Yi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W.
|
|
- Jessie Terry
- 8 years ago
- Views:
Transcription
1 Anonymous Internet Credt Cards Y Mu and Vjay Varadharajan School of Computng and IT, Unversty of Western Sydney, Nepean, PO Box 10, Kngswood, N.S.W. 2747, Australa Emal: fymu,vjayg@ct.nepean.uws.edu.au Abstract In credt based payment systems, condental data such as PIN and credt card number embedded n an electronc credt card must be protected. The authentcty of an electronc credt card n a payment process s normally acheved through an on-lne trusted server such as a nancal nsttuton that runs the payment system. Ths paper consders some novel secure electronc credt card based payment schemes for the Internet, where the nvolvement of the on-lne nancal nsttuton s reduced to a mnmum. Our protocols use the technque of proof of knowledge of dscrete logarthms that enables a prover to prove a secret wthout revealng the secret to the verer. 1 Introducton A fundamental requrement for the Internet to really become an open marketplace for goods and servces n practce s the need for secure chargng and payment mechansms. Gven the explosve growth n the use of the Internet, and n the servces and applcatons beng oered over the Internet, the mechansms enablng secure commercal transactons form the foundaton stone of ths electronc nformaton revoluton. Needless to say securty aspects become crtcal to the successful operaton of any of these electronc payment schemes. Broadly speakng, there are two classes of electronc payment schemes. Schemes such as DgCash [1, 2] and NetCash [3] consder cash-based electronc payments. Others such as KP [4], NetBll [5], NetCheque [6], CyberCash [7], STT[8], SEPP [9], and SET [10] consder credt and debt based electronc payments. Our focus n ths paper s on credt based electronc payment systems. In general, an on-lne credt card payment system nvolves at least the followng partes: Clents (Servce Users) requestng servces from Merchants who provde the servces, and Banks (or Fnancal Insttutons) provdng guarantee and transfer of cash and credts between Clents and Merchants. STT, SEPP, and SET refer to the Fnancal Insttuton as the Acqurer whereas KP models ths usng a Gateway that acts as an ntermedary to the exstng nancal network. We use generc terms such as oer, order and slp n descrbng the payment schemes. The Merchant presents the nformaton about the servce n terms of an Oer. When the Clent wshes to make a purchase, s/he sends an Order and a payment Slp to the Merchant. The Oer s ntended for the merchant whereas the Slp s passed on to the Fnancal Insttuton. The Merchant requests the authorzaton from the Fnancal Insttuton, and upon recept of the authorzaton, the Merchant conrms to the Clent the concluson of the payment transactons. Ths s then followed by the servce delvery. Under these systems, the nancal nsttuton must be on-lne, where t serves as a trusted authentcaton center for merchants and customers by verfyng the authentcty of payment slps. The obvous reason for needng an on-lne server s that merchants do not have
2 the rght to access the PINs and credt card numbers of clents. However, the cost of an on-lne servce has to be taken nto account n the overall assessment. In ths paper, we propose three novel credt based systems that present a promse for merchants not to use an on-lne bankng servce durng the processng of a payment. In other words, n our systems merchants can ensure the authentcty of the credt cards wthout any help from the nancal nsttuton that provdes the credt card servce. Merchant can contact the on-lne authentcaton server for a hgher level of assurance, but the opton s chosen only f merchants want tohave a further conrmaton from the nancal nsttuton before delverng the goods or provdng servce. The sgncance of our schemes have not been shared by the exstng schemes mentoned above. Our schemes are based on the methods of proof of knowledge on the equalty of logarthms (for convenence, we refer to t as equalty proof of knowledge[11] and non-nteractve equalty proof[12]). The dea behnd our scheme s that when purchases an tem from a merchant, a clent can prove hs PIN and credt card number embedded n hs electronc credt card to the merchant wthout revealng the secrets. In partcular, we wll also show that usng ths technque we can make clents n our payment system anonymous. Our rst scheme, usng the nteractve equalty proof[11], s somewhat smlar to Chuam's electronc wallet, but the scheme s used to a derent payment system. However, the second and the thrd schemes are entrely new: The second scheme, usng the non-nteractve equalty proof, reduces communcaton ows between clent and merchant. The thrd scheme acheves anonymous credt cards. The rest of ths paper s organzed as follows. In Secton 2, we ntroduce the scheme of equalty proof of knowledge. In Secton 3, we construct our protocol wthout consderng the anonymty of clents. In Secton 4, we ntroduce non-nteractve equalty proof of knowledge and construct an mproved payment protocol. In Secton 5, we consder clents anonymty, based on the equalty proof of several secrets, and propose a new protocol. 