Yi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W.

Size: px
Start display at page:

Download "Yi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W."

Transcription

1 Anonymous Internet Credt Cards Y Mu and Vjay Varadharajan School of Computng and IT, Unversty of Western Sydney, Nepean, PO Box 10, Kngswood, N.S.W. 2747, Australa Emal: fymu,vjayg@ct.nepean.uws.edu.au Abstract In credt based payment systems, condental data such as PIN and credt card number embedded n an electronc credt card must be protected. The authentcty of an electronc credt card n a payment process s normally acheved through an on-lne trusted server such as a nancal nsttuton that runs the payment system. Ths paper consders some novel secure electronc credt card based payment schemes for the Internet, where the nvolvement of the on-lne nancal nsttuton s reduced to a mnmum. Our protocols use the technque of proof of knowledge of dscrete logarthms that enables a prover to prove a secret wthout revealng the secret to the verer. 1 Introducton A fundamental requrement for the Internet to really become an open marketplace for goods and servces n practce s the need for secure chargng and payment mechansms. Gven the explosve growth n the use of the Internet, and n the servces and applcatons beng oered over the Internet, the mechansms enablng secure commercal transactons form the foundaton stone of ths electronc nformaton revoluton. Needless to say securty aspects become crtcal to the successful operaton of any of these electronc payment schemes. Broadly speakng, there are two classes of electronc payment schemes. Schemes such as DgCash [1, 2] and NetCash [3] consder cash-based electronc payments. Others such as KP [4], NetBll [5], NetCheque [6], CyberCash [7], STT[8], SEPP [9], and SET [10] consder credt and debt based electronc payments. Our focus n ths paper s on credt based electronc payment systems. In general, an on-lne credt card payment system nvolves at least the followng partes: Clents (Servce Users) requestng servces from Merchants who provde the servces, and Banks (or Fnancal Insttutons) provdng guarantee and transfer of cash and credts between Clents and Merchants. STT, SEPP, and SET refer to the Fnancal Insttuton as the Acqurer whereas KP models ths usng a Gateway that acts as an ntermedary to the exstng nancal network. We use generc terms such as oer, order and slp n descrbng the payment schemes. The Merchant presents the nformaton about the servce n terms of an Oer. When the Clent wshes to make a purchase, s/he sends an Order and a payment Slp to the Merchant. The Oer s ntended for the merchant whereas the Slp s passed on to the Fnancal Insttuton. The Merchant requests the authorzaton from the Fnancal Insttuton, and upon recept of the authorzaton, the Merchant conrms to the Clent the concluson of the payment transactons. Ths s then followed by the servce delvery. Under these systems, the nancal nsttuton must be on-lne, where t serves as a trusted authentcaton center for merchants and customers by verfyng the authentcty of payment slps. The obvous reason for needng an on-lne server s that merchants do not have

