International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8IX. ConclusionA user authentication protocol named oPass which leverages cell phone and SMS to thwart passwordstealing and password reuse attacks. oPass assume that each website possesses a unique phone number. It alsoassume that a telecommunication service provider participants in the registration and recovery phases. The designprinciple of oPass is to eliminate the negative influence of human factors as much as possible. Through oPass, eachuser only needs to remember a long-term password which has been used to protect their cell phone. Users are freefrom typing any passwords into untrusted computers for login on all websites. OPass is efficient for websiteauthentication to prevent phising, keylogger and malware. SMS delay could increase the execution time and reducethe performance. The performance of oPass can be improved by Round Robin DNS with the help of simultaneousresponse from the server for multiple users at a time. Internet relay chat protocol can be used for synchronousconferencing of SMS service. There by communication overhead can be reduced because of many transactions.References[1] Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin,‖oPass: A user authentication protocol resistant topassword stealing and password reuse attacks,‖ ieee transactions on information forensics and security, vol.7, no. 2, april 2012[2] S.Gaw and E.W.Felten,―Password management strategies for onlineaccounts,‖ inSOUPS ’06: Proc. 2ndSymp. Usable Privacy. Security, New York, 2006, pp. 44–55, ACM.[3] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, ―The design and analysis of graphicalpasswords,‖ inSSYM’99: Proc. 8thConf. USENIX Security Symp, Berkeley, CA, 1999, pp. 1–1, USENIXAssociation.[4] J. Thorpe and P. van Oorschot, ―Towards secure design choices for im-plementing graphical passwords,‖presented at the 20th. Annu. Com-puter Security Applicat. Conf, 2004.[5] S.Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon,―Passpoints: Design and longitudinalevaluation of a graphical pass-word system,‖Int. J. Human-Computer Studies, vol. 63, no. 1–2, pp.102–127,2005.[6] B. Pinkas and T. Sander, ―Securing passwords against dictionary at-tacks,‖ inCCS ’02: Proc. 9th ACMConf. Computer Communications Security, New York, 2002, pp. 161–170, ACM.[7] J. A. Halderman, B. Waters, and E. W. Felten, ―A convenient method for securely managing passwords,‖inWWW ’05: Proc. 14th Int. Conf. World Wide Web, New York, 2005, pp. 471–479, ACM.[8] K.-P. Yee and K. Sitaker, ―Passpet: Convenient password management and phishing protection,‖ inSOUPS’06: Proc. 2nd Symp. Usable Pri-vacy Security,New York,2006,pp.32–43,ACM.[9] L. Lamport,, ―Password authentication with insecure communication,‖ Commun. ACM, vol. 24, pp. 770–772, Nov. 1981.[10] H. Krawczyk, ―The order of encryption and authentication for pro-tecting communications (or: How secureis SSL?),‖ inAdvances Cryp-tology—CRYPTO 2001, 2001, pp. 310–331.[11] M. Mannan and P. van Oorschot,, ―Using a personal device to strengthen password authentication from anuntrusted computer,‖ Financial Cryptography Data Security, pp. 88–103, 2007.[12] C. Yue and H. Wang, ―SessionMagnifier: A simple approach to secure and convenient kiosk browsing,‖inProc. 11th Int. Conf. UbiquitousComputing, 2009, pp. 125–134, ACM.[13] D. Wendlandt, D. G. Andersen, and A. Perrig, ―Perspectives: Im-proving ssh-style host authentication withmulti-path probing,‖ in Proc. USENIX 2008 Annu. Tech. Conf., Berkeley, CA, 2008, pp. 321–334, USENIXAssociation.[14] R. Biddle, S. Chiasson, and P. van Oorschot, ―Graphical passwords: Learning from thefirst twelve years,‖ inACM Computing Surveys, Carleton Univ., 2010.Issn <strong>2250</strong>-<strong>3005</strong>(online) December| 2012 Page 115
International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2Issue. 8Implementation of Serial Communication IP for Soc Applications1 K. Raghuram, 2 A.Lakshmi sudha,1 Assoc.Professor,Pragati Engg College, Kakinada, AP, India.2 Post Graduate Student, Pragati Engg College, Kakinada, Ap, India.Abstract:The serial communication is very commonly used communication protocol between various peripherals andprocessor. The current trend is all high speed buses are built with serial communication interface.The ALTERA’s NIOS II soft processor and PowerPC hard processor are widely used in FPGA based CSOC(configurable system on chip) applications. These processers don’t have programmable serial links for interfacing withembedded peripherals which are mostly off chip.In this project it is proposed to implement