2 Equalty Proof of Knowledge The credt based payment scheme that wll be ntroduced n ths paper s based on the scheme of provng knowledge wthout revealng anythng about the content that has been proven. Ths scheme of proof was ntally proposed by Chaum and Pedersen [11] and Verheul and Tlborg [12]. We assume that the prover s P and the verer s V. The common knowledge ncludes the the generators g 2 G (1 n). The P can prove that she knows a secret x from h = g x mod q wthout revealng the secret, where q s large prme. A condence parameter l s used to specfy the level of the condence of the protocol. The protocol s gven below. In Protocol 1, the prover P chooses a number r 2 R Z p, computes a, n terms of a = g r mod q; (1 n), and sends t to V. V then chooses a challenge c 2 l and sends t to P. Upon recept of c, P computes z = cx + r (modq) as a response and then sends t to V, where q s a large prme number. V checks f the equalty g z = hc a holds for all. If t does, the V wll accept t. If not, then there s a probablty less than 1=l that t wll stll be accepted by V. Ths protocol proves the knowledge of x to V wthout revealng x. The vercaton of completeness, soundness, and securty of the protocol s gven n [12]. For convenence, we ntroduce the denton of knowledge of equalty proof. Denton 1 Gven a challenge c and a correspondng response z, k[x; c; z] fg 1 ; :::; g n ;h 1 ; :::; h n ;a 1 ; :::; a n ;z;cg s the knowledge of equalty proof of the secret x from fg x g.
3 Protocol 1 P V r 2 R Z p a = g r mod q; (1 n) a z = cx + r (modp),,,,,,,,,,! chooses c (0 <c l) c,,,,,,,,,, z,,,,,,,,,,! 8, g z = h c a Wth k[x; c; z], the verer can verfy the authentcty of the secret wthout knowng the secret. 3 Constructon of Our Protocol Our protocol s based on the equalty proof of knowledge gven above and does not need an on-lne authentcaton server such as a bank that runs the system. The authentcty of the credt cards s based on knowng the secret data embedded n the credt card. The secret data s constructed by concatenatng the PIN number, credt number, and salt shared wth the nancal nsttuton. The clent can prove to the merchant that he knows the PIN number and the credt card number wthout revealng them to the merchant. The notatons that wll be used n the descrpton of the protocols are as follows: C: Clent, M: Merchant, B: Bank, TA:Trusted Certcaton Authorty, t p : Tmestamp generated by party P, d p : Prvate Key of user P, e p : Publc Key of user P (assocated wth d p ), h::: ep : Publc Key Encrypton usng e p, h::: dp : Publc Key based Sgnature usng d p. 3.1 Constructon of Credt Card and Payment Tokens An electronc credt card s obtaned by a clent at the stage of regstraton wth the bank. Ths can be done ether through a secure channel or va physcal contact wth the bank. The nformaton embedded n a credt card s as follows: clent's ID (C),
4 condence level (l), h = g x mod q, =1; 2; :::; n, where g are the common generators (g 2 G) and x s the concatenaton of PIN number, credt card number and salt, expry date (E), and the maxmum amount (A) that can be used. The credt s denoted by symbol C expressed as follows: C = hc; l; h 1 ; :::; h n ; E; A db (1) The credt card s dgtally sgned by the bank usng ts secret key d b. We have assumed that the number of generators (n) s xed by the bank. Therefore, t s unque n the system. The salt embedded n the credt card s unque for each clent. The owner of the credt card knows the secret x. When usng the credt card, the clent must prove to the merchant that she knows x wthout revealng the secret to the merchant. When a clent wants to use the credt card for a purchase, she constructs a payment slp (S). The payment slp contans the credt card nformaton, the ID of merchant (M), order (O), the amount $ (ncludng currency type) and a tmestamp (t c ). S = hc;m;o; $;t c dc (2) s sgned by the clent. After clent has pad for the goods, the merchant sends the clent a recept (R) as a undenable proof of the recept of the payment. The recept contans hashed credt card nformaton, hashed amount that has been pad, hashed order, the challenge, and a tmestamp. The recept for clent C s gven by The recept s sgned by the merchant. 3.2 System Setup R c = hh(c);h($);h(o);c;t m dm (3) Assume that there exsts a trusted certcate authorty (TA) such as a bank B that runs the payment system and ssues certcates for all partes nvolved n the system. The TA could be an authorzed department n the nancal nsttuton. Therefore, t s reasonable to assume that all partes nvolved n our system have a par of legtmate publc/secret keys (e p ;d p ) and the correspondng publc key certcate (Cert p ) sgned by the TA, where the subscrpt p denotes a party P. The certcate token for party P s constructed as follows: Cert p = hp; e p ;t;t 0 ;B db ; (4) where t and t 0 denote a tmestamp and expry tme respectvely. Consder a clent C who has regstered wth the nancal nsttuton that runs the system. In other words, C possesses hs electronc credt card ssued by the bank. The clent and the bank share nformaton on the credt card such as the credt card number, PIN, and salt (we refer to the concatenaton of these data as x). However, there could be an opton that the bank keeps only g x mod q and deletes x. Once a clent can prove that she knows x by usng an equalty proof of knowledge, she wll be allowed to use the credt card.
