Lab

Muzafer H. Saračević's Lab

Featured projects (1)

Project
1-Sharing & recommending publications. 2-Connecting with colleagues. 3-Seeking new collaborations. 4-Obtaining statistics and metrics on use of uploaded publications. 5-Asking questions of researchers around the world that have the same set of interests. 6-Job seeking or recruitment. 7- Journal Invitations (Editorial Board, Reviewer) 8- Call for papers 9- International Conferences

Featured research (8)

Matematiğin güzelliklerinin kolayca keşfedilmesini sağlamak amacıyla hazırlanan kitabımız yedi bölümden oluşmaktadır. Her bölümde öncelikle konunun teorik anlatımı ve konu ile ilgili çözülmüş örnekler bulunmaktadır. Bölüm sonunda elde edilen kazanımları ölçmek amacıyla alıştırma soruları sunulmuştur. Kitapta önemli olan hususların öğrenciler tarafından öğrenilmesini teşvik etmek amacıyla bilgisayar uygulamalarına da yer verilmiştir. Öğrenciler için en kritik öneme sahip konuların yer aldığı kitabın içeriğinde; matrisler, determinantlar ve diğer matematik disiplinleri ile fen ve sosyal bilimlerde de yaygın olarak kullanılan konular yer almaktadır. Bu nedenle son derece önemli konulardan biri olarak görülen lineer denklem sistemleri, vektörler, üç boyutlu uzayı daha anlayabilmeye yardımcı olan uzayda nokta, doğru ve düzlem ile bunların birbirileri arasındaki durumlar, matematiksel tümevarım, nesneler, olaylar ve şekiller arasındaki sıralamayı algılamaya yardımcı olan ve fonksiyonlarda limit kavramını tanımlamaya yardımcı olan dizi kavramı, fonksiyonlar, fonksiyonlarda limit ve süreklilik, türev kavramı ve uygulamaları gibi konular bulunmaktadır.
This paper presents a solution to secret key sharing protocol problem that establishes cryptographically secured communication between two entities. We propose a new symmetric cryptographic key exchange scenario based on the specific properties of Cat-alan numbers and the Lattice Path combinatorics. Our scenario consists of three phases: generating Catalan values, defining the Lattice Path movement space and defining the key equalization rules. In the experimental part of this study, we have merged our scenario with the Maurer"s protocol, while in the information-theoretical approach to the key exchange we have presented how a partially split bit sequence can become the secret key that both parties in communication can use. Maurer's satellite scenario model for the exchange of the Catalan key is discussed in detail and its application is proposed. Security analysis of the protocol and testing for channel capacity or key generation speed is also suggested.
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face recognition technologies and polygon triangulation as a fundamental algorithm in computational geometry and graphics. The proposed method is based on generating one’s own key (faceprint), where everyone has a potential key in a 3D view of their characteristic facial lines; therefore, everybody is the carrier of his/her own unique key that is generated from a triangulation of the scanned polygon. The proposed method could find application exactly in biometric authentication. This is a pretty interesting possibility of authenticating users because there is no possibility of stealing the key (as is the case with the approaches: “something you know” and “something you have”). By introducing this procedure of determining the authentication of users, unauthorized access to computers, mobile devices, physical locations, networks, or databases is made difficult. In experimental research, the authors present concrete possibilities of applying the polygon triangulation in the biometric identification process. The authors tested a proposed solution using the appropriate two sets of data. The results show that using the triangulation method in combination with the face recognition technique, the success rate of authentication is achieved equally well as recognition with the application of some other methods.
The Internet of Things (IoT) brings a new set of security concerns, especially regarding data integrity and confidentiality. Encryption protects data from unauthorized access or a potential attacker in IoT applications using an algorithm and a key to transform a plaintext into an encrypted text. This chapter presents an analysis of the Fuss–Catalan number properties (or objects) and the possibility of their application in data encryption. We present a new cryptographic method based on the lattice path combinatorics. The presented method consists of five phases: definition, conversion, generation, selection, and inversion. The basic step is the definition of input parameters, followed by converting text (or image) to binary notation and split binary sequence into blocks. Then, the next step is generating the Fuss–Catalan key and defining additional parameters in the lattice path space. The next phase is bit selection on the lattice path based on the generated key. The last step is the inversion of the selected bits. The proposed method was implemented in the Java Net Beans environment. In the experimental part of this chapter, we present a comparative analysis of the proposed method and some of the previously published methods.
This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city applications is presented in this research. The protocol is based on the specific properties of the Fuss-Catalan numbers and the Lattice Path combinatorics. The proposed scenario consists of three phases: generating a Fuss-Catalan object based on the grid dimension, defining the movement in the Lattice Path Grid and defining the key equalisation rules. In the experimental part, the authors present the security analysis of the protocol as well as its test. Also, they examine the equivalence of the proposed with Maurer's satellite scenario and suggest a new scenario that implements an information-theoretical protocol for the public key distribution. Additionally, a comparison with related studies and methods is provided, as well as a comparison with satellite scenario, which proves the advantages of solution presented by the authors. Finally, they propose further research directions regarding key management in smart city applications.

Lab head

Muzafer H. Saračević
Department
  • Department of Computer Sciences
About Muzafer H. Saračević
  • Prof. Dr Muzafer Saračević - Full Professor at MEF Belgrade and University of Novi Pazar (Department of computer sciences), Serbia. Education: BSc. Faculty of Informatics and Computing in Belgrade; MSc. Faculty of Technical Sciences, University of Kragujevac; Ph.D. Faculty of Science and Mathematics, University of Niš; He authored several university textbooks and over 170 scientific papers. He is a member of the editorial board for 15 journals. https://muzafers.wixsite.com/home

Members (5)

Aybeyan Selim
  • International Vision University -Gostivar
Selver H. Pepíć
  • University of Niš
Faruk Selimovic
  • University of Niš
Salahudin Fetic
  • International University of Novi Pazar
Ilker Ali
  • https://www.vizyon.edu.mk/