Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes

Size: px
Start display at page:

Download "Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes"

Transcription

1 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and Jandong Wang ollege of Informaton Scence and Technology Nanng Unversty of Aeronautcs and Astronautcs Nanng hna Emal: fanglmng@nuaaeducn entre for omuter and Informaton Securty Research School of omuter Scence and Software Engneerng Unversty of Wollongong Australa Emal: wsuslo@uoweduau do:0456/dctavol4 ssue98 Abstract A roxy re-encryton scheme enables a roxy to re-encryt a chertext and desgnate t to a delegatee Proxy re-encryton schemes have been found useful n many alcatons ncludng e-mal forwardng law-enforcement montorng and content dstrbuton Lbert and Vergnaud resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model n PK 008 In ths aer we show the nsecurty of Lbert and Vergnaud's scheme aganst chosen ublc ey attac We note that ths nsecurty s not consdered n the orgnal model roosed by Lbert and Vergnaud's but we argue that our attac s very realstc and mortant n ths scenaro Furthermore we resent a new and effcent constructon roxy re-encryton (PRE scheme We rovde chosen ublc ey and chosen chertext attac securty analyss for our scheme and comare ther erformance Keywords: Informaton Securty Proxy Re-encryton Parng Based rytograhy Introducton A roxy re-encryton (PRE scheme allows a roxy to transform a chertext under delegator s ub-lcey nto a delegatee s chertext on the same message by usng some addtonal nformaton Ths concet s roosed by Blaze Bleumer and Strauss [] and formalzed later by Atenese et al [] PRE schemes have been found useful n many alcatons such as e-mal forwardng lawenforcement montorng and content dstrbuton Recently anett and Hohenberger [5] descrbed a constructon of roxy re-encryton rovdng chosen-chertext securty accordng to an arorate defnton of PRE systems In contrast to the revous wor ther scheme reles on the fact that the roxy ey can be used to translate chertexts from delegatee to delegator hence ths s called bdrectonal (cf undrectonal scheme that was orgnally roosed n the model by Blaze et al [] Tll then there was no nown undrectonal PRE systems wth chosen-chertext securty that rely on the standard model To fll ths ga Lbert and Vergnaud [] resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model Nonetheless they left an oen roblem on how to cature a scenaro where adversares are allowed to generate ublc eys on behalf of corruted artes (ossbly non-unformly or as a functon of honest artes ublc eys Ths s a dauntng roblem where the adversares can generate any ublc eys on behalf of the corruted artes and Lbert and Vergnaud s scheme [] cannot deter aganst ths attac Motvaton of Ths Wor Although Lbert and Vergnaud scheme [] PRE scheme s very elegant there are several unsolved ssues wth regards to the securty of PRE that are outlned as follows In [] the adversares are not ermtted to generate ublc eys on behalf of the corruted artes One ossble soluton to revent ths attac s to requre users to rove ther nowledge of secret eys durng the regstraton hase Nonetheless ths aroach requres zero-nowledge roof system whch may not be desrable n several alcatons In contrast to ths aroach we tae a dfferent drecton n ths wor We ncororate a trusted arty wth a system secret ey When the user selects ts ublc - 5 -