5 Consder a merchant M who has regstered wth the bank B and can provde the credt based payment servce. Ths means that the merchant s ready to act as a verer of the equalty proof of knowledge. As mentoned before, the merchant should not know x, but she wll be convnced by the clent that the clent who makes the payment s a legtmate party and the owner of the credt card. The bank B s the authorty that runs the system. The bank s on-lne, but t mght not be necessary to get nvolved n the actual payment process. It could get nvolved only f t s absolutely necessary. That s, when the merchant asks t to do so. An example of ths stuaton would be the case when the amount of payment s large, thus the bank should check the avalable amount remanng on the clent's account. Ths stuaton s the same as the exstng non-electronc credt card systems. Protocol 2 C M r 2Z p a = g r mod q; (1 n) w = hs; a ; n c dc z = cx + r (modp) hoffer dm ; Cert m,,,,,,,,,,,,, Cert c; hw em,,,,,,,,,,,,,! chooses c = DktkMkL (1 L l) hc;n cdm,,,,,,,,,,,,, hz;n cdc,,,,,,,,,,,,,! 8, g z = h c a goods; hc;n c;k sec ; R c 3.3 The Protocol Protocol 2 descrbs the payment protocol. The merchant M broadcasts the oers through the Internet. The oers have been sgned by the merchant usng hs prvate key. When the clent decdes to purchase an tem descrbed n an oer, she sends the merchant hs payment slp contanng the nformaton on an order and the electronc credt card. Once a payment has been receved, the merchant veres the clent's sgnatures n the slp and mplements the equalty proof of knowledge for the secret x. The goods and recept wll be sent to the clent, provded every check s successful. The provson of goods/servce s encrypted wth a symmetrc sesson key k s, whch has been protected usng C's publc key. Note that the challenge c sent to the clent s a bt concatenaton of current date, tme, the merchant's ID, and a random number R. Ths constructon s mportant, snce t removes the rsk of occurrence of two dentcal challenges n derent payments. Increasng the sze of the data does not change the condence level, snce only R s randomly chosen. The system functons n a smlar fashon to a non-electronc credt card system such as Vsa or MasterCard. The payment receved by the merchant can be deposted to the bank later on; for nstance at the end of each day. There could be an addtonal opton that the merchant contacts
6 the bank for the vercaton of the authentcty of the credt card before delverng the goods. Ths could happen when the payment s large. However, for a large number of small payments, the merchant mght not need to contact the bank for reducng the cost of transactons. In the depost phase, the merchant sends the knowledge of equalty proof k[x; c; z] along wth the payment slp to the bank. The depost token s constructed as follows: fcert m ; Cert c ; hhw; k[x; c; z];t m dm eb g The bank returns a recept wth respect to the transacton. The recept s constructed as follows: R b = hc; M; w; H(S);t b db The bank keeps w and c as evdence of the transacton. 4 The Scheme Based on Non-nteractve Proofs In the prevous scheme, the merchant needs to send a challenge to the clent. In ths secton, we show an mproved scheme that does not requre the nvolvement of the merchant n an equalty proof usng the non-nteractve method of equalty proof of knowledge [13]. 4.1 Non-nteractve Equalty Proof In the non-nteractve method, the prover and verer do not need to nteract each other. In other words, the verer does not need to send a challenge n the process of a proof. The challenge s actually computed by the prover tself. One agan assumes that the prover s P and the verer s V. The common knowledge s the generators g 2 G (1 n). P wll prove that she knows the secret x from h = g x mod q wthout revealng the secret. Denton 2 A par (c; z) satsfyng c = H(g 1 k:::kg n ka 1 k:::ka n kh 1 k:::kh n ) (5) and z = cx + r (6) s the knowledge of an equalty proof of x, denoted byk[1:n; g ;a ;h ]. H denotes a strong one-way hash functon. fa g, c, and z are called commtment, challenge, and response respectvely. K[1:n;g ;a ;h ] can only be gven f the secret x s known, accordng to equatons (5) and (6). Wth K[1:n;g ;a ;h ], one can verfy the knowledge of equalty proof, by checkng g z = hc a ( =1; :::; n). The dea behnd ths s the fact that a K[ ] can be forged f the challenge c s known before the computaton of the commtment a. Snce c can only be computed after a group of fa g has been computed or r has been chosen, the equalty proof s equvalent to the one studed prevously and cannot be forged.