2 the rght to access the PINs and credt card numbers of clents. However, the cost of an on-lne servce has to be taken nto account n the overall assessment. In ths paper, we propose three novel credt based systems that present a promse for merchants not to use an on-lne bankng servce durng the processng of a payment. In other words, n our systems merchants can ensure the authentcty of the credt cards wthout any help from the nancal nsttuton that provdes the credt card servce. Merchant can contact the on-lne authentcaton server for a hgher level of assurance, but the opton s chosen only f merchants want tohave a further conrmaton from the nancal nsttuton before delverng the goods or provdng servce. The sgncance of our schemes have not been shared by the exstng schemes mentoned above. Our schemes are based on the methods of proof of knowledge on the equalty of logarthms (for convenence, we refer to t as equalty proof of knowledge[11] and non-nteractve equalty proof[12]). The dea behnd our scheme s that when purchases an tem from a merchant, a clent can prove hs PIN and credt card number embedded n hs electronc credt card to the merchant wthout revealng the secrets. In partcular, we wll also show that usng ths technque we can make clents n our payment system anonymous. Our rst scheme, usng the nteractve equalty proof[11], s somewhat smlar to Chuam's electronc wallet, but the scheme s used to a derent payment system. However, the second and the thrd schemes are entrely new: The second scheme, usng the non-nteractve equalty proof, reduces communcaton ows between clent and merchant. The thrd scheme acheves anonymous credt cards. The rest of ths paper s organzed as follows. In Secton 2, we ntroduce the scheme of equalty proof of knowledge. In Secton 3, we construct our protocol wthout consderng the anonymty of clents. In Secton 4, we ntroduce non-nteractve equalty proof of knowledge and construct an mproved payment protocol. In Secton 5, we consder clents anonymty, based on the equalty proof of several secrets, and propose a new protocol. 2 Equalty Proof of Knowledge The credt based payment scheme that wll be ntroduced n ths paper s based on the scheme of provng knowledge wthout revealng anythng about the content that has been proven. Ths scheme of proof was ntally proposed by Chaum and Pedersen [11] and Verheul and Tlborg [12]. We assume that the prover s P and the verer s V. The common knowledge ncludes the the generators g 2 G (1 n). The P can prove that she knows a secret x from h = g x mod q wthout revealng the secret, where q s large prme. A condence parameter l s used to specfy the level of the condence of the protocol. The protocol s gven below. In Protocol 1, the prover P chooses a number r 2 R Z p, computes a, n terms of a = g r mod q; (1 n), and sends t to V. V then chooses a challenge c 2 l and sends t to P. Upon recept of c, P computes z = cx + r (modq) as a response and then sends t to V, where q s a large prme number. V checks f the equalty g z = hc a holds for all. If t does, the V wll accept t. If not, then there s a probablty less than 1=l that t wll stll be accepted by V. Ths protocol proves the knowledge of x to V wthout revealng x. The vercaton of completeness, soundness, and securty of the protocol s gven n [12]. For convenence, we ntroduce the denton of knowledge of equalty proof. Denton 1 Gven a challenge c and a correspondng response z, k[x; c; z] fg 1 ; :::; g n ;h 1 ; :::; h n ;a 1 ; :::; a n ;z;cg s the knowledge of equalty proof of the secret x from fg x g.

3 Protocol 1 P V r 2 R Z p a = g r mod q; (1 n) a z = cx + r (modp),,,,,,,,,,! chooses c (0 <c l) c,,,,,,,,,, z,,,,,,,,,,! 8, g z = h c a Wth k[x; c; z], the verer can verfy the authentcty of the secret wthout knowng the secret. 3 Constructon of Our Protocol Our protocol s based on the equalty proof of knowledge gven above and does not need an on-lne authentcaton server such as a bank that runs the system. The authentcty of the credt cards s based on knowng the secret data embedded n the credt card. The secret data s constructed by concatenatng the PIN number, credt number, and salt shared wth the nancal nsttuton. The clent can prove to the merchant that he knows the PIN number and the credt card number wthout revealng them to the merchant. The notatons that wll be used n the descrpton of the protocols are as follows: C: Clent, M: Merchant, B: Bank, TA:Trusted Certcaton Authorty, t p : Tmestamp generated by party P, d p : Prvate Key of user P, e p : Publc Key of user P (assocated wth d p ), h::: ep : Publc Key Encrypton usng e p, h::: dp : Publc Key based Sgnature usng d p. 3.1 Constructon of Credt Card and Payment Tokens An electronc credt card s obtaned by a clent at the stage of regstraton wth the bank. Ths can be done ether through a secure channel or va physcal contact wth the bank. The nformaton embedded n a credt card s as follows: clent's ID (C),

4 condence level (l), h = g x mod q, =1; 2; :::; n, where g are the common generators (g 2 G) and x s the concatenaton of PIN number, credt card number and salt, expry date (E), and the maxmum amount (A) that can be used. The credt s denoted by symbol C expressed as follows: C = hc; l; h 1 ; :::; h n ; E; A db (1) The credt card s dgtally sgned by the bank usng ts secret key d b. We have assumed that the number of generators (n) s xed by the bank. Therefore, t s unque n the system. The salt embedded n the credt card s unque for each clent. The owner of the credt card knows the secret x. When usng the credt card, the clent must prove to the merchant that she knows x wthout revealng the secret to the merchant. When a clent wants to use the credt card for a purchase, she constructs a payment slp (S). The payment slp contans the credt card nformaton, the ID of merchant (M), order (O), the amount $ (ncludng currency type) and a tmestamp (t c ). S = hc;m;o; $;t c dc (2) s sgned by the clent. After clent has pad for the goods, the merchant sends the clent a recept (R) as a undenable proof of the recept of the payment. The recept contans hashed credt card nformaton, hashed amount that has been pad, hashed order, the challenge, and a tmestamp. The recept for clent C s gven by The recept s sgned by the merchant. 3.2 System Setup R c = hh(c);h($);h(o);c;t m dm (3) Assume that there exsts a trusted certcate authorty (TA) such as a bank B that runs the payment system and ssues certcates for all partes nvolved n the system. The TA could be an authorzed department n the nancal nsttuton. Therefore, t s reasonable to assume that all partes nvolved n our system have a par of legtmate publc/secret keys (e p ;d p ) and the correspondng publc key certcate (Cert p ) sgned by the TA, where the subscrpt p denotes a party P. The certcate token for party P s constructed as follows: Cert p = hp; e p ;t;t 0 ;B db ; (4) where t and t 0 denote a tmestamp and expry tme respectvely. Consder a clent C who has regstered wth the nancal nsttuton that runs the system. In other words, C possesses hs electronc credt card ssued by the bank. The clent and the bank share nformaton on the credt card such as the credt card number, PIN, and salt (we refer to the concatenaton of these data as x). However, there could be an opton that the bank keeps only g x mod q and deletes x. Once a clent can prove that she knows x by usng an equalty proof of knowledge, she wll be allowed to use the credt card.

