The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PAS(566hit)

361-380hit(566hit)

  • Improvement of One-Time Password Authentication Scheme Using Smart Cards

    Narn-Yih LEE  Jung-Chic CHEN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:9
      Page(s):
    3765-3767

    In 2002, Yeh, Shen, and Hwang proposed a one-time password authentication scheme using smart cards. However, Tsuji et al. and Ku et al. showed that it is vulnerable to the stolen verifier attack. Therefore, this paper proposes an improved one-time password authentication scheme, which not only keeps the security of the scheme of Yeh-Shen-Hwang but also can withstand the stolen verifier attack.

  • An Efficient Adaptive Feedback Cancellation for Hearing Aids

    Sang Min LEE  In Young KIM  Young Cheol PARK  

     
    LETTER-Speech and Hearing

      Vol:
    E88-A No:9
      Page(s):
    2446-2450

    Howling is very annoying problem to the hearing-aid users and it limits the maximum usable gain of hearing aids. We propose a new feedback cancellation system by inserting a time-varying decorrelation filter in the forward path. We use a second-order all-pass filter with control parameters whose time variation is implemented using a low-frequency modulator. A noticeable reduction of weight-vector misalignment is achievable using our proposed method.

  • Side-Coupled Microstrip Open-Loop Resonator for Harmonic-Suppressed Bandpass Filters

    Hang WANG  Lei ZHU  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:9
      Page(s):
    1893-1895

    A side-coupled microstrip open-loop resonator is presented for design of harmonic-suppressed bandpass filters with compact size. In geometry, the open-ended microstrip feed line is put in close proximity to the loop resonator at the opposite side of an opened-gap. In design, its length is properly lengthened to establish the orthogonal even- and odd-symmetrical current distributions along the two coupled strip conductors. It thus results in cancellation the 1st parasitic resonance. The two-stage open-loop filter is first constructed and its performance is studied under varied feed line lengths. Furthermore, a four-stage filter block is optimally designed at 2.52 GHz and its circuit sample is fabricated with the overall length less than 60% of one guided wavelength. The measured insertion loss at the 1st harmonic is higher than 30 dB, the stopband covers the range from 2.8 GHz to 7.0 GHz, and the dominant pass bandwidth is about 9.0%.

  • Novel Dual-Mode Circular Patch Bandpass Filter with Enhanced Stopband Performance

    Min-Hung WENG  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:9
      Page(s):
    1872-1879

    This investigation proposed a novel dual-mode circular patch bandpass filter (BPF) with enhanced stopband performance. The novelty of the proposed structure is to use a pair of square etched areas acting as a perturbation element on the circular patch resonator such that two split modes are coupled and the filter structure can be reduced. The coupling coefficients of two split modes are obtained. To improve the stopband performance, a pairs of H-shaped defected ground structure (DGS) cells are used below the input/output port to suppress the spurious response of the proposed BPF. The equivalent circuit of the DGS cell is discussed and the relations between bandstop characteristic and the suitable DGS dimensions are also investigated. The proposed BPF is demonstrated with a central frequency fo = 2.2 GHz, a 3-dB fractional bandwidth of 8% and a wider stopband of -35 dB from 2.5 to 6 GHz. Measured results of experimental filter have good agreement with the theoretical simulated results.

  • Linear and Nonlinear Macromodels for System-Level Signal Integrity and EMC Assessment

    Flavio CANAVERO  Stefano GRIVET-TALOCIA  Ivan A. MAIO  Igor S. STIEVANO  

     
    INVITED PAPER

      Vol:
    E88-B No:8
      Page(s):
    3121-3126

    This paper presents a systematic methodology for the system-level assessment of signal integrity and electromagnetic compatibility effects in high-speed communication and information systems. The proposed modeling strategy is illustrated via a case study consisting of a critical coupled net of a complex system. Three main methodologies are employed for the construction of accurate and efficient macromodels for each of the sub-structures typically found along the signal propagation paths, i.e. drivers/receivers, transmission-line interconnects, and interconnects with a complex 3D geometry such as vias and connectors. The resulting macromodels are cast in a common form, enabling the use of either SPICE-like circuit solvers or VHDL-AMS equation-based solvers for system-level EMC predictions.