2 g g hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang ey the trusted arty runs the ey generaton algorthm wth the system secret ey together wth the user s ublc ey and the user s secret ey then wll be generated for the user A new roblem wth ths aroach s that the attacer n ths model has to share ts secret ey wth the thrd arty whch wll be qute natural Snce relatve to Lbert and Vergnaud s securty model the challenger s requred to generate all ublc eys for all artes and allow the adversary to obtan rvate eys for some of these users Furthermore Lbert and Vergnaud only consdered a statc corruton model n whch the challenger generates ublc eys for all artes Provng securty aganst adatve corrutons s a challengng and dauntng tas Fnally Lbert and Vergnaud only rovded a scheme n a selectve ublc ey model where the target (challenge ublc ey has to be determned by the challenger at the begnnng of the game A ossble enhancement s to allow adversares to adatvely query the target ublc ey at the challenge hase wthn the set of honest layers whch we refer to as the full ublc ey model Our ontrbutons In ths aer we address the roblem of constructng a PRE n the full ublc ey adatve corruton model and to allow the adversares to generate ublc eys on behalf of corruted artes Secfcally we show that Lbert and Vergnaud s scheme s nsecure aganst chosen ublc ey attac We note that although our attac s not alcable to the orgnal model resented by Lbert and Vergnaud s [] our attac s very natural and alcable n ractce Then we rovde a formal defnton of PRE-PA game n whch the adversary can chose any ublc ey freely We also resent a new constructon of chosen-chertext secure roxy re-encryton schemes whch are PRE- PA secure n the standard model Related Wor After the semnal wor by Blaze Bleumer and Strauss [] Atenese et al [] resented a undrectonal PRE scheme based on blnear arngs n 005 Both of these schemes are PA secure In 007 anett and Hohenberger [5] resented a constructon of A secure bdrectonal PRE scheme Later Lbert and Vergnaud [] resented a A secure undrectonal PRE scheme from blnear arngs Recently Deng et al [8] roosed a A secure bdrectonal PRE scheme wthout arngs In Parng 08 Lbert and Vergnaud [] ntroduced the noton of traceable roxy reencryton where malcous roxes leang ther re-encryton eys can be dentfed Snce n PKI-based settng t s needed to dstrbute ublc ey certfcates the wor [0 7 5] extended the above noton to dentty-based roxy re-encryton (IB-PRE Due to the fact that arng comutaton s a costly exensve oeraton the subsequent wor [8 6 4] studed PRE schemes to be constructed wthout blnear arngs esecally n comutaton resource lmted settngs Defntons In ths secton we frst revew the comlexty assumton requred n our schemes and then rovde the defnton and securty of a roxy re-encryton scheme Blnear Mas Let G G be multlcatve cyclc grous of rme order and be a generator ofg Here e: G G G s a blnear ( g G G e denote the blnear ma arameters We say that ma f the followng condtons hold a b ab e( g g e( g g for all a bz g g G e( g g 3 There s an effcent algorthm to comutee( g g for all g g G The Truncated q ABDHE Assumton Let e: G G G be a blnear ma and g be a generator of G Here - 5 -

3 ( g G G e qabdhe AdvG ( B Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 denote the blnear ma arameters We defne the advantage functon of an adversary B as q q q Pr[ B( g x g x g z g zx e( g g zx ] Pr[ B( g x g x g z g zx e( g g r ] where x z r Z are randomly chosen We say that the truncated q ABDHE assumton [9] relatve to generator G holds f q ABDHE AdvG ( B s neglgble for all PPT B 3 Proxy Re-encryton In the followng we wll rovde the defnton of a PRE scheme and ts game-based securty defnton Defnton (Proxy Re-encryton A roxy re-encryton scheme comrses the followng algorthms: Setu( : On nut a securty arameter a system ublc arameter PP and a system secret ey SK are generated KeyGen ( PP SK : On nut a system ublc arameter PP a system secret ey SK and a ublc ey outut the decryton ey s Enc( PP m : On nut a system ublc arameter PP an ublc ey outut the level chertext (e a regular chertext Re KeyGenLev ( s : On nut a secret ey s of ublc ey ey r Re KeyGenLev ( s s : On nut a secret ey s of ublc ey ublc ey outut the re-encryton ey Re ( r and a message m outut the re-encryton and a secret ey s of EncLev r : On nut a level re-encryton ey r and a level chertext under outut the new level chertext (e a re-encryton chertext under Re EncLev ( r : On nut a level re-encryton ey r and a level chertext under outut the new chertext under DecLev( s : On nut a secret ey s and any level chertext under outut m DecLev s : On nut a secret ey s and any level chertext under ( outut m In the followng we rovde the game-based securty defnton of PRE as follows Defnton (PRE-PA game [5] Let be the securty arameter and A be the adversary The game conssts of an executon of between an adversary A and a challenger wth the followng oracles subect to the constrants below: Setu: The challenger erforms Setu( to get a system ublc arameter PP and a system secret ey SK Gve the system ublc arameter PP to A Query hase A maes the followng queres: Key generaton query : A can choose any ublc ey as her wll A s gven the

4 rvate ey hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang s of Re-encryton ey generaton level query : On nut by the adversary return the level re-encryton ey r to A We only allow the ReKeyGenLev query after the ey generaton query Re-encryton ey generaton level query : On nut by the adversary A s gven the level re-encryton ey r Re-encryton level query : On nut a level chertext and ublc ey A s gven the new level chertext Re-encryton level query: On nut a level chertext ey A s gven the new level chertext under ublc ey and ublc Decryton level query : On nut a ublc ey and any level chertext mae a Key Generaton query to get secret ey s of then decryt t A s gven m Decryton level query : On nut a ublc ey and any level chertext mae a ey generaton query on h to get secret ey s of then decryt t A s gven m 3 hallenge A resents ( m0 m where s called the challenge ublc ey If the s fresh the challenger chooses a bt b Z and returns the challenge chertext Enc( m b A ( s fresh f none of the followng queres made by A : Key generaton query Re-encryton ey generaton level query ( s the ublc ey dervatves of and then A maes Key generaton query or Re-encryton ey generaton level query Publc ey dervatves of ( are defned recursvely as follows ( s a dervatve of tself If ( s a dervatve of ( and ( ' s a dervatve of ( then ( ' s a dervatve of ( If A has quered the level re-encryton ey generaton oracle on nut ( or ( then ( s a dervatve of ( 4 Query hase A contnues mang queres as n the Query hase excet for the followng queres: Key generaton query Re-encryton ey generaton level query ( s the ublc ey dervatves of and then A maes Key generaton query or Reencryton ey generaton level query One of the ( and ( s fresh and the other s not fresh and Re-encryton level query

5 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 Decryton level query and ( s the level chertext dervatves of ( Decryton level query and ( ( ( s the level chertext dervatves of s the level chertext dervatves of ( f = and where ( = = Re EncLev( r s the level chertext dervatves of ( f = Re EncLev ( r 5 Guess A oututs the guess b ' f b ' = b then outut ; else outut 0 We say that A wns the PRE-PA game wth advantage f the robablty that the decson oracle s nvoed and oututs s at least / + omarng our scheme wth Lbert and Vergnaud s model [] our securty model outerforms Lbert and Vergnaud s scheme n the followng asects: In our securty model the adversares are ermtted to generate ublc eys on behalf of the corruted artes Furthermore Lbert and Vergnaud only consdered a statc corruton model n whch the challenger generates ublc eys for all artes In contrast our model allows the adversary to adatvely determne whch artes wll be comromsed Fnally Lbert and Vergnaud only rovded a scheme n a selectve ublc ey model where the target (challenge ublc ey has to be determned by the challenger at the begnnng of the game In contrast n our model the adversary can determne the target (challenge ublc ey at anytme 3 hosen Publc Key Attac on Lbert and Vergnaud PRE Lbert and Vergnaud [] resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model Ther system s a remnscent of the ublc ey crytograhy system obtaned by alyng the anett-halev-katz transform to the second selectve-id secure dentty-based encryton scheme descrbed n [3] Unfortunately as they clamed ther scheme does not cature a scenaro where adversares generate ublc eys on behalf of corrut artes In ths secton we wll frstly revew ther scheme and show the chosen ublc ey attac subsequently The dea of the attac s as follows In Lbert-Vergnaud s scheme [] user s ublc ey s defned as where the rvate ey s rvate ey x and ublc ey X = x g for a random x x The adversary after queryng the Key Generaton for user to get the X = x g can choose the challenge ublc ey s PK = ( X a = ax g where a s randomly chosen Hence the adversary can comute the rvate ey of PK as We note that ths attac s not catured n the orgnal model of Lbert-Vergnaud s scheme [] Nonetheless our attac s very natural and realstc n ths scenaro 4 Our onstructon In ths secton we resent our PA secure PRE scheme from the q ABDHE assumton The dea of our scheme s based on the exonent nverson IBE scheme roosed by Gentry [9] 4 Our PRE Scheme ax We wll frst descrbe our scheme and follow wth the descrton on the roertes later Setu( : Let be the securty arameter and ( g G G e be the blnear ma