dynamically configurable serial communication block in Verilog. Thedeveloped module shall be interfaced with NIOS II soft processor as a general purpose IO port. The serial interfaceblocks shall be implemented to handle high data rate serial links and provide parallel interface to the processor.The Nios II IDE (EDK) shall be used for developing the test application in C programming language. The serial interfaceblocks which are coded in Verilog shall be synthesized using QUARTUS II EDA tool. The CYCLONE III family FPGAboard shall be used for verifying the results on board.I. INTRODUCTIONIn electronic design a semiconductor intellectual property core, IP core, or IP block is a reusable unit of logic,cell, or chip layout design that is the intellectual property of one party. IP cores may be licensed to another party or canbe owned and used by a single party alone. The term is derived from the licensing of the patent and sourcecode copyright intellectual property rights that subsist in the design.IP cores can be used as building blocks within ASIC chip designs or FPGA logic designs It IP cores in theelectronic design industry have had a profound impact on the design of systems on a chip. By licensing a design multipletimes, IP core licensor spread the cost of development among multiple chip makers. IP cores for standard processors,interfaces, and internal functions have enabled chip makers to put more of their resources into developing thedifferentiating features of their chips. As a result, chip makers have developed innovations more quickly.II. Typres of Ip Cores:The IP core can be described as being for chip design what a library is for computer programming ora discrete integrated circuit component is for printed circuit board design.A. SOFT CORES:As the complexity of embedded systems designs increased over time, designing each and every hardwarecomponent of the system from scratch soon became far too impractical and expensive for most designers. Therefore, theidea of using pre-designed and pre-tested intellectual property (IP) cores in designs became an attractive alternative. Softcoreprocessors are microprocessors whose architecture and behavior are fully described using a synthesizable subset of ahardware description language (HDL). They can be synthesized for any Application -Specific Integrated Circuit (ASIC)or Field Programmable Gate Array (FPGA) technology; therefore they provide designers with a substantial amount offlexibility.The use of soft-core processors holds many advantages for the designer of an embedded system. First, soft-coreprocessors are flexible and can be customized for a specific application with relative ease. Second, since soft -coreprocessors are technology independent and can be synthesized for any given target ASIC or FPGA technology, they aretherefore more immune to becoming obsolete when compared with circuit or logic level descriptions of a processor.Finally, since a soft-core processor’s architecture and behavior are described at a higher abstraction level using an HDL,it becomes much easier to understand the overall design. This paper presents a survey of the available soft-coreprocessors that are used to design and implement embedded systems using either FPGAs or ASICs.B. HARD CORES :Hard cores, by the nature of their low-level representation, offer better predictability of chip performancein terms of timing performance and area.Analog and mixed-signal logic are generally defined as a lower-level, physical description. Hence, analog IP(SerDes, PLLs, DAC, ADC, etc.) are provided to chip makers in transistor-layout format (such as GDSII.) Digital IPcores are sometimes offered in layout format, as well.Such cores, whether analog or digital, are called "hard cores" (or hard macros), because the core's applicationfunction cannot be meaningfully modified by chip designers. Transistor layouts must obey the target foundry's processdesign rules, and hence, hard cores delivered for one foundry's process cannot be easily ported to a different process orfoundry. Merchant foundry operators (such as IBM,Fujitsu, Samsung, TI, etc.) offer a variety of hard-macro IP functionsbuilt for their own foundry process, helping to ensure customer lock-in.||Issn <strong>2250</strong>-<strong>3005</strong>(online)|| ||December|| 2012|| ||||Pa ge 116
- Page 1 and 2:
ISSN: 2250-3005VOLUME 2 December 20
- Page 3 and 4:
Meisam MahdaviQualification: Phd El
- Page 5 and 6:
16. Implementation Of Serial Commun
- Page 7 and 8:
45 Performance Evaluation Of Energy
- Page 9 and 10:
International Journal Of Computatio
- Page 11 and 12:
International Journal Of Computatio
- Page 13 and 14:
International Journal Of Computatio
- Page 15 and 16:
International Journal Of Computatio
- Page 17 and 18:
International Journal Of Computatio
- Page 19 and 20:
International Journal Of Computatio
- Page 21 and 22:
01 .048International Journal Of Com
- Page 23 and 24:
International Journal Of Computatio
- Page 25 and 26:
International Journal Of Computatio
- Page 27 and 28:
International Journal Of Computatio
- Page 29 and 30:
International Journal Of Computatio
- Page 31 and 32:
International Journal Of Computatio
- Page 33 and 34:
International Journal Of Computatio
- Page 35 and 36:
International Journal Of Computatio
- Page 37 and 38:
International Journal Of Computatio
- Page 39 and 40:
International Journal Of Computatio
- Page 41 and 42:
International Journal Of Computatio
- Page 43 and 44:
International Journal Of Computatio
- Page 45 and 46:
International Journal Of Computatio
- Page 48 and 49:
International Journal Of Computatio
- Page 50 and 51:
International Journal Of Computatio
- Page 52 and 53:
International Journal Of Computatio
- Page 54 and 55:
International Journal Of Computatio
- Page 56 and 57:
International Journal Of Computatio
- Page 58 and 59:
International Journal Of Computatio
- Page 60 and 61:
International Journal Of Computatio
- Page 62 and 63:
International Journal Of Computatio
- Page 64 and 65:
International Journal Of Computatio
- Page 66 and 67:
International Journal Of Computatio
- Page 68 and 69:
International Journal Of Computatio
- Page 70 and 71:
International Journal Of Computatio
- Page 72 and 73: International Journal Of Computatio
- Page 74 and 75: International Journal Of Computatio
- Page 76 and 77: International Journal Of Computatio
- Page 78 and 79: International Journal Of Computatio
- Page 80 and 81: International Journal Of Computatio
- Page 82 and 83: International Journal Of Computatio
- Page 84 and 85: International Journal Of Computatio
- Page 86 and 87: International Journal Of Computatio
- Page 88 and 89: International Journal Of Computatio
- Page 90 and 91: International Journal Of Computatio
- Page 92 and 93: International Journal Of Computatio
- Page 94 and 95: International Journal Of Computatio
- Page 96 and 97: International Journal Of Computatio
- Page 98 and 99: International Journal Of Computatio
- Page 100 and 101: International Journal Of Computatio
- Page 102 and 103: International Journal Of Computatio
- Page 104 and 105: International Journal Of Computatio
- Page 106 and 107: International Journal Of Computatio
- Page 108 and 109: INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 110 and 111: INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 112 and 113: INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 114 and 115: International Journal Of Computatio
- Page 116 and 117: International Journal Of Computatio
- Page 118 and 119: International Journal Of Computatio
- Page 120 and 121: International Journal Of Computatio
- Page 124 and 125: International Journal Of Computatio
- Page 126 and 127: International Journal Of Computatio
- Page 128 and 129: International Journal Of Computatio
- Page 130 and 131: International Journal Of Computatio
- Page 132 and 133: International Journal Of Computatio
- Page 134 and 135: International Journal Of Computatio
- Page 136 and 137: International Journal Of Computatio
- Page 138 and 139: International Journal Of Computatio
- Page 140 and 141: International Journal Of Computatio
- Page 142 and 143: International Journal Of Computatio
- Page 144 and 145: International Journal Of Computatio
- Page 146 and 147: International Journal Of Computatio
- Page 148 and 149: International Journal Of Computatio
- Page 150 and 151: International Journal Of Computatio
- Page 152 and 153: International Journal Of Computatio
- Page 154 and 155: International Journal Of Computatio
- Page 156 and 157: International Journal Of Computatio
- Page 158 and 159: International Journal Of Computatio
- Page 160 and 161: International Journal Of Computatio
- Page 162 and 163: International Journal Of Computatio
- Page 164 and 165: International Journal Of Computatio
- Page 166 and 167: International Journal Of Computatio
- Page 168 and 169: International Journal Of Computatio
- Page 170 and 171: International Journal Of Computatio
- Page 172 and 173:
International Journal Of Computatio
- Page 174 and 175:
International Journal Of Computatio
- Page 176 and 177:
International Journal Of Computatio
- Page 178 and 179:
International Journal Of Computatio
- Page 180 and 181:
International Journal Of Computatio
- Page 182 and 183:
International Journal Of Computatio
- Page 184 and 185:
International Journal Of Computatio
- Page 186 and 187:
Body Acceleration (m/Sec2)Dynamic T
- Page 188 and 189:
International Journal Of Computatio
- Page 190 and 191:
International Journal Of Computatio
- Page 192 and 193:
International Journal Of Computatio
- Page 194 and 195:
International Journal Of Computatio
- Page 196 and 197:
International Journal Of Computatio
- Page 198 and 199:
International Journal Of Computatio
- Page 200 and 201:
International Journal Of Computatio
- Page 202 and 203:
International Journal Of Computatio
- Page 204 and 205:
International Journal Of Computatio
- Page 206 and 207:
International Journal Of Computatio
- Page 208 and 209:
International Journal Of Computatio
- Page 210 and 211:
International Journal Of Computatio
- Page 212 and 213:
International Journal Of Computatio
- Page 214 and 215:
International Journal Of Computatio
- Page 216 and 217:
International Journal Of Computatio
- Page 218 and 219:
International Journal Of Computatio
- Page 220 and 221:
International Journal Of Computatio
- Page 222 and 223:
International Journal Of Computatio
- Page 224 and 225:
EigenvalueEigenvalueInternational J
- Page 226 and 227:
International Journal Of Computatio
- Page 228 and 229:
International Journal Of Computatio
- Page 230 and 231:
International Journal Of Computatio
- Page 232 and 233:
International Journal Of Computatio
- Page 234 and 235:
International Journal Of Computatio
- Page 236 and 237:
International Journal Of Computatio
- Page 238 and 239:
International Journal Of Computatio
- Page 240 and 241:
International Journal Of Computatio
- Page 242 and 243:
International Journal Of Computatio
- Page 244 and 245:
International Journal Of Computatio
- Page 246 and 247:
International Journal Of Computatio
- Page 248 and 249:
International Journal Of Computatio
- Page 250 and 251:
International Journal Of Computatio
- Page 252 and 253:
International Journal Of Computatio
- Page 254 and 255:
International Journal Of Computatio
- Page 256 and 257:
International Journal Of Computatio
- Page 258 and 259:
International Journal Of Computatio
- Page 260 and 261:
International Journal Of Computatio
- Page 262 and 263:
International Journal Of Computatio
- Page 264 and 265:
International Journal Of Computatio
- Page 266 and 267:
International Journal Of Computatio
- Page 268 and 269:
International Journal Of Computatio
- Page 270 and 271:
International Journal Of Computatio
- Page 272 and 273:
International Journal Of Computatio
- Page 274 and 275:
International Journal Of Computatio
- Page 276 and 277:
International Journal Of Computatio
- Page 278 and 279:
International Journal Of Computatio
- Page 280 and 281:
International Journal Of Computatio
- Page 282 and 283:
International Journal Of Computatio
- Page 284 and 285:
International Journal Of Computatio
- Page 286 and 287:
International Journal Of Computatio
- Page 288 and 289:
International Journal Of Computatio
- Page 290 and 291:
International Journal Of Computatio
- Page 292 and 293:
International Journal Of Computatio
- Page 294 and 295:
International Journal Of Computatio
- Page 296 and 297:
International Journal Of Computatio
- Page 298 and 299:
International Journal Of Computatio
- Page 300 and 301:
International Journal Of Computatio
- Page 302 and 303:
International Journal Of Computatio
- Page 304 and 305:
International Journal Of Computatio
- Page 306 and 307:
International Journal Of Computatio
- Page 308 and 309:
International Journal Of Computatio
- Page 310 and 311:
International Journal Of Computatio
- Page 312 and 313:
International Journal Of Computatio
- Page 314 and 315:
International Journal Of Computatio
- Page 316 and 317:
International Journal Of Computatio
- Page 318 and 319:
International Journal Of Computatio
- Page 320 and 321:
International Journal Of Computatio
- Page 322 and 323:
International Journal Of Computatio
- Page 324 and 325:
International Journal Of Computatio
- Page 326 and 327:
International Journal Of Computatio
- Page 328 and 329:
International Journal Of Computatio
- Page 330 and 331:
International Journal Of Computatio
- Page 332 and 333:
International Journal Of Computatio
- Page 334 and 335:
Average JitterThroughputInternation
- Page 336 and 337:
Energy Consumed in Received ModeEne
- Page 338 and 339:
International Journal Of Computatio
- Page 340 and 341:
International Journal Of Computatio
- Page 342 and 343:
International Journal Of Computatio
- Page 344 and 345:
International Journal Of Computatio