  • Comparative Study of Radiation from Various Microstrip-Type MIC Elements Based on the FDTD Method and the Radiation Mode Theory

    Nagayoshi MORITA  Katsuhito OHNO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:8
      Page(s):
    1779-1784

    Radiation characteristics of various microstrip MIC passive elements are investigated in detail on the basis of accurate numerical analysis. For this purpose, the FD-TD method combined with the radiation mode theory is used. Summarized results are presented mainly from the viewpoint of making clear how radiation characteristics differ depending upon typical features of element structures and operating frequencies. Particularly important features of this paper are that not only radiation into the space region but also that in the substrate region is studied in detail for the first time. Suggestive remarks are given on positioning of active devices in MIC for avoiding interference from nearby elements.

  • Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture

    Wei-Chi KU  Shen-Tien CHANG  Min-Hung CHIANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:8
      Page(s):
    3451-3454

    Recently, Lin, Hwang, and Li proposed an efficient remote authentication scheme using smart cards for multi-server architecture based on the geometric property of the Euclidean plane. Herein, we show that their scheme is vulnerable to two forgery attacks and a password-guessing attack, and is not easily repairable. Furthermore, their scheme lacks a proper user eviction mechanism.

  • Optimal Design of Complex Two-Channel IIR QMF Banks with Equiripple Response

    Ju-Hong LEE  Yuan-Hau YANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E88-A No:8
      Page(s):
    2143-2153

    The optimal design of complex infinite impulse response (IIR) two-channel quadrature mirror filter (QMF) banks with equiripple frequency response is considered. The design problem is appropriately formulated to result in a simple optimization problem. Therefore, based on a variant of Karmarkar's algorithm, we can efficiently solve the optimization problem through a frequency sampling and iterative approximation method to find the complex coefficients for the IIR QMFs. The effectiveness of the proposed technique is to form an appropriate Chebyshev approximation of a desired response and then find its solution from a linear subspace in several iterations. Finally, simulation results are presented for illustration and comparison.

  • Proposal of Switching Speed Reduction Method Using Chaotic Spreading Sequence in Direct Optical Switching CDMA Radio-on-Fiber Network and Its Experimental Investigation

    Takeshi HIGASHINO  Katsutoshi TSUKAMOTO  Shozo KOMAKI  

     
    PAPER-Communication Systems

      Vol:
    E88-C No:7
      Page(s):
    1475-1482

    The direct optical switching CDMA radio-on-fiber network is proposed as multiplexing method for radio base stations in microcell/picocell technologies. In this system, aliasing distortions degrade the received signal quality and decreases the number of connectable radio base stations (RBSs) when the encoding rate becomes lower than the twice of bandwidth of RF signal. This paper proposes the optical switching speed reduction method and clarifies that the chaotic spreading sequences can suppress the aliasing distortion without additional processing at the receiver even if the encoding rate becomes lower than the RF signal bandwidth. The effect in switching speed reduction is theoretically investigated and the effect in aliasing distortions suppression is experimentally investigated by using the proposed method.

  • Miniaturized High-Temperature Superconducting Microstrip and Coplanar Waveguide Filters

    Zhewang MA  Yoshio KOBAYASHI  

     
    PAPER-Resonators & Filters

      Vol:
    E88-C No:7
      Page(s):
    1406-1411

    Two types of miniaturized high-temperature superconducting filters are described in this paper. The first type is developed by using small-sized microstrip spiral resonators, and the second type by coplanar waveguide quarter-wavelength resonators. The filters have significantly reduced size compared with many previous HTS filters. They are designed by employing an electromagnetic simulator in combination with appropriately chosen equivalent circuits. Their measured frequency responses agree well with theoretical predictions, and show low insertion losses in spite of their small sizes.

