Sciweavers

INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
INFORMATICALT
2010
118views more  INFORMATICALT 2010»
13 years 6 months ago
A Novel Method for Multiple Criteria Analysis: Grey Additive Ratio Assessment (ARAS-G) Method
The paper presents the process of the selection of a potential supplier, which have to be the most appropriate to stakeholders. The selection is based on a set of criteria: Deliver...
Zenonas Turskis, Edmundas Kazimieras Zavadskas
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
13 years 6 months ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
INFORMATICALT
2010
110views more  INFORMATICALT 2010»
13 years 6 months ago
From XML to Relational Models
For many businesses and organizations, the achievement of interoperability has proven to be a highly desirable goal. However, without efficient schema mapping mechanisms or models ...
Elena Castro, Dolores Cuadra, Manuel Velasco
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 6 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 6 months ago
An Computation-Efficient Generalized Group-Oriented Cryptosystem
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the me...
Ting-Yi Chang
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
13 years 6 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
INFORMATICALT
2010
134views more  INFORMATICALT 2010»
13 years 6 months ago
Observability of Turing Machines: A Refinement of the Theory of Computation
The Turing machine is one of the simple abstract computational devices that can be used to investigate the limits of computability. In this paper, they are considered from several ...
Yaroslav D. Sergeyev, Alfredo Garro
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 6 months ago
Closed-Loop System Identification with Modifications of the Instrumental Variable Method
Least-squares method is the most popular method for parameter estimation. It is easy applicable, but it has considerable drawback. Under well-known conditions in the presence of no...
Nasko Atanasov, Alexander Ichtev