Mathematics / Matematik

Permanent URI for this collectionhttps://hdl.handle.net/11147/8

Browse

Search Results

Now showing 1 - 10 of 18
  • Conference Object
    On the Relativistic Supersymmetric Quantum Mechanics
    (Springer Verlag, 2002) Mir-Kasimov, Rufat M.; Kasım, Rıfat Mir
    The present paper is devoted to the one-dimensional relativistic supersymmetric quantum mechanics (RSUSYQM). A short formulation of RSUSYQM is given. We show that RSUSYQM is a q-deformed non-relativistic SUSYQM. Two simple examples are given.
  • Conference Object
    Measure on Time Scales With Mathematica
    (Springer Verlag, 2006) Ufuktepe, Ünal; Yantır, Ahmet
    In this paper we study the Lebesgue Delta-measure on time scales. We refer to [3, 4] for the main notions and facts from the general measure and Lebesgue Delta integral theory. The objective of this paper is to show how the main concepts of Mathematica can be applied to fundamentals of Lebesgue Delta- and Lebesgue Delta- measure on an arbitrary time scale and also on a discrete time scale whose rule is given by the reader. As the time scale theory is investigated in two parts, by means of alpha and rho operators, we named the measures on time scales by the set function DMeasure and NMeasure respectively for arbitrary time scales.
  • Article
    An Application With Webmathematica
    (Springer Verlag, 2003) Ufuktepe, Ünal
    There have been many technological dawns in the last 30 years, during which the desktop computer and the Internet have been developed. The importance of Internet in education, particularly using its Web is a well-recognized fact. A wealth of resources and techniques now exist which serve as a source both for exciting examples of new teaching practices, as well as easily accessible methods for adoption into various formats of teaching and learning. Internet technology allow teachers and students keep up with their minds. It let them try their ideas as soon as they come up with them. Generally, students appreciate the convenience, choice, and flexibility that an online courses offers. Instructional designers value the standardized framework and flexibility. WebMathematica is a web-based technology developed by Wolfram Research that allows the generation of dynamic web content with Mathematica. With this technology, the distance education students should be able to explore and experiment with the mathematical concepts. In this paper we will elucidate the pedagogical issues in the application of Hamiltonian systems in the webMathematica for the distance learning environment and the shape of the future "classroom" as well as relevant educational strategies towards improving mathematics education.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 1
    Basic Calculus on Time Scale With Mathematica
    (Springer Verlag, 2003) Yantır, Ahmet; Ufuktepe, Ünal
    Mathematical modeling of time dependent systems are always interesting for applied mathematicians. First continuous and then discrete mathematical modeling are built during the mathematical development from ancient to the modern times. By the discovery of the time scales, the problem of irregular controlling of time dependent systems is solved in 1990's. In this paper, we explain the derivative of functions on time scales and the solutions of some basic calculus problems by using Mathematica. © Springer-Verlag Berlin Heidelberg 2003.
  • Article
    Citation - WoS: 30
    Citation - Scopus: 33
    The Initial Stage of Dam-Break Flow
    (Springer Verlag, 2009) Korobkin, Alexandre; Yılmaz, Oğuz
    The liquid flow and the free surface shape during the initial stage of dam breaking are investigated. The method of matched asymptotic expansions is used to derive the leading-order uniform solution of the classical dam-break problem. The asymptotic analysis is performed with respect to a small parameter which characterizes the short duration of the stage under consideration. The second-order outer solution is obtained in the main flow region. This solution is not valid in a small vicinity of the intersection point between the initially vertical free surface and the horizontal rigid bottom. The dimension of this vicinity is estimated with the help of a local analysis of the outer solution close to the intersection point. Stretched local coordinates are used in this vicinity to resolve the flow singularity and to derive the leading-order inner solution, which describes the formation of the jet flow along the bottom. It is shown that the inner solution is self-similar and the corresponding boundary-value problem can be reduced to the well-known Cauchy-Poisson problem for water waves generated by a given pressure distribution along the free surface. An analysis of the inner solution reveals the complex shape of the jet head, which would be difficult to simulate numerically. The asymptotic solution obtained is expected to be helpful in the analysis of developed gravity-driven flows.
  • Conference Object
    Citation - WoS: 34
    On the Importance of Public-Key Validation in the Mqv and Hmqv Key Agreement Protocols
    (Springer Verlag, 2006) Menezes, Alfred; Ustaoğlu, Berkant
    HMQV is a hashed variant of the MQV key agreement protocol proposed by Krawczyk at CRYPTO 2005. In this paper, we present some attacks on HMQV and MQV that are successful if public keys are not properly validated. In particular, we present an attack on the two-pass HMQV protocol that does not require knowledge of the victim's ephemeral private keys. The attacks illustrate the importance of performing some form of public-key validation in Diffie-Hellman key agreement protocols, and furthermore highlight the dangers of relying on security proofs for discrete-logarithm protocols where a concrete representation for the underlying group is not specified.
  • Conference Object
    Citation - WoS: 4
    Reusing Static Keys in Key Agreement Protocols
    (Springer Verlag, 2009) Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant
    Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in two of the protocols. We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols. © 2009 Springer-Verlag.
  • Conference Object
    Citation - WoS: 28
    Strongly Secure Authenticated Key Exchange Without Naxos' Approach
    (Springer Verlag, 2009) Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant
    LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg.
  • Conference Object
    Citation - WoS: 9
    Towards Denial-Of Key Agreement Protocols
    (Springer Verlag, 2009) Stebila, Douglas; Ustaoğlu, Berkant
    Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models. Many protocols have been argued to be denial-of-service-resilient, only to be subsequently broken or shown ineffective. In this work we propose a formal definition of denial of service resilience, a model for secure authenticated key agreement, and show how security and denial of service resilience can be considered in a common framework, with a particular focus on client puzzles. The model accommodates a variety of techniques for achieving denial of service resilience, and we describe one such technique by exhibiting a denial-of-service-resilient secure authenticated key agreement protocol. Our approach addresses the correct integration of denial of service countermeasures with the key agreement protocol to prevent hijacking attacks that would otherwise render the countermeasures irrelevant. © 2009 Springer Berlin Heidelberg.
  • Conference Object
    Citation - WoS: 19
    Comparing the Pre- and Post-Specified Peer Models for Key Agreement
    (Springer Verlag, 2008) Menezes, Alfred; Ustaoğlu, Berkant
    In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the post-specified peer model for key agreement does not know the identifier of its communicating peer at the outset, but learns the identifier during the protocol run. In this paper we compare the security assurances provided by the Canetti-Krawczyk security definitions for key agreement in the pre- and post-specified peer models. We give examples of protocols that are secure in one model but insecure in the other. We also enhance the Canetti-Krawczyk security models and definitions to encompass a class of protocols that are executable and secure in both the pre- and post-specified peer models. © 2008 Springer-Verlag Berlin Heidelberg.