Mathematics / Matematik
Permanent URI for this collectionhttps://hdl.handle.net/11147/8
Browse
18 results
Search Results
Conference Object On the Relativistic Supersymmetric Quantum Mechanics(Springer Verlag, 2002) Mir-Kasimov, Rufat M.; Kasım, Rıfat MirThe present paper is devoted to the one-dimensional relativistic supersymmetric quantum mechanics (RSUSYQM). A short formulation of RSUSYQM is given. We show that RSUSYQM is a q-deformed non-relativistic SUSYQM. Two simple examples are given.Conference Object Measure on Time Scales With Mathematica(Springer Verlag, 2006) Ufuktepe, Ünal; Yantır, AhmetIn this paper we study the Lebesgue Delta-measure on time scales. We refer to [3, 4] for the main notions and facts from the general measure and Lebesgue Delta integral theory. The objective of this paper is to show how the main concepts of Mathematica can be applied to fundamentals of Lebesgue Delta- and Lebesgue Delta- measure on an arbitrary time scale and also on a discrete time scale whose rule is given by the reader. As the time scale theory is investigated in two parts, by means of alpha and rho operators, we named the measures on time scales by the set function DMeasure and NMeasure respectively for arbitrary time scales.Article An Application With Webmathematica(Springer Verlag, 2003) Ufuktepe, ÜnalThere have been many technological dawns in the last 30 years, during which the desktop computer and the Internet have been developed. The importance of Internet in education, particularly using its Web is a well-recognized fact. A wealth of resources and techniques now exist which serve as a source both for exciting examples of new teaching practices, as well as easily accessible methods for adoption into various formats of teaching and learning. Internet technology allow teachers and students keep up with their minds. It let them try their ideas as soon as they come up with them. Generally, students appreciate the convenience, choice, and flexibility that an online courses offers. Instructional designers value the standardized framework and flexibility. WebMathematica is a web-based technology developed by Wolfram Research that allows the generation of dynamic web content with Mathematica. With this technology, the distance education students should be able to explore and experiment with the mathematical concepts. In this paper we will elucidate the pedagogical issues in the application of Hamiltonian systems in the webMathematica for the distance learning environment and the shape of the future "classroom" as well as relevant educational strategies towards improving mathematics education.Article Citation - WoS: 2Citation - Scopus: 1Basic Calculus on Time Scale With Mathematica(Springer Verlag, 2003) Yantır, Ahmet; Ufuktepe, ÜnalMathematical modeling of time dependent systems are always interesting for applied mathematicians. First continuous and then discrete mathematical modeling are built during the mathematical development from ancient to the modern times. By the discovery of the time scales, the problem of irregular controlling of time dependent systems is solved in 1990's. In this paper, we explain the derivative of functions on time scales and the solutions of some basic calculus problems by using Mathematica. © Springer-Verlag Berlin Heidelberg 2003.Article Citation - WoS: 30Citation - Scopus: 33The Initial Stage of Dam-Break Flow(Springer Verlag, 2009) Korobkin, Alexandre; Yılmaz, OğuzThe liquid flow and the free surface shape during the initial stage of dam breaking are investigated. The method of matched asymptotic expansions is used to derive the leading-order uniform solution of the classical dam-break problem. The asymptotic analysis is performed with respect to a small parameter which characterizes the short duration of the stage under consideration. The second-order outer solution is obtained in the main flow region. This solution is not valid in a small vicinity of the intersection point between the initially vertical free surface and the horizontal rigid bottom. The dimension of this vicinity is estimated with the help of a local analysis of the outer solution close to the intersection point. Stretched local coordinates are used in this vicinity to resolve the flow singularity and to derive the leading-order inner solution, which describes the formation of the jet flow along the bottom. It is shown that the inner solution is self-similar and the corresponding boundary-value problem can be reduced to the well-known Cauchy-Poisson problem for water waves generated by a given pressure distribution along the free surface. An analysis of the inner solution reveals the complex shape of the jet head, which would be difficult to simulate numerically. The asymptotic solution obtained is expected to be helpful in the analysis of developed gravity-driven flows.Conference Object Citation - WoS: 34On the Importance of Public-Key Validation in the Mqv and Hmqv Key Agreement Protocols(Springer Verlag, 2006) Menezes, Alfred; Ustaoğlu, BerkantHMQV is a hashed variant of the MQV key agreement protocol proposed by Krawczyk at CRYPTO 2005. In this paper, we present some attacks on HMQV and MQV that are successful if public keys are not properly validated. In particular, we present an attack on the two-pass HMQV protocol that does not require knowledge of the victim's ephemeral private keys. The attacks illustrate the importance of performing some form of public-key validation in Diffie-Hellman key agreement protocols, and furthermore highlight the dangers of relying on security proofs for discrete-logarithm protocols where a concrete representation for the underlying group is not specified.Conference Object Citation - WoS: 4Reusing Static Keys in Key Agreement Protocols(Springer Verlag, 2009) Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, BerkantContrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in two of the protocols. We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols. © 2009 Springer-Verlag.Conference Object Citation - WoS: 28Strongly Secure Authenticated Key Exchange Without Naxos' Approach(Springer Verlag, 2009) Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, BerkantLaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg.Conference Object Citation - WoS: 9Towards Denial-Of Key Agreement Protocols(Springer Verlag, 2009) Stebila, Douglas; Ustaoğlu, BerkantDenial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models. Many protocols have been argued to be denial-of-service-resilient, only to be subsequently broken or shown ineffective. In this work we propose a formal definition of denial of service resilience, a model for secure authenticated key agreement, and show how security and denial of service resilience can be considered in a common framework, with a particular focus on client puzzles. The model accommodates a variety of techniques for achieving denial of service resilience, and we describe one such technique by exhibiting a denial-of-service-resilient secure authenticated key agreement protocol. Our approach addresses the correct integration of denial of service countermeasures with the key agreement protocol to prevent hijacking attacks that would otherwise render the countermeasures irrelevant. © 2009 Springer Berlin Heidelberg.Conference Object Citation - WoS: 19Comparing the Pre- and Post-Specified Peer Models for Key Agreement(Springer Verlag, 2008) Menezes, Alfred; Ustaoğlu, BerkantIn the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the post-specified peer model for key agreement does not know the identifier of its communicating peer at the outset, but learns the identifier during the protocol run. In this paper we compare the security assurances provided by the Canetti-Krawczyk security definitions for key agreement in the pre- and post-specified peer models. We give examples of protocols that are secure in one model but insecure in the other. We also enhance the Canetti-Krawczyk security models and definitions to encompass a class of protocols that are executable and secure in both the pre- and post-specified peer models. © 2008 Springer-Verlag Berlin Heidelberg.
