• Title/Summary/Keyword: Wang Hong

Search Result 1,099, Processing Time 0.033 seconds

On the Minimax Disparity Obtaining OWA Operator Weights

  • Hong, Dug-Hun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.273-278
    • /
    • 2009
  • The determination of the associated weights in the theory of ordered weighted averaging (OWA) operators is one of the important issue. Recently, Wang and Parkan [Information Sciences 175 (2005) 20-29] proposed a minimax disparity approach for obtaining OWA operator weights and the approach is based on the solution of a linear program (LP) model for a given degree of orness. Recently, Liu [International Journal of Approximate Reasoning, accepted] showed that the minimum variance OWA problem of Fuller and Majlender [Fuzzy Sets and Systems 136 (2003) 203-215] and the minimax disparity OWA problem of Wang and Parkan always produce the same weight vector using the dual theory of linear programming. In this paper, we give an improved proof of the minimax disparity problem of Wang and Parkan while Liu's method is rather complicated. Our method gives the exact optimum solution of OWA operator weights for all levels of orness, $0\leq\alpha\leq1$, whose values are piecewise linear and continuous functions of $\alpha$.

Dictionary attack of remote user authentication scheme using side channel analysis (부채널 분석을 이용한 원거리 사용자 인증 기법의 사전공격)

  • Kim, Yong-Hun;Youn, Taek-Young;Park, Young-Ho;Hong, Seok-Hee
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.62-68
    • /
    • 2008
  • Remote user authentication scheme is a cryptographic tool which permits a server to identify a remote user. In 2007, Wang et al. pointed out that Ku's remote user authentication scheme is vulnerable to a dictionary attack by obtaining some secret information in a smart card using side channel attacks. They also proposed a remote user authentication scheme which is secure against dictionary attack. In this paper, we analyze the protocol proposed by Wang et al. In the paper, it is claimed that the protocol is secure even though some values, which is stored in a smart card, are revealed to an adversary, However, we show that their protocol is insecure if the values are disclosed to an adversary.