5 Consder a merchant M who has regstered wth the bank B and can provde the credt based payment servce. Ths means that the merchant s ready to act as a verer of the equalty proof of knowledge. As mentoned before, the merchant should not know x, but she wll be convnced by the clent that the clent who makes the payment s a legtmate party and the owner of the credt card. The bank B s the authorty that runs the system. The bank s on-lne, but t mght not be necessary to get nvolved n the actual payment process. It could get nvolved only f t s absolutely necessary. That s, when the merchant asks t to do so. An example of ths stuaton would be the case when the amount of payment s large, thus the bank should check the avalable amount remanng on the clent's account. Ths stuaton s the same as the exstng non-electronc credt card systems. Protocol 2 C M r 2Z p a = g r mod q; (1 n) w = hs; a ; n c dc z = cx + r (modp) hoffer dm ; Cert m,,,,,,,,,,,,, Cert c; hw em,,,,,,,,,,,,,! chooses c = DktkMkL (1 L l) hc;n cdm,,,,,,,,,,,,, hz;n cdc,,,,,,,,,,,,,! 8, g z = h c a goods; hc;n c;k sec ; R c 3.3 The Protocol Protocol 2 descrbs the payment protocol. The merchant M broadcasts the oers through the Internet. The oers have been sgned by the merchant usng hs prvate key. When the clent decdes to purchase an tem descrbed n an oer, she sends the merchant hs payment slp contanng the nformaton on an order and the electronc credt card. Once a payment has been receved, the merchant veres the clent's sgnatures n the slp and mplements the equalty proof of knowledge for the secret x. The goods and recept wll be sent to the clent, provded every check s successful. The provson of goods/servce s encrypted wth a symmetrc sesson key k s, whch has been protected usng C's publc key. Note that the challenge c sent to the clent s a bt concatenaton of current date, tme, the merchant's ID, and a random number R. Ths constructon s mportant, snce t removes the rsk of occurrence of two dentcal challenges n derent payments. Increasng the sze of the data does not change the condence level, snce only R s randomly chosen. The system functons n a smlar fashon to a non-electronc credt card system such as Vsa or MasterCard. The payment receved by the merchant can be deposted to the bank later on; for nstance at the end of each day. There could be an addtonal opton that the merchant contacts

6 the bank for the vercaton of the authentcty of the credt card before delverng the goods. Ths could happen when the payment s large. However, for a large number of small payments, the merchant mght not need to contact the bank for reducng the cost of transactons. In the depost phase, the merchant sends the knowledge of equalty proof k[x; c; z] along wth the payment slp to the bank. The depost token s constructed as follows: fcert m ; Cert c ; hhw; k[x; c; z];t m dm eb g The bank returns a recept wth respect to the transacton. The recept s constructed as follows: R b = hc; M; w; H(S);t b db The bank keeps w and c as evdence of the transacton. 4 The Scheme Based on Non-nteractve Proofs In the prevous scheme, the merchant needs to send a challenge to the clent. In ths secton, we show an mproved scheme that does not requre the nvolvement of the merchant n an equalty proof usng the non-nteractve method of equalty proof of knowledge [13]. 4.1 Non-nteractve Equalty Proof In the non-nteractve method, the prover and verer do not need to nteract each other. In other words, the verer does not need to send a challenge n the process of a proof. The challenge s actually computed by the prover tself. One agan assumes that the prover s P and the verer s V. The common knowledge s the generators g 2 G (1 n). P wll prove that she knows the secret x from h = g x mod q wthout revealng the secret. Denton 2 A par (c; z) satsfyng c = H(g 1 k:::kg n ka 1 k:::ka n kh 1 k:::kh n ) (5) and z = cx + r (6) s the knowledge of an equalty proof of x, denoted byk[1:n; g ;a ;h ]. H denotes a strong one-way hash functon. fa g, c, and z are called commtment, challenge, and response respectvely. K[1:n;g ;a ;h ] can only be gven f the secret x s known, accordng to equatons (5) and (6). Wth K[1:n;g ;a ;h ], one can verfy the knowledge of equalty proof, by checkng g z = hc a ( =1; :::; n). The dea behnd ths s the fact that a K[ ] can be forged f the challenge c s known before the computaton of the commtment a. Snce c can only be computed after a group of fa g has been computed or r has been chosen, the equalty proof s equvalent to the one studed prevously and cannot be forged.