7 4.2 The Payment Protocol The algebrac settng s the same as n Protocol 2. We assume that the clent wants to purchase an tem from the merchant. To generate the knowledge of equalty proof of x, the clent executes an ntalzng run (RUN) that has the followng steps: RUN: The clent: chooses r at random n Z p and denes r Dktkr, computes a = g r mod q; 1 n, and computes (c; z)=k[1:n;g ;a ;h ]. In the ntalzng run, the clent needs to make sure that the r has not been used before. One possble soluton s to concatenate the current date and tme to r. The payment protocol s llustrated as follows (Protocol 3): Protocol 3 C M executes RUN w = hs;k[:];n c dc hoffer dm ; Cert m,,,,,,,,,,,,, Cert c; hw em,,,,,,,,,,,,,! 8, g z = h c a goods; hc;k s;n cec ; R c In Protocol 3, once the clent wants to purchase an tem lsted n the oer, she needs to execute the ntalzng run to obtan a current K[:]. In step two, the clent sends the merchant the slp and the knowledge of equalty proof on x. These nformaton are sgned by the clent usng hs prvate key and then encrypted usng the publc key of the merchant. Upon recept of ths nformaton, the merchant veres all sgnatures theren and the authentcty of the knowledge of equalty proof. If the checks are successful, the merchant sends the clent the encrypted goods, encrypted delvery key k s, and a recept. Note that K[:] must be sgned along wth the current payment slp S by the clent. Ths wll remove the rsk of a dshonest merchant reusng t. Note that the condence level dened prevously s not applcable n the present system, and hence has been removed from the credt card token. In the depost phase, the merchant sends w to the bank. The depost token s constructed as follows: fcert m ; Cert c ; hhw; t m dm eb g The bank checks the correctness of w and ensures that the set fa g has not been used before. If the checks are successful, t provdes a recept wth respect to the depost made to the merchant. The recept s constructed as follows: R b = hc; M; w; H(S);t b db The bank needs to keep w as evdence of the transacton.
8 5 Anonymous Electronc Credt Card In ths secton, we consder clent anonymty. Ths s, clents' IDs are not revealed to the merchant when processng a purchase run. The anonymty of clents s based on the non-nteractve equalty proof studed n Secton Anonymous Certcate The clent should obtan an anonymous publc key certcate from the bank, the trusted certcate authorty. The certcate contans an anonymous ID of the clent (^C = fg Cks ;g Cks ; :::; g Cks 1 2 n g), the publc key, a tmestamp, expry tme, and the ID of the ssuer: Cert 0 c = h ^C; e c ;t;t 0 ;B db (7) s s salt that s shared by the clent and TA. The authentcty of the anonymous certcate s based on an equalty proof of knowledge on C, namely the proof of the owner of the certcate wthout revealng the ID of the owner to the verer. The bank has the mappng between ^C and the real ID of the clent. Therefore, the anonymty s only aganst merchants. Ths could be sucent n a credt based payment system. However, f clents are allowed to have anonymous accounts wth the bank, t s possble to make the credt card payments entrely anonymous. We wll not consder ths topc further n ths paper. 5.2 Constructon of Anonymous Credt Card When an electronc credt card becomes anonymous, merchants are not able to know the ID of the card holder. The structure of a credt card s smlar to the one studed n the prevous secton; the only derence s that t uses the anonymous ID of the clent. ^C = h ^C; h 1 ; :::; h n ; E; A db (8) The authentcty of the credt card reles upon two equalty proofs of knowledge of Cks and x. The rst proof ensures that the clent s the owner of the credt card. The second proof shows that the clent knows the secret data x. Now the payment slp and recept tokens have ^C nstead of C. 5.3 The Knowledge of Proof of Several Secret Numbers In ths subsecton, we dene and formalze the buldng blocks of our scheme. They are based on the non-nteractve equalty proofs of knowledge. The denton of the knowledge of proof of m secret numbers s as follows: Denton 3 A m +1 tuple (c; z 1 ; :::; z m ) satsfyng c = H(g 1 k:::kg n ka 1 k:::ka n kh (1) k:::kh (m) k:::kh (m) 1 k:::kh(1) 1 n n ) and z 1 = cx 1 + r; ::: z m = cx m + r: s the knowledge of equalty proof of x 1 ; :::; x m, denoted byk[1:n;g ;a ;h (1) ; :::; h (m) ]. Each response z corresponds to a secret number x, whle the challenge c and the commtment r are unque. Wth the knowledge of the proof, one can verfy the authentcty ofx 1 ; :::; x m,by checkng g z j =(h (j) ) c a ( =1; :::; n; j =1; :::; m)
