Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
|
|
- Anthony Horton
- 8 years ago
- Views:
Transcription
1 198 Int J Securty Networks Vol 1 Nos 3/ A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn E-al: cln@csnet1cstsnghuaeducn Mnghu Sh Xuen Sheran Shen* Departent of Electrcal oputer Engneerng Unversty of Waterloo Waterloo Ontaro anada E-al: sh@bbcruwaterlooca E-al: xshen@bbcruwaterlooca *orrespondng author Abstract: A novel authentcaton protocol for teleconference servce s proposed The an features of the proposed protocol nclude dentty anonyty one-te Pseudony Identty (PID renewal locaton ntracablty Identty anonyty s acheved concealng the real dentty of a oble conferee n a prearranged PID One-te PID Renewal echans n whch the oble conferee s PID s frequently updated councatng wth the network centre s ntroduced to offer locaton ntracablty It s shown that the securty has been sgnfcantly enhanced whle the coputaton coplexty s slar to the exstng ones appeared n the lterature Keywords: authentcaton; teleconference servces; protocol; anonyty Reference to ths paper should be ade as follows: Jang Y Ln Sh M Shen XS (2006 A self-encrypton authentcaton protocol for teleconference servces Int J Securty Networks Vol 1 Nos 3/4 pp Bographcal notes: Yxn Jang receved hs MS n oputer Scence fro Huazhong Unversty of Scence Technology n 2002 He s currently pursng hs PhD at the Departent of oputer Scence Technology Tsnghua Unversty Beng hna Hs current research nterests nclude network securty huang Ln s a Professor of oputer Scence at the Tsnghua Unversty Beng hna He receved hs BS PhD n oputer Scence fro Tsnghua Unversty Her current research focuses on perforance evaluaton Petr nets teporal logcs network securty Mnghu Sh receved a BS n 1996 fro Shangha Jao Tong Unversty hna an MS n 2002 fro the Unversty of Waterloo Ontaro anada both n electrcal engneerng He s currently workng towards a PhD at the Unversty of Waterloo Hs current research nterests nclude wreless LAN/cellular network ntegraton network securty Xuen Sheran Shen s a Professor of Electrcal oputer Engneerng at the Unversty of Waterloo Ontaro anada He receved hs PhD n control fro Rutgers Unversty USA Hs research nterests nclude wreless/nternet nterworkng rado resource oblty anageent voce over oble IP WLAN/WMAX WAP UWB wreless councatons wreless ad hoc sensor networks wreless network securty stochastc process optal control flterng 1 Introducton Moble teleconference s a synchronous collaboraton sesson n whch conferees at reote locatons cooperate wth an nteractve procedure for exaple a board eetng a task force or a scentfc syposu through wreless councatons When a conference char holds a oble teleconference all conferees are requred to connect to a centre node called a Network enter ( va wreless access network The receves essages opyrght 2006 Inderscence Enterprses Ltd
2 Self-encrypton authentcaton protocol 199 fro conferees processes the n an approprate way then sends the results to conferees Prvacy s very portant to oble teleconference A secure conference servce protocol for dgtal oble networks has proposed Hwang Yang (1995 The protocol can establsh a sesson key for a vald user to hold a teleconference A odfed secure teleconference protocol whch allows an actve partcpant to on or ext on-gong conference has been presented Hwang (1999 Both user authentcaton sesson key dstrbuton are sultaneously ncluded n the conference protocol The sesson key dstrbuton uses a publc key cryptosyste to splfy the councaton between conferees However the conferee s oble devce s requred to use two cryptosystes whch s not frendly to the low coputaton power requreent A splfed echans called self-encrypton was gven Hwang hang (2003 whch not only decreases the coputaton coplexty n Hwang (1999 but also retans sple councatons for the secure teleconference servce The self-encrypton echans uses the plantext as a long-ter secret key to encrypt the correspondng cpher-text The long-ter secret key s = f(id for ts th oble user T s antaned where f s a secret one-way hash functon ID denotes the dentty of the oble user The self-encrypton echans operates as follows: Step 1 A charan T 1 ntates a conference then: 1 chooses two ro nubers r 11 r 12 2 uses the long-ter secret key s1( = f(id 1 to { t s r r ID ID } encrypt sends essage {ID 1 Es ( t 1 1 s1 r11 r 12 ID 2 ID } to the trusted Here ID ( = 1 2 represents