is generalized for all Shubnikov space groups of types I and 111. The results are used to obtain a method for the construction of a set of inequivalent factor systems of the Shubnikov space groups of types I1 and IV

    Efficient algorithms for approximate reasoning

    Get PDF
    We present algorithms for approximate reasoning computations, for some intersection and implication functions, which are as efficient as E.H. Mamdani et al.'s (1975) interpolation method. Implementations of the algorithms are given in the functional language Mirand

    Induced PUA representations and selection rules

    Get PDF
    Well known properties of induced unitary representations are generalised for induced PUA representations. They are applied to obtain an expression for the multiplicities in the Clebsch-Gordon series of induced PUA representations. Finally we show how these multiplicities can be used for the determination of selection rules

    Static Analysis of Functional Programs

    Get PDF
    In this paper, the static analysis of programs in the functional programming language Miranda* is described based on two graph models. A new control-flow graph model of Miranda definitions is presented, and a model with four classes of callgraphs. Standard software metrics are applicable to these models. A Miranda front end for Prometrix, ¿, a tool for the automated analysis of flowgraphs and callgraphs, has been developed. This front end produces the flowgraph and callgraph representations of Miranda programs. Some features of the metric analyser are illustrated with an example program. The tool provides a promising access to standard metrics on functional programs
    • …
    corecore