9 5.4 Anonymous Protocol The anonymous protocol s smlar to the non-anonymous one, except that the clent now needs to prove to the merchant both the ID and the secret x usng the proof gven n Denton 3. RUN: The clent: chooses r at random n Z p and denes r Dktkr, computes a = g r mod q; (1 n), and computes (c; z 1 ; :::; z m )=K[1:n;g ;a ;h (1) ; :::; h (m)]. The protocol s gven as follows: Protocol 4 C M executes RUN (m = 2) w = hs;k[:];n c dc hoffer dm ; Cert m,,,,,,,,,,,,, Cert 0 c ; hwem,,,,,,,,,,,,,! 8, g z 1 goods; hc;k;n cec ; R c,,,,,,,,,,,,, 8, g z 2 =(^C) c a = h c a0 The clent's sgnature s vered usng hs publc key e c embedded n the anonymous publc key certcate. In the depost phase, the merchant sends w to the bank. The depost token s constructed as follows: fcert m ; Cert 0 c; hhw; t m dm eb g The bank needs to check all the nformaton n w ncludng the authentcty of the clent and the valdty of the credt card and then returns a recept wth respect to the depost made to the merchant. The recept s constructed as follows: R b = h ^C;M;w;H(S);tb db 6 Concluson We haventroduced three methods for the establshment of credt based electronc payment systems over Internet, usng the technques of equalty proof of knowledge. In partcular, we have presented a constructon of payment that allows anonymty of clents. The major feature of the system les n the purchase phase where the merchant nvolved can ensure the authentcty of the credt card nformaton wthout any help from the nancal nsttuton that runs the system. Ths has gven a greater exblty to the payment system as t gves a further choce to the merchants whether to use the on-lne bank or not.
10 References [1] D. Chaum, A. Fat, and M. Naor, \Untraceable electronc cash," n Advances n Cryptology, CRYPTO '88 Proceedngs, pp. 319{327, [2] D. L. Chaum, \Achevng electronc prvacy," Scentc Amercan, pp. 96{101, August [3] G. Medvnsky and B. C. Neuman, \Netcash: A desgn for practcal electronc currency on the nternet," n Proceedngs of the ACM Conference on Computer and Communcaton Securty, November [4] G. Medvnsky and B. C. Neuman, \kp - a famly of secure electronc payment protocols," < ecommerce/>. [5] M. Srbu and J. D. Tygar, \Netbll: An nternet commerce system optmzed or network delvered servces," < netbll>. [6] B. C. Neuman and G. Medvnsky, \Requrements for network payment: The netcheque tm perspectve," n Proceedngs of the IEEE CompCon'95, March [7] CyberCash, \The cybercash tm system - how t works," < [8] STT, \Secure transacton technology," < Stt-os.html>. [9] SEPP, \Secure electronc payment protocol," < [10] \Secure electronc transactons," n VISA amd MasterCard, < [11] D. Chaum and T. P. Pedersen, \Wallet databases wth observers," n Advances n Cryptology, CRYPTO '92 Proceedngs, pp. 89{105, Sprnger-Verlag, [12] E. R. Verheul and H. C. A. van Tlborg, \Bndng elgamal: A fraud-detectable alternatve to key-escrow proposals," n Advances n Cryptology, EUROCRYPTO '97 Proceedngs, pp. 119{ 133, Sprnger-Verlag, [13] J. Camensch, \Ecent and generalzed group sgnatures," n Adances n cryptology - EURO- CRYPT'97, Lecture Notes n Computer Secence 1233, pp. 465{479, Sprnger-Verlag, Berln, 1997.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationGlobal innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationSmall pots lump sum payment instruction
For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested
More informationHow To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationUsing Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationRUHR-UNIVERSITÄT BOCHUM
RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More information1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationSection 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationA Certified Email Protocol using Key Chains
A Certfed Emal Protocol usng Key Chans J. Cederqust SQIG-IT and IST, TULsbon, Portugal M. Torab Dasht CWI, Amsterdam, The Netherlands S. Mauw Unversty of Luxembourg, Luxembourg Abstract Ths paper ntroduces
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationAccount Transfer and Direct Rollover
CED0105 Amerprse Fnancal Servces, Inc. 70100 Amerprse Fnancal Center Mnneapols, MN 55474 Account Transfer and Drect Rollover Important: Before fnal submsson to the Home Offce you wll need a Reference Number.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationTuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
More informationThe program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent.