the conferees dentty t 1 denotes the testap s 1 s generated such as s = f(id where f s a secret one-way functon held Step 2 On recevng essage fro T 1 decrypts the encrypted data usng the long-ter secret key s 1 then verfes whether s 1 s equal to f (ID 1 the testap t 1 s wthn soe reasonable range copared wth ts current te If both are true calls other oble conferees ID ( = 2 3 Step 3 Every partcpant T for = 2 3 does the sae as charan T 1 does that s: 1 chooses two ro nubers r 1 r 2 2 uses the long-ter secret key s( = f(id to encrypt ( t s r1 r 2 3 sends the essage {ID Es ( t 1 2} s r r to Step 4 When recevng the essage fro T decrypts the encrypted data then verfes the authentcty of s the testap t If both are true selects two non-zero ro nubers K c r 0 calculates PI PA ( PI = K + lc r r r (1 c ( 0 1 PA = E K ID (2 where K c denotes the sesson key of the conference lc ( r0 r1 r denotes the least coon ultple functon Fnally broadcasts tuple ( QyR PA to T ( = 2 3 Here Q y R are coputed PI = Q2 y + R Step 5 Each partcpant T obtans conference key K as y K = ( Q2 + Rod( r (3 where the sesson key r s coputed as r = r1+ r2 They verfy the valdty of K c checkng whether PA s equal to E K (ID Note that the self-encrypton echans provdes an plct authentcaton (Steps 2 4 Once recevng essage fro T decrypts the encrypted data usng the long-ter secret key s If the decrypted secret key s s equal to f (ID the dentty of conferee T s true However the self-encrypton echans cannot provde dentty anonyty an ntruder can easly obtan ID nterceptng the essages If the secret oneway functon f s sped the ntruder could copute all the long-ter shared keys s the cryptographc syste would be prosed The dsclosure of a user s dentty wll allow unauthorsed enttes to track hs ovng hstory current locaton whch entals the volaton of hs prvacy Hence the dentty anonyty s one of the portant factors that should be consdered n oble teleconference On the other h the echans of ssung the sesson key to a new partcpant durng a conference ay cause that a partcpant who leaves rght after the new partcpant onng the conference s stll able to eavesdrop the conversaton even when the sesson key s refreshed (Ng 2001 In ths paper we propose a sple authentcaton protocol wth anonyty property for oble teleconference servces based on the Secret Splttng prncple (Schneer 1996 Secret splttng s a type of nforaton-hdden technque n whch a essage s dvded nto several coponents The orgnal essage can be reconstructed f only f the nuber of coponents gathered s equal or greater than the preset threshold In the proposed protocol the real dentty of a oble conferee s decoposed nto a Pseudony Identty (PID used for transsson a ro nuber N whch s known only so that an ntruder s unable to reconstruct the real dentty fro PID wthout the knowledge of N In addton to prevent the oblty of a partcular oble conferee fro beng traced the PID s renewed frequently usng proposed One-te PID Renewal echans The conversaton prvacy s also guaranteed when partcpants on or leave the on-gong teleconference eetng properly renewng re-dstrbutng the conference sesson key
3 200 Y Jang et al The rest of ths paper s organsed as follows In Secton 2 the authentcaton protocol wth anonyty for teleconference servces s proposed In Sectons 3 4 the securty the perforance analyss are presented respectvely followed the concluson n Secton 5 2 The proposed authentcaton protocol wth anonyty property The proposed authentcaton protocol uses a sple secret splttng echans to provde the dentty anonyty prevent unauthorsed enttes fro tracng a partcular oble user s roang hstory hs current locaton The securty strength does not reply on the secrecy of the one-way functon so publc one-way hash functons are used n the proposed protocol We stll retan the self-encrypton echans n the proposed schee that s the also antans a long-ter secret key s = f(id for hs conferee T usng a one-way functon f By extractng the real dentty ID of user T fro PID we can further copute the shared key s whch s used to encrypt the exchanged essages However we provde dentty anonyty echans usng a Pseudony Identty PID for a oble user T nstead of hs real dentty ID The Pseudony Identty PID s prearranged dstrbuted n advance And the oble user T stores PID whch s only known to hself 21 Mutual Authentcaton Protocol (MAP When a user T regsters wth he subts hs dentty ID to whose dentty s ID generates an -bts ro nuber N keeps t secret In order to prevent the exclusve search attack should be suffcently large for exaple 128 bts or longer coputes a Pseudony Identty PID for T as: PID = hn ( ID ID ID (4 where denotes btwse XOR operaton h s a publc strong one-way hash functon Then delvers PID to T through a secure channel records the appng relaton of PID N(PID N n dstrbuted database servers By ths secret-splttng echans we can conceal the real dentty ID n PID provde dentty anonyty for T whle keepng the algorth sple In the followng we descrbe the proposed authentcaton protocol accordng to the order of essage exchange also dscuss the securty goals whch can be acheved durng the executon of each protocol essage (see Fgure 1 Step 1 The conference charan T 1 : 1 chooses a ro nuber r 1 2 coputes the long-ter key s 1 s = f(id uses key s 1 to encrypt ( t s r ID ID sends essage {PID 1 Es ( t 1 1 s1 r 1 ID 2 ID } to Here PID ( = 12 represents the PID of T Step 2 On recevng the essage fro T 1 retreves the correspondng N 1 of oble conferee T 1 searchng the PID N appng table derves the real dentty of oble conferee T 1 coputng ( ID = PID h N ID ID ( Hence can retreve correspondng shared key s 1 decrypt Es ( t 1 1 s1 r 1 ID 2 ID Then verfes the authentcty of the secret key s 1 the testap t 1 If both are true calls the other oble user ID( = 23 Note that all of the shared keys s ( = 12 are precoputed Fgure 1 The proposed schee wth anonyty property for secure teleconference
4 Self-encrypton authentcaton protocol 201 Step 3 The partcpant T for = 2 3 does the sae as charan T1 n Step 1 onferee T: 1 chooses a ro r 2 coputes the long-ter secret key s as s = f(id 3 uses secret key s to encrypt { t s r } 4 sends the essage {PID Es ( t } s r to Step 4 On recevng the essage fro T retreves the correspondng N of T searchng the PID N appng table extracts the dentty ID of T ( ID = PID h N ID ID (6 Then can retreve correspondng shared key s further decrypt Es ( t s r Next checks the authentcty of secret key s testap t If t s true selects two non-zero ro nubers K c r 0 further calculates PI PA ( PI = K + lc r r r (7 c ( 0 1 PA = E K ID (8 where K c s the sesson key lc ( r0 r1 r denotes the least coon ultple functon Fnally broadcasts tuple ( QyR PA to all T ( = 23 where Q y R are coputed PI = Q2 y + R for savng transsson bwdth Step 5 Each partcpant T obtans y K = ( Q2 + Rod( r (9 Then T verfes the valdty of K c checkng whether PA s equal to E (ID 22 Dynac partcpant echans To assure the freshness of sesson key K c when a partcpant wants to ext an n-process teleconference ust change the sesson key K c re-copute PI Meber on: when a partcpant T +1 ons a conference that s already n-process the procedures of obtanng K c for T +1 are the sae as n steps 3 5 except that sends Q y R to conferee T +1 where PI = K y c + r+ s+ = Q + R Meber qut: when a partcpant T leaves a conference that s already n-process the renewng procedures for sesson key K c are descrbed as follows Step 1 selects a new sesson key K further calculates PI PA as follows PA ( ID = K K E (10 ( PI = K + lc r r r r r (11 where r = + r t t denotes the current te Then broadcasts four-tuple ( t Q y R to T where paraeters Q y R PI satsfy the equaton PI = Q 2 y + R Step 2 The reanng conferee T ( obtans the y new sesson key K = ( 2 + od( + Q R r t verfes the authentcty of sesson key K checkng whether PA s equal to E ( ID 23 Pseudony Identty Renewal Protocol Though n prevous MAP schee we provde an dentty anonyty echans usng a Pseudony Identty PID for a oble conferee T nstead of hs real dentty ID there are stll soe securty ssues to be consder For exaple even when the oble conferee T never reveals hs dentty ID to partes other than he does reveal hs long-ter Pseudony Identty PID durng utual authentcaton n MAP Therefore llegal partes can stll track a conferee s locaton hs long-ter PID although they have no way to extract the real dentty ID The goal of Pseudony Identty Renewal Protocol (PIRP protocol s to renew a new PID for a oble conferee We ntroduce a new echans called One-te Pseudony Identty Renewal Ths new feature allows oble conferee to renew hs PID frequently reduces the rsk that he uses a coprosed PID to councate wth Suppose that a oble conferee T s requred to renew hs Pseudony Identty PID 1 wth for the th te he can obtan the new PID accordng to the steps shown n Fgure 2 Fgure 2 The pseudony dentty renewal protocol Msg 1: T : PID 1 EK ( t ID PID 1 r Msg 2: T : EK ( t PID 1 r r Msg 3: T : EK (PID As shown n Fgure 2 the new Pseudony Identty PID s calculated as follows 1 PID = PID r r = 12 n (12 Evdently t wll vary n each pseudony dentty renewal because of the two ro nuber r r Note that PID 0 of oble conferee T s set as the orgnal Pseudony Identty PID n MAP phase that s PID0 = PID In the followng we descrbe ths sub-protocol accordng to the order of essage exchanges n Fgure 2 Step 1 The conferee T does the followng: 1 choose a new ro nuber r K
5 202 Y Jang et al 2 use the conferee key K c generated n prevous MAP protocol to encrypt text { t ID PID r } 1 3 send the essage {PID E ( t ID PID r } to 1 K 1 Step 2 On recevng the essage 1 fro T uses the conference sesson key K c to decrypt the essage EK ( t ID PID 1 r checks whether PID 1 n EK ( t ID PID 1 r s the sae as the PID 1 reserved n prevous renewal sesson If t s false ternates the executon Otherwse the Pseudony Identty PID 1 of oble conferee T s authentcated Subsequently does the followng: 1 generate a ro r 2 set PID = PID 1 r r as the new Pseudony Identty keepng t secretly 3 send essage EK ( t PID 1 r r back to conferee T Step 3 onferee T decrypts EK ( t PID 1 r r wth conference key K c If the decrypted ro r n EK ( t PID 1 r r s equal to ts orgnal ro r then T can copute the new Pseudony Identty PID as PID = PID 1 r r Then conferee T sends E K (PID to to verfy the new PID Step 4 If DK ( E (PID PID K = then records the new PID for oble conferee T So far has fnshed the authentcaton process wth T obtaned a new PID for T Snce the two ro r r are generated oble conferee T respectvely PID = PID 1 r r plays a role of one-te PID when T access We call ths new echans as One-te Pseudony Identty Renewal Next we shall analyse the securty of ths protocol The perforance coparson between our protocol the one n Hwang hang (2003 schee wll be descrbed n the later secton 3 Securty analyss Generally there are fve basc securty requreents for secure teleconference servces (Hwang 1999: 1 Prvacy of partcpant s locaton nforaton durng the councaton so that t s requste to provde the dentty anonyty ntracablty echans 2 Preventon of replay attackng so that ntruders are not able to obtan senstve data relayng a prevously ntercepted essage 3 Prvacy of conference conversaton content 4 Preventon of fraud ensurng that oble conferees are authentc that s there s a utual authentcaton echans between a oble conferee 5 Secure dynac partcpaton so that any actve partcpant can on or leave a teleconference whle assurng the freshness of conference sesson key Next we analyse the securty of our proposed protocol to see whether these securty requreents have been satsfed 31 Identty anonyty ntracablty analyss The securty requreent for concealng partcpants locaton nforaton s acheved ntroducng a sple dentty anonyty echans Ths feature akes an ntruder unable to trace a partcular oble user s locaton nterceptng the conversaton Our schee provdes dentty anonyty n all procedures replacng conferees real dentty wth a PID ase 1 In MAP phase the real dentty ID of T s replaced wth PID ( = hn ( ID ID ID Snce only knows the secret nuber N hn ( ID nobody except can obtan real ID fro PID coputng ID = PID hn ( ID ID t s possble for a tracker to extract the real dentty ID fro the transtted essages then trace the locaton of a oble targeted user Snce each conferee s PID s coputed usng unque N the legtate conferee T cannot copute another conferee T k s ID k nterceptng PID k personate T k ase 2 In PIRP phase the dentty anonyty s guaranteed the slar echans That s the conferee T substtutes the Pseudony Identty PID wth hs real dentty ID where the Pseudony Identty PID s coputed as PID = PID r r 1 The dentty ntracablty s also assured When a conferee T partcpates a teleconference hs Pseudony Identty PID = PID 1 r r wll be renewed frequently because of the varance of ro nuber r r The dynacs of ro r r guarantees the freshness of the Pseudony Identty PID n dfferent sesson phases Although locaton-awareness servces applcatons wll becoe ore popular n the future; the portance of protectng nforaton about partcpants locatons would not be decreasng accordngly especally consderng such
6 Self-encrypton authentcaton protocol 203 confdental applcatons n ltary envronent It sees that the dentty anonyty ay contradct wth the locaton-awareness servces applcatons Actually ntroducng soe other echanss such as the key escrow or recovery schee (Abe Ka 2002; Gonzáles Neto et al 2002 we can stll provde the locaton-awareness servces as well as safeguard the prvacy of a partcpant s locaton nforaton wth the ad of dentty anonyty echans 32 Preventon of relayng attackng A replayng attack s a ethod that an ntruder stores stale ntercepted essages retransts the at a later te An effcent easure aganst a replayng attack s to ntroduce testap t lfete L nto the transtted essages set an expected legal te nterval t for transsson delay All transtted essages n each step of our schee contan testaps Accordng to the testap t t the recever can effcently verfy the valdty of these essages checkng f t t < t s true where t s the testap of a essage whle t s current te when t s receved If ths nequalty holds the essage s vald Otherwse regards ths essage as a replayng essage By ths echans a replayng attack can be avoded 33 Prvacy of conferee conversaton content Evdently the prvacy of conferee conversaton content n our schee s guaranteed Once the vald partcpants hold the sesson key K c the conversaton of the conference content wll be encrypted K c Hence any ntruder cannot know the conversaton content wthout knowng the sesson key K c To obtan conference sesson key K c an ntruder ust frst obtan the prvate ro r then use t to calculate K c as n Equaton (9 However n our schee the ro r ( = 12 s only generated secretly conferee T Nobody except T hself knows the ro r Therefore even though all of the essages {PID 1 Es ( t 1 1 s1 r 1 ID 2 ID } { QyR PA} n Fgure 1 can be ntercepted the ntruder cannot obtan r ( = 12 furtherore copute conferee y sesson key K = ( Q2 + Rod( r snce t s portant for h to get the secret key s( s = f(id unless he knows the real dentty ID of the conferee T Hence the ntruder s prohbted fro stealng the sesson key K c eavesdroppng any councaton content 34 Preventon of fraud In order to prevent fraud the conferees should be authentcated wth each other Ths requres that our schee provde utual authentcaton echans between each conferee Frstly assue that we consder the followng personaton attack scenaros n MAP protocol Ths securty requreent can be acheved verfyng the correctness of the conferee s dentty ID hs secret key s ase 1 An ntruder has no way to personate to cheat conferee T Snce the shared key s s only known to conferee T an ntruder cannot send conferee T the vald response { QyR PA} whch s generated Once each partcpant T receves the essage { QyR PA} n Fgure 1 he can y copute K = ( Q2 + Rod( r then verfes the valdty of K c checkng whether PA s equal to E (ID K ase 2 An ntruder cannot personate T to cheat snce he cannot know the real dentty of T If the ntruder uses a phony dentty ID the correspondng spurous PID can be dentfed snce can obtan the ID coputng ID = PID hn ( ID ID And then can detect the spurous ID Gven that ID s kept secretly n our protocol nobody except T hself can know hs real dentty Therefore our MAP protocol can effcently prevent an ntruder fro personatng attacks because of the atory utual authentcaton echans between oble conferee T Slarly n PIRP protocol the denttes of conferees T are also copulsorly authentcated each other Suppose that we consder the followng personaton attack scenaros n ths protocol ase 1 An ntruder has no way to personate to cheat conferee T snce he does not possess the prevous Pseudony Identty PID 1 Hence t s possble for an ntruder to send the authentc essage {PID E ( t ID PID r } to 1 K 1 ase 2 An ntruder also has no way to personate conferee T ( = 12 to cheat Snce the shared conference sesson key K c s unknown to anyone only except conferee T ( = 12 the ntruder possbly sends the authentc essage EK ( t PID 1 r r to conferee T Moreover M s requred to send back the essage E K (PID to for utual plct key authentcaton 35 Dynac partcpant echans Our proposed protocol eets the requreent of secure dynac partcpaton snce the key dstrbuton echans n our schee can update the sesson key K c
7 204 Y Jang et al when a eber ons or leaves the n-process conference As descrbed n Secton 2 can assure the freshness of conference sesson key K c changng the sesson key K c re-coputng PI then re-dstrbutng the requste updatng essages to correspondng conferees 4 Perforance analyss The portable devces usually have low power coputaton capacty so t s practcal to pleent certan coplex cryptography algorths whch requre hgh coputaton coplexty n portable devces There are two perforance factors to be consdered n wreless envronent Frstly the low coputatonal power of oble devces should be a concern whch eans a securty protocol requrng heavy coputaton on the oble devce s not feasble (Ng Mtchell 2004; Sh 2003; Wong han 2001 Secondly snce the bwdth s lower the channel error s hgher n wreless networks than that n wred networks the securty protocols should be desgned to nse the essage sze the nuber of essage exchanges The perforance coparson between our protocol the one n Hwang hang (2003 schee s shown n Table 1 We anly copare the nuber of hash operatons exponentaton operatons syetrc encrypton/decrypton operatons the nuber of transssons (essage exchanges n the two protocols Table 1 oparson te Exponental operaton Perforance coparson T Hwang hang protocol 1 (step 5 1 (step 4 Our protocol 1 (step 5 1 (step 4 Hash operaton T 1 (step 1 Syetrc encrypton Syetrc decrypton Transsson essages Identty anonyty Locaton ntracablty T T 1 (step 1 or 5 (steps (steps 1 or 5 (steps 2 5 T 2 + 3( ( 1 Yes Yes Note that the rows n shadow show the dfferences between the Though one Hash operaton (coputng the long-ter shared secret key s s added n our schee we obtan the followng extra securty features: 1 The dentty anonyty ntracablty echans are offered so that t s dffcult for an ntruder to trace the locaton of a target conferee 2 The one-way hash functon f can be publc n our schee 3 The securty when a partcpant ons an n-process teleconference s further strengthened 5 oncluson future work In ths paper we propose a novel authentcaton protocol wth anonyty property for teleconference servces to resolve the securty ssues n prevous teleconference protocols Two new echanss are ntroduced n our protocols: dentty anonyty one-te pseudony dentty renewal For offerng anonyty we conceal the real dentty of a oble conferee n a prearranged PID utlsng the secret-splttng prncple In order to provde locaton ntracablty one-te pseudony dentty renewal echans s ntroduced We utlse teratve algorth to update PID frequently thus reduce the rsk that a conferee uses a coprosed PID to councate wth The perforance coparsons show that though we acheve such new securty features the coplexty of our protocols s slar to the one n the lterature the coputaton requreent for oble devce s qute low Acknowledgeent Ths relatve work was supported n part the NSF of hna under contracts No ; the Proects of Developent Plan of the State Hgh Technology Research under contract No 2003B Intel IXA Unversty Research Plan References Abe M Ka M (2002 A key escrow schee wth te-lted ontorng for one-way councaton The oputer Journal Vol 45 No 6 pp Gonzáles Neto JM Vswanathan K Boyd lark A Dawson E (2002 Key recovery for the coercal envronent Internatonal Journal of Inforaton Securty Vol 1 No 3 pp Hwang KF hang (2003 A self-encrypton echans for authentcaton of roang teleconference servces IEEE Transactons on Wreless ouncatons Vol 2 pp Hwang MS (1999 Dynac partcpaton n a secure conference schee for oble councatons IEEE Transactons on Vehcular Technology Vol 48 pp Hwang MS Yang WP (1995 onference key dstrbuton schees for secure dgtal oble councatons IEEE Journal on Selected Areas n ouncatons Vol 13 pp Ng SL (2001 oents on Dynac partcpaton n a secure conference schee for oble councatons IEEE Transactons on Vehcular Technology Vol 50 pp
8 Self-encrypton authentcaton protocol 205 Ng SL Mtchell (2004 oents on utual authentcaton key exchange protocols for low power wreless councatons IEEE ouncatons Letters Vol 8 pp Schneer B (1996 Appled ryptography: Protocols Algorth Source ode 2nd edton John Wely & Sons Inc pp70 72 Sh K (2003 ryptanalyss of utual authentcaton key exchange for low power wreless councatons IEEE ouncatons Letters Vol 7 pp Wong DS han AH (2001 Mutual authentcaton key exchange for low power wreless councatons Proceedngs of IEEE Mltary ouncatons onference MILOM 2001 Vol 1 pp39 43
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationA Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
More informationA Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme
A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co
More informationSecure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationTwo-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