7 4.2 The Payment Protocol The algebrac settng s the same as n Protocol 2. We assume that the clent wants to purchase an tem from the merchant. To generate the knowledge of equalty proof of x, the clent executes an ntalzng run (RUN) that has the followng steps: RUN: The clent: chooses r at random n Z p and denes r Dktkr, computes a = g r mod q; 1 n, and computes (c; z)=k[1:n;g ;a ;h ]. In the ntalzng run, the clent needs to make sure that the r has not been used before. One possble soluton s to concatenate the current date and tme to r. The payment protocol s llustrated as follows (Protocol 3): Protocol 3 C M executes RUN w = hs;k[:];n c dc hoffer dm ; Cert m,,,,,,,,,,,,, Cert c; hw em,,,,,,,,,,,,,! 8, g z = h c a goods; hc;k s;n cec ; R c In Protocol 3, once the clent wants to purchase an tem lsted n the oer, she needs to execute the ntalzng run to obtan a current K[:]. In step two, the clent sends the merchant the slp and the knowledge of equalty proof on x. These nformaton are sgned by the clent usng hs prvate key and then encrypted usng the publc key of the merchant. Upon recept of ths nformaton, the merchant veres all sgnatures theren and the authentcty of the knowledge of equalty proof. If the checks are successful, the merchant sends the clent the encrypted goods, encrypted delvery key k s, and a recept. Note that K[:] must be sgned along wth the current payment slp S by the clent. Ths wll remove the rsk of a dshonest merchant reusng t. Note that the condence level dened prevously s not applcable n the present system, and hence has been removed from the credt card token. In the depost phase, the merchant sends w to the bank. The depost token s constructed as follows: fcert m ; Cert c ; hhw; t m dm eb g The bank checks the correctness of w and ensures that the set fa g has not been used before. If the checks are successful, t provdes a recept wth respect to the depost made to the merchant. The recept s constructed as follows: R b = hc; M; w; H(S);t b db The bank needs to keep w as evdence of the transacton.

8 5 Anonymous Electronc Credt Card In ths secton, we consder clent anonymty. Ths s, clents' IDs are not revealed to the merchant when processng a purchase run. The anonymty of clents s based on the non-nteractve equalty proof studed n Secton Anonymous Certcate The clent should obtan an anonymous publc key certcate from the bank, the trusted certcate authorty. The certcate contans an anonymous ID of the clent (^C = fg Cks ;g Cks ; :::; g Cks 1 2 n g), the publc key, a tmestamp, expry tme, and the ID of the ssuer: Cert 0 c = h ^C; e c ;t;t 0 ;B db (7) s s salt that s shared by the clent and TA. The authentcty of the anonymous certcate s based on an equalty proof of knowledge on C, namely the proof of the owner of the certcate wthout revealng the ID of the owner to the verer. The bank has the mappng between ^C and the real ID of the clent. Therefore, the anonymty s only aganst merchants. Ths could be sucent n a credt based payment system. However, f clents are allowed to have anonymous accounts wth the bank, t s possble to make the credt card payments entrely anonymous. We wll not consder ths topc further n ths paper. 5.2 Constructon of Anonymous Credt Card When an electronc credt card becomes anonymous, merchants are not able to know the ID of the card holder. The structure of a credt card s smlar to the one studed n the prevous secton; the only derence s that t uses the anonymous ID of the clent. ^C = h ^C; h 1 ; :::; h n ; E; A db (8) The authentcty of the credt card reles upon two equalty proofs of knowledge of Cks and x. The rst proof ensures that the clent s the owner of the credt card. The second proof shows that the clent knows the secret data x. Now the payment slp and recept tokens have ^C nstead of C. 5.3 The Knowledge of Proof of Several Secret Numbers In ths subsecton, we dene and formalze the buldng blocks of our scheme. They are based on the non-nteractve equalty proofs of knowledge. The denton of the knowledge of proof of m secret numbers s as follows: Denton 3 A m +1 tuple (c; z 1 ; :::; z m ) satsfyng c = H(g 1 k:::kg n ka 1 k:::ka n kh (1) k:::kh (m) k:::kh (m) 1 k:::kh(1) 1 n n ) and z 1 = cx 1 + r; ::: z m = cx m + r: s the knowledge of equalty proof of x 1 ; :::; x m, denoted byk[1:n;g ;a ;h (1) ; :::; h (m) ]. Each response z corresponds to a secret number x, whle the challenge c and the commtment r are unque. Wth the knowledge of the proof, one can verfy the authentcty ofx 1 ; :::; x m,by checkng g z j =(h (j) ) c a ( =1; :::; n; j =1; :::; m)