Bachel of Commerce Bachel of Commerce (Accountng) Bachel of Commerce (Cpate Fnance) Bachel of Commerce (Internatonal Busness) Bachel of Commerce (Management) Bachel of Commerce (Marketng) These Program
More informationCompact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationCertificate Revocation using Fine Grained Certificate Space Partitioning
Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles vpul@cs.ucla.edu Abstract A new certfcate revocaton system s presented.
More informationA DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationSecure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationVembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
More informationLocal Business Starter Pack.
Local Busness Starter Pack. Who should complete ths applcaton? If the busness s A company An assocaton (ncorporated or unncorporated) A partnershp A sole propretor or ndvdual A busness trust Ths form can
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationCapacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
More informationIdentity-Based Encryption Gone Wild
An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume
More informationREQUIRED FOR YEAR END 31 MARCH 2015. Your business information
REQUIRED FOR YEAR END 31 MARCH 2015 Your busness nformaton Your detals Busness detals Busness name Balance date IRD number Contact detals - to ensure our records are up to date, please complete the followng
More informationHollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
More informationPractical PIR for Electronic Commerce
Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 rhenry@cs.uwaterloo.ca Fem Olumofn Cherton School of Computer Scence Unversty
More informationDISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7
DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or
More informationTowards a Global Online Reputation
Hu L Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN 6N5 Canada + (63) 562 5800, 8834 Hl03@uottawa.ca Towards a Global Onlne Reputaton Morad Benyoucef Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute
More informationTime Value of Money Module
Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the
More informationReporting Instructions for Schedules A through S
FFIEC 0 Reportng Instructons for Schedules A through S FFIEC 0 FFIEC 0 CONTENTS INSTRUCTIONS FOR PREPARATION OF FFIEC 0 Rsk-Based Captal Reportng for Insttutons Subject to the Advanced Captal Adequacy
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationUpdating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
More informationTracker: Security and Privacy for RFID-based Supply Chains
Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs
More information3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationSection 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationLecture 3: Force of Interest, Real Interest Rate, Annuity
Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More information1. Math 210 Finite Mathematics
1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210
More informationReporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide
Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB
More informationThresPassport A Distributed Single Sign-On Service
ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn
More informationSection 2.2 Future Value of an Annuity
Secton 2.2 Future Value of an Annuty Annuty s any sequence of equal perodc payments. Depost s equal payment each nterval There are two basc types of annutes. An annuty due requres that the frst payment
More informationSecure and Efficient Proof of Storage with Deduplication
Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas
More informationChapter 11 Practice Problems Answers
Chapter 11 Practce Problems Answers 1. Would you be more wllng to lend to a frend f she put all of her lfe savngs nto her busness than you would f she had not done so? Why? Ths problem s ntended to make
More informationMULTIVAC Customer Portal Your access to the MULTIVAC World
MULTIVAC Customer Portal Your access to the MULTIVAC World 2 Contents MULTIVAC Customer Portal Introducton 24/7 Accessblty Your ndvdual nformaton Smple and ntutve Helpful and up to date Your benefts at
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationIDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,
More informationThursday, December 10, 2009 Noon - 1:50 pm Faraday 143
1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationsscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationAn Optimally Robust Hybrid Mix Network (Extended Abstract)
An Optmally Robust Hybrd Mx Network (Extended Abstract) Markus Jakobsson and Ar Juels RSA Laboratores Bedford, MA, USA {mjakobsson,ajuels}@rsasecurty.com Abstract We present a mx network that acheves effcent
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More information7.5. Present Value of an Annuity. Investigate
7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More information