More informationAn Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationsscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
More informationCONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationAn Enhanced K-Anonymity Model against Homogeneity Attack
JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;
More informationAn Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationHow Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
More informationBasic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
More informationRUHR-UNIVERSITÄT BOCHUM
RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationA Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,
More informationQuality of Service Analysis and Control for Wireless Sensor Networks
Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as
More informationMaximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co
More informationRevenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments
202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co
More informationResearch Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
More informationScan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationGanesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA
238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationInternational Journal of Information Management
Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt
More informationVirtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More information3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More informationBANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
More informationCapacity Planning for Virtualized Servers
Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationA new anonymity-based protocol preserving privacy based cloud environment
Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal
More informationA Dual-Spiral Reengineering Model for Legacy System
A Dual-pral Reengneerng Model or Legacy yste Xaohu Yang Lu Chen Xnyu Wang College o Coputer cence and Technology Zheang Unversty Hangzhou Chna {yangxh bluelucy wangxnyu}@zu.edu.cn Abstract Coputer Technology
More informationWeb Service-based Business Process Automation Using Matching Algorithms
Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationA NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana
REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT
More informationInventory Control in a Multi-Supplier System
3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationTraffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method
IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model
More informationInter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationTransformation of Commercial Flows into Physical Flows of Electricity
Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech
More informationQOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationCompact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationThe Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationOnline Algorithms for Uploading Deferrable Big Data to The Cloud
Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The
More information1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
More informationHollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationDescription of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t
Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set
More informationA Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems
Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationINTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION
XV. INTODUCTION TO MEGES AND ACQUISITIONS: FIM DIVESIFICATION In the ntroducton to Secton VII, t was noted that frs can acqure assets by ether undertakng nternally-generated new projects or by acqurng
More informationSome literature also use the term Process Control
A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationThe Packing Server for Real-Time Scheduling of MapReduce Workflows
The Packng Server for Real-Te Schedulng of MapReduce Workflows Shen L, Shaohan Hu, Tarek Abdelzaher Unversty of Illnos at Urbana-Chapagn {shenl3, shu7, zaher}@llnos.edu Abstract Ths paper develops new
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationIdentity-Based Encryption Gone Wild
An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More information