Mathematics / Matematik

Permanent URI for this collectionhttps://hdl.handle.net/11147/8

Browse

Search Results

Now showing 1 - 2 of 2
  • Conference Object
    Citation - Scopus: 1
    Hipokampüsün El ve Atlas Tabanlı Otomatik Bölütlenmesinin Hacimsel Olarak Karşılaştırılması
    (Institute of Electrical and Electronics Engineers Inc., 2009) Kutucu, Hakan; Eker, Çağdaş; Kitiş, Ömer; Gönül, Ali Saffet
    High-resolution Magnetic resonance imaging (MRI) is helpful in diagnosing diseases such as schizophrenia, alzheimer, dementia etc. Brain segmentation is an important preprocess in medical imaging applications. In this study we compare atlas based segmentation and manual segmentation of hippocampus for volumetric measures. A statistically difference was obtained between automatic and manual measurement. We conclude that contemporary techniques are not adequate to obtain sensitive data in some barin structures such as hippocampus core.
  • Conference Object
    Citation - WoS: 28
    Strongly Secure Authenticated Key Exchange Without Naxos' Approach
    (Springer Verlag, 2009) Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant
    LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg.