Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Size: px
Start display at page:

Download "Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*"

Transcription

1 198 Int J Securty Networks Vol 1 Nos 3/ A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn E-al: cln@csnet1cstsnghuaeducn Mnghu Sh Xuen Sheran Shen* Departent of Electrcal oputer Engneerng Unversty of Waterloo Waterloo Ontaro anada E-al: sh@bbcruwaterlooca E-al: xshen@bbcruwaterlooca *orrespondng author Abstract: A novel authentcaton protocol for teleconference servce s proposed The an features of the proposed protocol nclude dentty anonyty one-te Pseudony Identty (PID renewal locaton ntracablty Identty anonyty s acheved concealng the real dentty of a oble conferee n a prearranged PID One-te PID Renewal echans n whch the oble conferee s PID s frequently updated councatng wth the network centre s ntroduced to offer locaton ntracablty It s shown that the securty has been sgnfcantly enhanced whle the coputaton coplexty s slar to the exstng ones appeared n the lterature Keywords: authentcaton; teleconference servces; protocol; anonyty Reference to ths paper should be ade as follows: Jang Y Ln Sh M Shen XS (2006 A self-encrypton authentcaton protocol for teleconference servces Int J Securty Networks Vol 1 Nos 3/4 pp Bographcal notes: Yxn Jang receved hs MS n oputer Scence fro Huazhong Unversty of Scence Technology n 2002 He s currently pursng hs PhD at the Departent of oputer Scence Technology Tsnghua Unversty Beng hna Hs current research nterests nclude network securty huang Ln s a Professor of oputer Scence at the Tsnghua Unversty Beng hna He receved hs BS PhD n oputer Scence fro Tsnghua Unversty Her current research focuses on perforance evaluaton Petr nets teporal logcs network securty Mnghu Sh receved a BS n 1996 fro Shangha Jao Tong Unversty hna an MS n 2002 fro the Unversty of Waterloo Ontaro anada both n electrcal engneerng He s currently workng towards a PhD at the Unversty of Waterloo Hs current research nterests nclude wreless LAN/cellular network ntegraton network securty Xuen Sheran Shen s a Professor of Electrcal oputer Engneerng at the Unversty of Waterloo Ontaro anada He receved hs PhD n control fro Rutgers Unversty USA Hs research nterests nclude wreless/nternet nterworkng rado resource oblty anageent voce over oble IP WLAN/WMAX WAP UWB wreless councatons wreless ad hoc sensor networks wreless network securty stochastc process optal control flterng 1 Introducton Moble teleconference s a synchronous collaboraton sesson n whch conferees at reote locatons cooperate wth an nteractve procedure for exaple a board eetng a task force or a scentfc syposu through wreless councatons When a conference char holds a oble teleconference all conferees are requred to connect to a centre node called a Network enter ( va wreless access network The receves essages opyrght 2006 Inderscence Enterprses Ltd

2 Self-encrypton authentcaton protocol 199 fro conferees processes the n an approprate way then sends the results to conferees Prvacy s very portant to oble teleconference A secure conference servce protocol for dgtal oble networks has proposed Hwang Yang (1995 The protocol can establsh a sesson key for a vald user to hold a teleconference A odfed secure teleconference protocol whch allows an actve partcpant to on or ext on-gong conference has been presented Hwang (1999 Both user authentcaton sesson key dstrbuton are sultaneously ncluded n the conference protocol The sesson key dstrbuton uses a publc key cryptosyste to splfy the councaton between conferees However the conferee s oble devce s requred to use two cryptosystes whch s not frendly to the low coputaton power requreent A splfed echans called self-encrypton was gven Hwang hang (2003 whch not only decreases the coputaton coplexty n Hwang (1999 but also retans sple councatons for the secure teleconference servce The self-encrypton echans uses the plantext as a long-ter secret key to encrypt the correspondng cpher-text The long-ter secret key s = f(id for ts th oble user T s antaned where f s a secret one-way hash functon ID denotes the dentty of the oble user The self-encrypton echans operates as follows: Step 1 A charan T 1 ntates a conference then: 1 chooses two ro nubers r 11 r 12 2 uses the long-ter secret key s1( = f(id 1 to { t s r r ID ID } encrypt sends essage {ID 1 Es ( t 1 1 s1 r11 r 12 ID 2 ID } to the trusted Here ID ( = 1 2 represents the conferees dentty t 1 denotes the testap s 1 s generated such as s = f(id where f s a secret one-way functon held Step 2 On recevng essage fro T 1 decrypts the encrypted data usng the long-ter secret key s 1 then verfes whether s 1 s equal to f (ID 1 the testap t 1 s wthn soe reasonable range copared wth ts current te If both are true calls other oble conferees ID ( = 2 3 Step 3 Every partcpant T for = 2 3 does the sae as charan T 1 does that s: 1 chooses two ro nubers r 1 r 2 2 uses the long-ter secret key s( = f(id to encrypt ( t s r1 r 2 3 sends the essage {ID Es ( t 1 2} s r r to Step 4 When recevng the essage fro T decrypts the encrypted data then verfes the authentcty of s the testap t If both are true selects two non-zero ro nubers K c r 0 calculates PI PA ( PI = K + lc r r r (1 c ( 0 1 PA = E K ID (2 where K c denotes the sesson key of the conference lc ( r0 r1 r denotes the least coon ultple functon Fnally broadcasts tuple ( QyR PA to T ( = 2 3 Here Q y R are coputed PI = Q2 y + R Step 5 Each partcpant T obtans conference key K as y K = ( Q2 + Rod( r (3 where the sesson key r s coputed as r = r1+ r2 They verfy the valdty of K c checkng whether PA s equal to E K (ID Note that the self-encrypton echans provdes an plct authentcaton (Steps 2 4 Once recevng essage fro T decrypts the encrypted data usng the long-ter secret key s If the decrypted secret key s s equal to f (ID the dentty of conferee T s true However the self-encrypton echans cannot provde dentty anonyty an ntruder can easly obtan ID nterceptng the essages If the secret oneway functon f s sped the ntruder could copute all the long-ter shared keys s the cryptographc syste would be prosed The dsclosure of a user s dentty wll allow unauthorsed enttes to track hs ovng hstory current locaton whch entals the volaton of hs prvacy Hence the dentty anonyty s one of the portant factors that should be consdered n oble teleconference On the other h the echans of ssung the sesson key to a new partcpant durng a conference ay cause that a partcpant who leaves rght after the new partcpant onng the conference s stll able to eavesdrop the conversaton even when the sesson key s refreshed (Ng 2001 In ths paper we propose a sple authentcaton protocol wth anonyty property for oble teleconference servces based on the Secret Splttng prncple (Schneer 1996 Secret splttng s a type of nforaton-hdden technque n whch a essage s dvded nto several coponents The orgnal essage can be reconstructed f only f the nuber of coponents gathered s equal or greater than the preset threshold In the proposed protocol the real dentty of a oble conferee s decoposed nto a Pseudony Identty (PID used for transsson a ro nuber N whch s known only so that an ntruder s unable to reconstruct the real dentty fro PID wthout the knowledge of N In addton to prevent the oblty of a partcular oble conferee fro beng traced the PID s renewed frequently usng proposed One-te PID Renewal echans The conversaton prvacy s also guaranteed when partcpants on or leave the on-gong teleconference eetng properly renewng re-dstrbutng the conference sesson key

3 200 Y Jang et al The rest of ths paper s organsed as follows In Secton 2 the authentcaton protocol wth anonyty for teleconference servces s proposed In Sectons 3 4 the securty the perforance analyss are presented respectvely followed the concluson n Secton 5 2 The proposed authentcaton protocol wth anonyty property The proposed authentcaton protocol uses a sple secret splttng echans to provde the dentty anonyty prevent unauthorsed enttes fro tracng a partcular oble user s roang hstory hs current locaton The securty strength does not reply on the secrecy of the one-way functon so publc one-way hash functons are used n the proposed protocol We stll retan the self-encrypton echans n the proposed schee that s the also antans a long-ter secret key s = f(id for hs conferee T usng a one-way functon f By extractng the real dentty ID of user T fro PID we can further copute the shared key s whch s used to encrypt the exchanged essages However we provde dentty anonyty echans usng a Pseudony Identty PID for a oble user T nstead of hs real dentty ID The Pseudony Identty PID s prearranged dstrbuted n advance And the oble user T stores PID whch s only known to hself 21 Mutual Authentcaton Protocol (MAP When a user T regsters wth he subts hs dentty ID to whose dentty s ID generates an -bts ro nuber N keeps t secret In order to prevent the exclusve search attack should be suffcently large for exaple 128 bts or longer coputes a Pseudony Identty PID for T as: PID = hn ( ID ID ID (4 where denotes btwse XOR operaton h s a publc strong one-way hash functon Then delvers PID to T through a secure channel records the appng relaton of PID N(PID N n dstrbuted database servers By ths secret-splttng echans we can conceal the real dentty ID n PID provde dentty anonyty for T whle keepng the algorth sple In the followng we descrbe the proposed authentcaton protocol accordng to the order of essage exchange also dscuss the securty goals whch can be acheved durng the executon of each protocol essage (see Fgure 1 Step 1 The conference charan T 1 : 1 chooses a ro nuber r 1 2 coputes the long-ter key s 1 s = f(id uses key s 1 to encrypt ( t s r ID ID sends essage {PID 1 Es ( t 1 1 s1 r 1 ID 2 ID } to Here PID ( = 12 represents the PID of T Step 2 On recevng the essage fro T 1 retreves the correspondng N 1 of oble conferee T 1 searchng the PID N appng table derves the real dentty of oble conferee T 1 coputng ( ID = PID h N ID ID ( Hence can retreve correspondng shared key s 1 decrypt Es ( t 1 1 s1 r 1 ID 2 ID Then verfes the authentcty of the secret key s 1 the testap t 1 If both are true calls the other oble user ID( = 23 Note that all of the shared keys s ( = 12 are precoputed Fgure 1 The proposed schee wth anonyty property for secure teleconference

4 Self-encrypton authentcaton protocol 201 Step 3 The partcpant T for = 2 3 does the sae as charan T1 n Step 1 onferee T: 1 chooses a ro r 2 coputes the long-ter secret key s as s = f(id 3 uses secret key s to encrypt { t s r } 4 sends the essage {PID Es ( t } s r to Step 4 On recevng the essage fro T retreves the correspondng N of T searchng the PID N appng table extracts the dentty ID of T ( ID = PID h N ID ID (6 Then can retreve correspondng shared key s further decrypt Es ( t s r Next checks the authentcty of secret key s testap t If t s true selects two non-zero ro nubers K c r 0 further calculates PI PA ( PI = K + lc r r r (7 c ( 0 1 PA = E K ID (8 where K c s the sesson key lc ( r0 r1 r denotes the least coon ultple functon Fnally broadcasts tuple ( QyR PA to all T ( = 23 where Q y R are coputed PI = Q2 y + R for savng transsson bwdth Step 5 Each partcpant T obtans y K = ( Q2 + Rod( r (9 Then T verfes the valdty of K c checkng whether PA s equal to E (ID 22 Dynac partcpant echans To assure the freshness of sesson key K c when a partcpant wants to ext an n-process teleconference ust change the sesson key K c re-copute PI Meber on: when a partcpant T +1 ons a conference that s already n-process the procedures of obtanng K c for T +1 are the sae as n steps 3 5 except that sends Q y R to conferee T +1 where PI = K y c + r+ s+ = Q + R Meber qut: when a partcpant T leaves a conference that s already n-process the renewng procedures for sesson key K c are descrbed as follows Step 1 selects a new sesson key K further calculates PI PA as follows PA ( ID = K K E (10 ( PI = K + lc r r r r r (11 where r = + r t t denotes the current te Then broadcasts four-tuple ( t Q y R to T where paraeters Q y R PI satsfy the equaton PI = Q 2 y + R Step 2 The reanng conferee T ( obtans the y new sesson key K = ( 2 + od( + Q R r t verfes the authentcty of sesson key K checkng whether PA s equal to E ( ID 23 Pseudony Identty Renewal Protocol Though n prevous MAP schee we provde an dentty anonyty echans usng a Pseudony Identty PID for a oble conferee T nstead of hs real dentty ID there are stll soe securty ssues to be consder For exaple even when the oble conferee T never reveals hs dentty ID to partes other than he does reveal hs long-ter Pseudony Identty PID durng utual authentcaton n MAP Therefore llegal partes can stll track a conferee s locaton hs long-ter PID although they have no way to extract the real dentty ID The goal of Pseudony Identty Renewal Protocol (PIRP protocol s to renew a new PID for a oble conferee We ntroduce a new echans called One-te Pseudony Identty Renewal Ths new feature allows oble conferee to renew hs PID frequently reduces the rsk that he uses a coprosed PID to councate wth Suppose that a oble conferee T s requred to renew hs Pseudony Identty PID 1 wth for the th te he can obtan the new PID accordng to the steps shown n Fgure 2 Fgure 2 The pseudony dentty renewal protocol Msg 1: T : PID 1 EK ( t ID PID 1 r Msg 2: T : EK ( t PID 1 r r Msg 3: T : EK (PID As shown n Fgure 2 the new Pseudony Identty PID s calculated as follows 1 PID = PID r r = 12 n (12 Evdently t wll vary n each pseudony dentty renewal because of the two ro nuber r r Note that PID 0 of oble conferee T s set as the orgnal Pseudony Identty PID n MAP phase that s PID0 = PID In the followng we descrbe ths sub-protocol accordng to the order of essage exchanges n Fgure 2 Step 1 The conferee T does the followng: 1 choose a new ro nuber r K

5 202 Y Jang et al 2 use the conferee key K c generated n prevous MAP protocol to encrypt text { t ID PID r } 1 3 send the essage {PID E ( t ID PID r } to 1 K 1 Step 2 On recevng the essage 1 fro T uses the conference sesson key K c to decrypt the essage EK ( t ID PID 1 r checks whether PID 1 n EK ( t ID PID 1 r s the sae as the PID 1 reserved n prevous renewal sesson If t s false ternates the executon Otherwse the Pseudony Identty PID 1 of oble conferee T s authentcated Subsequently does the followng: 1 generate a ro r 2 set PID = PID 1 r r as the new Pseudony Identty keepng t secretly 3 send essage EK ( t PID 1 r r back to conferee T Step 3 onferee T decrypts EK ( t PID 1 r r wth conference key K c If the decrypted ro r n EK ( t PID 1 r r s equal to ts orgnal ro r then T can copute the new Pseudony Identty PID as PID = PID 1 r r Then conferee T sends E K (PID to to verfy the new PID Step 4 If DK ( E (PID PID K = then records the new PID for oble conferee T So far has fnshed the authentcaton process wth T obtaned a new PID for T Snce the two ro r r are generated oble conferee T respectvely PID = PID 1 r r plays a role of one-te PID when T access We call ths new echans as One-te Pseudony Identty Renewal Next we shall analyse the securty of ths protocol The perforance coparson between our protocol the one n Hwang hang (2003 schee wll be descrbed n the later secton 3 Securty analyss Generally there are fve basc securty requreents for secure teleconference servces (Hwang 1999: 1 Prvacy of partcpant s locaton nforaton durng the councaton so that t s requste to provde the dentty anonyty ntracablty echans 2 Preventon of replay attackng so that ntruders are not able to obtan senstve data relayng a prevously ntercepted essage 3 Prvacy of conference conversaton content 4 Preventon of fraud ensurng that oble conferees are authentc that s there s a utual authentcaton echans between a oble conferee 5 Secure dynac partcpaton so that any actve partcpant can on or leave a teleconference whle assurng the freshness of conference sesson key Next we analyse the securty of our proposed protocol to see whether these securty requreents have been satsfed 31 Identty anonyty ntracablty analyss The securty requreent for concealng partcpants locaton nforaton s acheved ntroducng a sple dentty anonyty echans Ths feature akes an ntruder unable to trace a partcular oble user s locaton nterceptng the conversaton Our schee provdes dentty anonyty n all procedures replacng conferees real dentty wth a PID ase 1 In MAP phase the real dentty ID of T s replaced wth PID ( = hn ( ID ID ID Snce only knows the secret nuber N hn ( ID nobody except can obtan real ID fro PID coputng ID = PID hn ( ID ID t s possble for a tracker to extract the real dentty ID fro the transtted essages then trace the locaton of a oble targeted user Snce each conferee s PID s coputed usng unque N the legtate conferee T cannot copute another conferee T k s ID k nterceptng PID k personate T k ase 2 In PIRP phase the dentty anonyty s guaranteed the slar echans That s the conferee T substtutes the Pseudony Identty PID wth hs real dentty ID where the Pseudony Identty PID s coputed as PID = PID r r 1 The dentty ntracablty s also assured When a conferee T partcpates a teleconference hs Pseudony Identty PID = PID 1 r r wll be renewed frequently because of the varance of ro nuber r r The dynacs of ro r r guarantees the freshness of the Pseudony Identty PID n dfferent sesson phases Although locaton-awareness servces applcatons wll becoe ore popular n the future; the portance of protectng nforaton about partcpants locatons would not be decreasng accordngly especally consderng such

6 Self-encrypton authentcaton protocol 203 confdental applcatons n ltary envronent It sees that the dentty anonyty ay contradct wth the locaton-awareness servces applcatons Actually ntroducng soe other echanss such as the key escrow or recovery schee (Abe Ka 2002; Gonzáles Neto et al 2002 we can stll provde the locaton-awareness servces as well as safeguard the prvacy of a partcpant s locaton nforaton wth the ad of dentty anonyty echans 32 Preventon of relayng attackng A replayng attack s a ethod that an ntruder stores stale ntercepted essages retransts the at a later te An effcent easure aganst a replayng attack s to ntroduce testap t lfete L nto the transtted essages set an expected legal te nterval t for transsson delay All transtted essages n each step of our schee contan testaps Accordng to the testap t t the recever can effcently verfy the valdty of these essages checkng f t t < t s true where t s the testap of a essage whle t s current te when t s receved If ths nequalty holds the essage s vald Otherwse regards ths essage as a replayng essage By ths echans a replayng attack can be avoded 33 Prvacy of conferee conversaton content Evdently the prvacy of conferee conversaton content n our schee s guaranteed Once the vald partcpants hold the sesson key K c the conversaton of the conference content wll be encrypted K c Hence any ntruder cannot know the conversaton content wthout knowng the sesson key K c To obtan conference sesson key K c an ntruder ust frst obtan the prvate ro r then use t to calculate K c as n Equaton (9 However n our schee the ro r ( = 12 s only generated secretly conferee T Nobody except T hself knows the ro r Therefore even though all of the essages {PID 1 Es ( t 1 1 s1 r 1 ID 2 ID } { QyR PA} n Fgure 1 can be ntercepted the ntruder cannot obtan r ( = 12 furtherore copute conferee y sesson key K = ( Q2 + Rod( r snce t s portant for h to get the secret key s( s = f(id unless he knows the real dentty ID of the conferee T Hence the ntruder s prohbted fro stealng the sesson key K c eavesdroppng any councaton content 34 Preventon of fraud In order to prevent fraud the conferees should be authentcated wth each other Ths requres that our schee provde utual authentcaton echans between each conferee Frstly assue that we consder the followng personaton attack scenaros n MAP protocol Ths securty requreent can be acheved verfyng the correctness of the conferee s dentty ID hs secret key s ase 1 An ntruder has no way to personate to cheat conferee T Snce the shared key s s only known to conferee T an ntruder cannot send conferee T the vald response { QyR PA} whch s generated Once each partcpant T receves the essage { QyR PA} n Fgure 1 he can y copute K = ( Q2 + Rod( r then verfes the valdty of K c checkng whether PA s equal to E (ID K ase 2 An ntruder cannot personate T to cheat snce he cannot know the real dentty of T If the ntruder uses a phony dentty ID the correspondng spurous PID can be dentfed snce can obtan the ID coputng ID = PID hn ( ID ID And then can detect the spurous ID Gven that ID s kept secretly n our protocol nobody except T hself can know hs real dentty Therefore our MAP protocol can effcently prevent an ntruder fro personatng attacks because of the atory utual authentcaton echans between oble conferee T Slarly n PIRP protocol the denttes of conferees T are also copulsorly authentcated each other Suppose that we consder the followng personaton attack scenaros n ths protocol ase 1 An ntruder has no way to personate to cheat conferee T snce he does not possess the prevous Pseudony Identty PID 1 Hence t s possble for an ntruder to send the authentc essage {PID E ( t ID PID r } to 1 K 1 ase 2 An ntruder also has no way to personate conferee T ( = 12 to cheat Snce the shared conference sesson key K c s unknown to anyone only except conferee T ( = 12 the ntruder possbly sends the authentc essage EK ( t PID 1 r r to conferee T Moreover M s requred to send back the essage E K (PID to for utual plct key authentcaton 35 Dynac partcpant echans Our proposed protocol eets the requreent of secure dynac partcpaton snce the key dstrbuton echans n our schee can update the sesson key K c

7 204 Y Jang et al when a eber ons or leaves the n-process conference As descrbed n Secton 2 can assure the freshness of conference sesson key K c changng the sesson key K c re-coputng PI then re-dstrbutng the requste updatng essages to correspondng conferees 4 Perforance analyss The portable devces usually have low power coputaton capacty so t s practcal to pleent certan coplex cryptography algorths whch requre hgh coputaton coplexty n portable devces There are two perforance factors to be consdered n wreless envronent Frstly the low coputatonal power of oble devces should be a concern whch eans a securty protocol requrng heavy coputaton on the oble devce s not feasble (Ng Mtchell 2004; Sh 2003; Wong han 2001 Secondly snce the bwdth s lower the channel error s hgher n wreless networks than that n wred networks the securty protocols should be desgned to nse the essage sze the nuber of essage exchanges The perforance coparson between our protocol the one n Hwang hang (2003 schee s shown n Table 1 We anly copare the nuber of hash operatons exponentaton operatons syetrc encrypton/decrypton operatons the nuber of transssons (essage exchanges n the two protocols Table 1 oparson te Exponental operaton Perforance coparson T Hwang hang protocol 1 (step 5 1 (step 4 Our protocol 1 (step 5 1 (step 4 Hash operaton T 1 (step 1 Syetrc encrypton Syetrc decrypton Transsson essages Identty anonyty Locaton ntracablty T T 1 (step 1 or 5 (steps (steps 1 or 5 (steps 2 5 T 2 + 3( ( 1 Yes Yes Note that the rows n shadow show the dfferences between the Though one Hash operaton (coputng the long-ter shared secret key s s added n our schee we obtan the followng extra securty features: 1 The dentty anonyty ntracablty echans are offered so that t s dffcult for an ntruder to trace the locaton of a target conferee 2 The one-way hash functon f can be publc n our schee 3 The securty when a partcpant ons an n-process teleconference s further strengthened 5 oncluson future work In ths paper we propose a novel authentcaton protocol wth anonyty property for teleconference servces to resolve the securty ssues n prevous teleconference protocols Two new echanss are ntroduced n our protocols: dentty anonyty one-te pseudony dentty renewal For offerng anonyty we conceal the real dentty of a oble conferee n a prearranged PID utlsng the secret-splttng prncple In order to provde locaton ntracablty one-te pseudony dentty renewal echans s ntroduced We utlse teratve algorth to update PID frequently thus reduce the rsk that a conferee uses a coprosed PID to councate wth The perforance coparsons show that though we acheve such new securty features the coplexty of our protocols s slar to the one n the lterature the coputaton requreent for oble devce s qute low Acknowledgeent Ths relatve work was supported n part the NSF of hna under contracts No ; the Proects of Developent Plan of the State Hgh Technology Research under contract No 2003B Intel IXA Unversty Research Plan References Abe M Ka M (2002 A key escrow schee wth te-lted ontorng for one-way councaton The oputer Journal Vol 45 No 6 pp Gonzáles Neto JM Vswanathan K Boyd lark A Dawson E (2002 Key recovery for the coercal envronent Internatonal Journal of Inforaton Securty Vol 1 No 3 pp Hwang KF hang (2003 A self-encrypton echans for authentcaton of roang teleconference servces IEEE Transactons on Wreless ouncatons Vol 2 pp Hwang MS (1999 Dynac partcpaton n a secure conference schee for oble councatons IEEE Transactons on Vehcular Technology Vol 48 pp Hwang MS Yang WP (1995 onference key dstrbuton schees for secure dgtal oble councatons IEEE Journal on Selected Areas n ouncatons Vol 13 pp Ng SL (2001 oents on Dynac partcpaton n a secure conference schee for oble councatons IEEE Transactons on Vehcular Technology Vol 50 pp

8 Self-encrypton authentcaton protocol 205 Ng SL Mtchell (2004 oents on utual authentcaton key exchange protocols for low power wreless councatons IEEE ouncatons Letters Vol 8 pp Schneer B (1996 Appled ryptography: Protocols Algorth Source ode 2nd edton John Wely & Sons Inc pp70 72 Sh K (2003 ryptanalyss of utual authentcaton key exchange for low power wreless councatons IEEE ouncatons Letters Vol 7 pp Wong DS han AH (2001 Mutual authentcaton key exchange for low power wreless councatons Proceedngs of IEEE Mltary ouncatons onference MILOM 2001 Vol 1 pp39 43

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School

More information

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

Two-Phase Traceback of DDoS Attacks with Overlay Network

Two-Phase Traceback of DDoS Attacks with Overlay Network 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of

More information

An Electricity Trade Model for Microgrid Communities in Smart Grid

An Electricity Trade Model for Microgrid Communities in Smart Grid An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

An Enhanced K-Anonymity Model against Homogeneity Attack

An Enhanced K-Anonymity Model against Homogeneity Attack JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters 01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;

More information

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,

More information

Quality of Service Analysis and Control for Wireless Sensor Networks

Quality of Service Analysis and Control for Wireless Sensor Networks Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as

More information

Maximizing profit using recommender systems

Maximizing profit using recommender systems Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co

More information

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments 202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co

More information

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School

More information

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA 238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

International Journal of Information Management

International Journal of Information Management Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt

More information

Virtual machine resource allocation algorithm in cloud environment

Virtual machine resource allocation algorithm in cloud environment COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,

More information

Capacity Planning for Virtualized Servers

Capacity Planning for Virtualized Servers Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

A Dual-Spiral Reengineering Model for Legacy System

A Dual-Spiral Reengineering Model for Legacy System A Dual-pral Reengneerng Model or Legacy yste Xaohu Yang Lu Chen Xnyu Wang College o Coputer cence and Technology Zheang Unversty Hangzhou Chna {yangxh bluelucy wangxnyu}@zu.edu.cn Abstract Coputer Technology

More information

Web Service-based Business Process Automation Using Matching Algorithms

Web Service-based Business Process Automation Using Matching Algorithms Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT

More information

Inventory Control in a Multi-Supplier System

Inventory Control in a Multi-Supplier System 3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model

More information

Inter-domain Alliance Authentication Protocol Based on Blind Signature

Inter-domain Alliance Authentication Protocol Based on Blind Signature Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Transformation of Commercial Flows into Physical Flows of Electricity

Transformation of Commercial Flows into Physical Flows of Electricity Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Online Algorithms for Uploading Deferrable Big Data to The Cloud

Online Algorithms for Uploading Deferrable Big Data to The Cloud Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set

More information

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

INTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION

INTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION XV. INTODUCTION TO MEGES AND ACQUISITIONS: FIM DIVESIFICATION In the ntroducton to Secton VII, t was noted that frs can acqure assets by ether undertakng nternally-generated new projects or by acqurng

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

The Packing Server for Real-Time Scheduling of MapReduce Workflows

The Packing Server for Real-Time Scheduling of MapReduce Workflows The Packng Server for Real-Te Schedulng of MapReduce Workflows Shen L, Shaohan Hu, Tarek Abdelzaher Unversty of Illnos at Urbana-Chapagn {shenl3, shu7, zaher}@llnos.edu Abstract Ths paper develops new

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Identity-Based Encryption Gone Wild

Identity-Based Encryption Gone Wild An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information