9 5.4 Anonymous Protocol The anonymous protocol s smlar to the non-anonymous one, except that the clent now needs to prove to the merchant both the ID and the secret x usng the proof gven n Denton 3. RUN: The clent: chooses r at random n Z p and denes r Dktkr, computes a = g r mod q; (1 n), and computes (c; z 1 ; :::; z m )=K[1:n;g ;a ;h (1) ; :::; h (m)]. The protocol s gven as follows: Protocol 4 C M executes RUN (m = 2) w = hs;k[:];n c dc hoffer dm ; Cert m,,,,,,,,,,,,, Cert 0 c ; hwem,,,,,,,,,,,,,! 8, g z 1 goods; hc;k;n cec ; R c,,,,,,,,,,,,, 8, g z 2 =(^C) c a = h c a0 The clent's sgnature s vered usng hs publc key e c embedded n the anonymous publc key certcate. In the depost phase, the merchant sends w to the bank. The depost token s constructed as follows: fcert m ; Cert 0 c; hhw; t m dm eb g The bank needs to check all the nformaton n w ncludng the authentcty of the clent and the valdty of the credt card and then returns a recept wth respect to the depost made to the merchant. The recept s constructed as follows: R b = h ^C;M;w;H(S);tb db 6 Concluson We haventroduced three methods for the establshment of credt based electronc payment systems over Internet, usng the technques of equalty proof of knowledge. In partcular, we have presented a constructon of payment that allows anonymty of clents. The major feature of the system les n the purchase phase where the merchant nvolved can ensure the authentcty of the credt card nformaton wthout any help from the nancal nsttuton that runs the system. Ths has gven a greater exblty to the payment system as t gves a further choce to the merchants whether to use the on-lne bank or not.

10 References [1] D. Chaum, A. Fat, and M. Naor, \Untraceable electronc cash," n Advances n Cryptology, CRYPTO '88 Proceedngs, pp. 319{327, [2] D. L. Chaum, \Achevng electronc prvacy," Scentc Amercan, pp. 96{101, August [3] G. Medvnsky and B. C. Neuman, \Netcash: A desgn for practcal electronc currency on the nternet," n Proceedngs of the ACM Conference on Computer and Communcaton Securty, November [4] G. Medvnsky and B. C. Neuman, \kp - a famly of secure electronc payment protocols," < ecommerce/>. [5] M. Srbu and J. D. Tygar, \Netbll: An nternet commerce system optmzed or network delvered servces," < netbll>. [6] B. C. Neuman and G. Medvnsky, \Requrements for network payment: The netcheque tm perspectve," n Proceedngs of the IEEE CompCon'95, March [7] CyberCash, \The cybercash tm system - how t works," < [8] STT, \Secure transacton technology," < Stt-os.html>. [9] SEPP, \Secure electronc payment protocol," < [10] \Secure electronc transactons," n VISA amd MasterCard, < [11] D. Chaum and T. P. Pedersen, \Wallet databases wth observers," n Advances n Cryptology, CRYPTO '92 Proceedngs, pp. 89{105, Sprnger-Verlag, [12] E. R. Verheul and H. C. A. van Tlborg, \Bndng elgamal: A fraud-detectable alternatve to key-escrow proposals," n Advances n Cryptology, EUROCRYPTO '97 Proceedngs, pp. 119{ 133, Sprnger-Verlag, [13] J. Camensch, \Ecent and generalzed group sgnatures," n Adances n cryptology - EURO- CRYPT'97, Lecture Notes n Computer Secence 1233, pp. 465{479, Sprnger-Verlag, Berln, 1997.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

