Volume 1 - 2009

Are Electronic Certificates Really Secur

Abstract

This paper describes a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. By application of suggested scenario it is possible to create a rogue certificate, containing original electronic signature. This certificate allows to impersonate any website, including banking and e-commerce sites secured using the HTTPS protocol. Described technique takes advantage of a weakness in the cryptographic hash function, known as an MD5 collision.

Keywords: Дигитални сертификати, хеш колизија, PKI, сертификационо тело
Published on website: 1.1.1970

SECURITY CHARACTERISTICS OF ENCRYPTING FILE SYSTEM

Abstract

User access control and encryption are standard mechanisms for protecting data from unauthorized accesses. The operating system grants user accesses according to his specifications from ACLís, while cryptographic files systems provide a layer of protection for data when access control is unavailable. When data leaves the protection of access control, it can be encrypted when that it is only accessible to those who are assigned decryption keys. In this paper, we presented New Technology File System (NTFS) and its part, Encrypting File System (EFS), which is example that combines the mechanisms of access control and encryption

Keywords: EFS , енкрипција, контрола приступа, NTFS, сигурност
Published on website: 31.5.2009

Cyclic spectral analysis algorithms

Abstract

Дат је увод у теорију обраде и анализе циклостационарних сигнала другог реда, преглед теорије дигиталне цикличне спектралне анализе и описани су принципи и карактеристике рачунарски ефикасних алгоритама за процену цикличног спектра, као и неки аспекти њихове имплементације. Разматрани су алгоритми на бази временског и фреквенцијског усредњавања цикличних периодграма.

Keywords: Циклостационарност, Спектрално-корелациона анализа сигнала, циклични спектар
Published on website: 21.6.2009

SIMULATION OF ARMOURED BATTALION IN SWARMING COMPUTER NETWORK

Abstract

Swarming is a tactical approach, suitable for both attack and defence, which has more and more been taken into account in modern armiesí combat activities conceptualizing. Adaptation of the existing armoured an mechanized units (AMU) for swarming could be the best investment in technically inferior armiesí modernization. That is the principal motivation for the research in course at Union university School of Computing in Belgrade. Some aspects of the AMU C4I system, and results of its mobile wireless computer network simulation in particular, have been considered in the paper.

Keywords: Алгоритам, оклопни батаљон, рачунарска мрежа, симулација, swarming.
Published on website: 12.7.2009

ARE WE READY FOR NANOTECHNOLOGY

Abstract

In the paper the impacts of development of nanotechnology are discussed. The overview outlines scaling effects on actuation, and sensing at nano scale. Then, a possible future development is considered. Some scientific areas that offer useful results for future development of nanorobotics. are pointed out: material science, biotechnology, nanoelectronics, and computer engineering. The problems and possibilities of developing of nanorobotics at our region, as well as globally, are considered also .

Keywords: агент, интелигентни системи, меко рачунарство, нанороботика, нанотехнологије, рачунарство, расплинути системи
Published on website: 30.7.2009