  • A Cycle Search Algorithm Based on a Message-Passing for the Design of Good LDPC Codes

    Sang Hyun LEE  Kwang Soon KIM  Yun Hee KIM  Jae Young AHN  

     
    PAPER-Coding Theory

      Vol:
    E88-A No:6
      Page(s):
    1599-1604

    A cycle search algorithm based on a message-passing in a Tanner graph is proposed for designing good LDPC codes. By applying the message-passing algorithm with a message alphabet composed of only two messages to a cycle search, we can perform a cycle search with less computational complexity than tree-based search algorithms. Also, the proposed algorithm can be easily implemented by using an existing message-passing decoder and can easily adopt different kind of criteria for an LDPC code design with a slight modification in the node update equations.

  • Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks

    Eun-Jun YOON  Kee-Young YOO  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:6
      Page(s):
    2627-2628

    Recently, Yeh et al. proposed an improvement on Zhu et al.'s password based authenticated key exchange protocol based on RSA, in order to make the protocol withstand undetectable on-line password guessing attacks and also to provide explicit key authentication. The improved scheme, however, is still susceptible to off-line password guessing attacks. Accordingly, the current letter demonstrates the vulnerability of Yeh et al.'s scheme regarding off-line password guessing attacks.

  • Periodically Nonuniform Coupled Microstrip Lines with Equalized Even- and Odd-Mode Velocities for Harmonic Suppression in Filter Design

    Sheng SUN  Lei ZHU  

     
    PAPER

      Vol:
    E88-B No:6
      Page(s):
    2377-2382

    Periodically nonuniform coupled microstrip line (PNC-ML) loaded with transverse slits is characterized using the fullwave method of moments and short-open calibration technique. Guided-wave characteristics of both even- and odd-modes are thoroughly investigated in terms of two extracted per-unit-length transmission parameters, i.e., phase constants and characteristic impedances. As such, frequency-dependent coupling between the lines of the finite-extended PNCML is exposed via two dissimilar impedances. Meanwhile, two phase constants try to be equalized at a certain frequency by properly adjusting the slit depth and periodicity, aiming at realizing the transmission zero. Further, equivalent J-inverter network parameters of this finite-length PNCML are derived to reveal the relationship between the transmission zero and harmonic resonance. By allocating this zero to the frequency twice the fundamental passband, one-stage and two-stage PNCML filters are then designed, fabricated and measured to showcase the advantageous capacity of the proposed technique in harmonic suppression.

  • Practical Passive Filter Synthesis Using Genetic Programming

    Hao-Sheng HOU  Shoou-Jinn CHANG  Yan-Kuin SU  

     
    PAPER-CAD

      Vol:
    E88-C No:6
      Page(s):
    1180-1185

    This paper proposes a genetic programming method to synthesize passive filter circuits. This method allows both the circuit topology and the component values to be evolved simultaneously. Experiments show that this method is fast and capable of generating circuits which are more economical than those generated by traditional design approaches. In addition, we take into account practical design considerations at high-frequency applications, where the component values are frequency-dependent and restricted to some discrete values. Experimental results show that our method can effectively generate not only compliant but also economical circuits for practical design tasks.

  • Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards

    Wei-Chi KU  Shen-Tien CHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:5
      Page(s):
    2165-2167

    Recently, Das et al. proposed a dynamic ID-based verifier-free password authentication scheme using smart cards. To resist the ID-theft attack, the user's login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.'s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, we also show several minor weaknesses of Das et al.'s scheme.

  • A Novel Dielectric Resonator Bandpass Filter with Variable Attenuation Poles for Duplexer Applications

    Young-Je SUNG  Sang-Ho CHO  Young-Sik KIM  

     
    LETTER-Devices/Circuits for Communications

      Vol:
    E88-B No:4
      Page(s):
    1661-1664

    In this paper a novel dielectric resonator (DR) bandpass filter (BPF) with flexible arrangement of attenuation poles is proposed. This DR filter is similar to a conventional DR filter except adding a microstrip line below a DR, which not only shifts the location of attenuation poles, but also improves skirt characteristics. The duplexer with the proposed DR BPF has been yielded better isolation and sharper skirt behavior than that with a conventional DR filter. The implemented duplexer has shown a good performance and been well agreed with the simulation.

  • Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme

    Dae Hyun YUM  Pil Joong LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:4
      Page(s):
    1647-1648

    Yeh, Shen, and Hwang recently proposed a secure one-time password authentication scheme using smart cards. They modified the famous S/KEY scheme to achieve security against preplay attacks and off-line dictionary attacks. However, this article shows that their scheme is vulnerable to preplay attacks.

  • Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange

    Shuhong WANG  Feng BAO  Jie WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:4
      Page(s):
    1641-1646

    In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that it is efficient enough to be implemented on most of the target low-power devices such as smart cards and low-power Personal Digital Assistants in imbalanced wireless networks. Recently, YEH et al. claimed that Zhu et al.'s protocol not only is insecure against undetectable on-line password guessing attack but also does not achieve explicit key authentication. Thus they presented an improved version. Unfortunately, we find that YEH et al.'s password guessing attack does not come into existence, and that their improved protocol is vulnerable to off-line dictionary attacks. In this paper we describe our observation in details, and also comment for the original protocol on how to achieve explicit key authentication as well as resist against other existent attacks.

  • Azim: Direction-Based Service System for Both Indoors and Outdoors

    Yohei IWASAKI  Nobuo KAWAGUCHI  Yasuyoshi INAGAKI  

     
    PAPER-Application

      Vol:
    E88-B No:3
      Page(s):
    1034-1044

    In this paper, we propose an advanced location-based service that we call a direction-based service, which utilizes both the position and direction of a user. The direction-based service enables a user to point to an object of interest for command or investigation. We also describe the design, implementation and evaluations of a direction-based service system named Azim. With this system, the direction of the user can be obtained by a magnetic-based direction sensor. The sensor is also used for azimuth-based position estimation, in which a user's position is estimated by having the user point to and measure azimuths of several markers or objects whose positions are already known. Because this approach does not require any other accurate position sensors or positive beacons, it can be deployed cost-effectively. Also, because the measurements are naturally associated with some degree of error, the position is calculated as a probability distribution. The calculation considers the error of direction measurement and the pre-obtained field information such as obstacles and magnetic field disturbance, which enables robust position measurements even in geomagnetically disturbed environments. For wide-area use, the system also utilizes a wireless LAN to obtain rough position information by identifying base stations. We have implemented a prototype system for the proposed method and some applications for the direction-based services. Furthermore, we have conducted experiments both indoors and outdoors, and exemplified that positioning accuracy by the proposed method is precise enough for a direction-based service.

  • A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Information Security

      Vol:
    E88-A No:3
      Page(s):
    736-754

    Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review the previous AKE protocols, all of which turn out to be insecure, under the following realistic assumptions: (1) High-entropy secrets that should be stored on devices may leak out due to accidents such as bugs or mis-configureations of the system; (2) The size of human-memorable secret, i.e. password, is short enough to memorize, but large enough to avoid on-line exhaustive search; (3) TRM (Tamper-Resistant Modules) used to store secrets are not perfectly free from bugs and mis-configurations; (4) A client remembers only one password, even if he/she communicates with several different servers. Then, we propose a simple leakage-resilient AKE protocol (cf.[41]) which is described as follows: the client keeps one password in mind and stores one secret value on devices, both of which are used to establish an authenticated session key with the server. The advantages of leakage-resilient AKEs to the previous AKEs are that the former is secure against active adversaries under the above-mentioned assumptions and has immunity to the leakage of stored secrets from a client and a server (or servers), respectively. In addition, the advantage of the proposed protocol to is the reduction of memory size of the client's secrets. And we extend our protocol to be possible for updating secret values registered in server(s) or password remembered by a client. Some applications and the formal security proof in the standard model of our protocol are also provided.

361-380hit(566hit)