A Certified Email Protocol using Key Chains

A Certified Email Protocol using Key Chains A Certfed Emal Protocol usng Key Chans J. Cederqust SQIG-IT and IST, TULsbon, Portugal M. Torab Dasht CWI, Amsterdam, The Netherlands S. Mauw Unversty of Luxembourg, Luxembourg Abstract Ths paper ntroduces

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

Account Transfer and Direct Rollover

Account Transfer and Direct Rollover CED0105 Amerprse Fnancal Servces, Inc. 70100 Amerprse Fnancal Center Mnneapols, MN 55474 Account Transfer and Drect Rollover Important: Before fnal submsson to the Home Offce you wll need a Reference Number.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent.

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent. Bachel of Commerce Bachel of Commerce (Accountng) Bachel of Commerce (Cpate Fnance) Bachel of Commerce (Internatonal Busness) Bachel of Commerce (Management) Bachel of Commerce (Marketng) These Program

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Certificate Revocation using Fine Grained Certificate Space Partitioning

Certificate Revocation using Fine Grained Certificate Space Partitioning Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles vpul@cs.ucla.edu Abstract A new certfcate revocaton system s presented.

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Local Business Starter Pack.

Local Business Starter Pack. Local Busness Starter Pack. Who should complete ths applcaton? If the busness s A company An assocaton (ncorporated or unncorporated) A partnershp A sole propretor or ndvdual A busness trust Ths form can

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Identity-Based Encryption Gone Wild

Identity-Based Encryption Gone Wild An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume

More information

REQUIRED FOR YEAR END 31 MARCH 2015. Your business information

REQUIRED FOR YEAR END 31 MARCH 2015. Your business information REQUIRED FOR YEAR END 31 MARCH 2015 Your busness nformaton Your detals Busness detals Busness name Balance date IRD number Contact detals - to ensure our records are up to date, please complete the followng

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Practical PIR for Electronic Commerce

Practical PIR for Electronic Commerce Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 rhenry@cs.uwaterloo.ca Fem Olumofn Cherton School of Computer Scence Unversty

More information

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7 DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or

More information

Towards a Global Online Reputation

Towards a Global Online Reputation Hu L Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN 6N5 Canada + (63) 562 5800, 8834 Hl03@uottawa.ca Towards a Global Onlne Reputaton Morad Benyoucef Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute

More information

Time Value of Money Module

Time Value of Money Module Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the

More information

Reporting Instructions for Schedules A through S

Reporting Instructions for Schedules A through S FFIEC 0 Reportng Instructons for Schedules A through S FFIEC 0 FFIEC 0 CONTENTS INSTRUCTIONS FOR PREPARATION OF FFIEC 0 Rsk-Based Captal Reportng for Insttutons Subject to the Advanced Captal Adequacy

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

Tracker: Security and Privacy for RFID-based Supply Chains

Tracker: Security and Privacy for RFID-based Supply Chains Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn

More information

Section 2.2 Future Value of an Annuity

Section 2.2 Future Value of an Annuity Secton 2.2 Future Value of an Annuty Annuty s any sequence of equal perodc payments. Depost s equal payment each nterval There are two basc types of annutes. An annuty due requres that the frst payment

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas

More information

Chapter 11 Practice Problems Answers

Chapter 11 Practice Problems Answers Chapter 11 Practce Problems Answers 1. Would you be more wllng to lend to a frend f she put all of her lfe savngs nto her busness than you would f she had not done so? Why? Ths problem s ntended to make

More information

MULTIVAC Customer Portal Your access to the MULTIVAC World

MULTIVAC Customer Portal Your access to the MULTIVAC World MULTIVAC Customer Portal Your access to the MULTIVAC World 2 Contents MULTIVAC Customer Portal Introducton 24/7 Accessblty Your ndvdual nformaton Smple and ntutve Helpful and up to date Your benefts at

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143 1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

An Optimally Robust Hybrid Mix Network (Extended Abstract)

An Optimally Robust Hybrid Mix Network (Extended Abstract) An Optmally Robust Hybrd Mx Network (Extended Abstract) Markus Jakobsson and Ar Juels RSA Laboratores Bedford, MA, USA {mjakobsson,ajuels}@rsasecurty.com Abstract We present a mx network that acheves effcent

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information