6 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang x arameters Let u g { Y y g } and where { y } and x are randomly {0} chosen n Z Let H be a hash functon from a famly of unversal one-way hash functons The system secret ey SK ({ y} x and the system ublc arameter PP ( g G G e u{ Y } H KeyGen ( PP SK : On nut a system ublc arameter PP a system secret ey SK and a ublc ey n Z select random { s } n Z comute s /( x d ( YK g where {0 } outut s { d s } Re KeyGenLev ( s : On nut a secret ey s { d s } the re-encryton ey of ublc ey outut r {( d } Re KeyGenLev ( s s : On nut a secret ey s { d s } of ublc ey and a secret ey s { d s } of ublc ey outut the re-encryton ey r {( s s } Enc( PP m : On nut a system ublc arameter PP an ublc ey and a message m G Select a random r Z and comute P Outut the level chertext ( ug r m e( g Y r 3 0 tr r 4 e( g Y e( g Y ( 3 4 e( g g r t H( m 3 Notce that encryton does not requre any arng comutatons once e( g g and e( g Y have been re-comuted Alternatvely e( g g and e( g Y can be ncluded n the system arameters Re EncLev( r : On nut a level chertext under and a level reencryton ey r let r {( d } let level chertext be ( 3 4 Reencryt the level chertext under I ' as: e( d ' outut the new level chertext as ( 3 4 {0} Re EncLev ( r : On nut a level re-encryton ey r and a level chertext under let r {( s s } and re-encryt the chertext to be under dentty as: '' ' s s outut the new chertext ( '' 3 4 {0} ( DecLev s : On nut a secret ey s { d s } and any level chertext ( comute 3 4 t s t s If 4 e( d d ( s 0 0 / 3 K e( d m K t H( m 3 then outut m DecLev s : On nut a secret ey s { d s } and any chertext '' ( 3 4 comute {0} '' s 0 K ( ( m / K

7 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 t H( 3 m (( (( (( (( then outut m If '' s t '' s 4 4 Securty of Our PRE In ths subsecton we rove the PA securty for our scheme wthout any random oracle Our PRE scheme wors n an adatve corruton model n whch the adversary has to determne the corruted artes (Key Generaton query adatvely and choce the ublc ey as her wll when mang the ey generaton query Addtonally we also allow the adversary to adatvely query a reencryton oracle and decryton oracles Theorem Let qq where q s the number of ey generaton queres If the q ABDHE assumton holds then our PRE scheme s PRE-PA secure n the standard model Proof Suose there exsts a olynomal-tme adversary A that can attac our scheme n the standard model Let q s the number of ey generaton queres We buld a smulator B that can lay a q ABDHE game The smulaton roceeds as follows: G Smulator B nuts a q We frst let the challenger set the grous G and G wth an effcent blnear ma e and a gene- rator g of ABDHE nstance ( q q x x x z zx g g g g g g T zx and has to dstngush T e( g g q from a random element n G Setu: Let be the securty arameter and ( g G G e be the blnear ma arameters Let H be a hash functon from a famly of unversal one-way hash functons B cs three random ( degree q olynomals f ( X where {0 } defnes { f x Y g } Ths mlctly defnes the system secret ey values as { y f ( x} and sends the system ublc arameter PP ( g G G e u{ Y } H to A Query hase A maes the followng queres: Key generaton query : A chooses as her le B sets { s f ( } ( f ( x f ( /( x comutes d g and stores the and s oututs s { d s } to A When q q { s f ( } s a random value from A s vew snce f ( X where {0 } are random degree q olynomals Re-encryton ey generaton level query : f A never made a Key generaton query on then mae a Key generaton query on outut the re-encryton ey r {( d } Re-encryton ey generaton level query on or outut the reencryton ey : f A never made a Key generaton query then mae a Key generaton query on or r {( s s } Re-encryton level query : On nut a level chertext ( under B queres a level re-encryton ey r 3 4 {( d } and re-encryt the ' level chertext under as: e( d outut the new level chertext ' ( 3 4 {0} Re-encryton level query : On nut a level chertext

8 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang ' ( 3 4 under {0} B queres a level re-encryton ey r {( s s } re-encryt the chertext to be under ublc ey as: '' ' s s '' outut the new chertext ( 3 4 {0} Decryton level query : On nut any level chertext ( under B queres a secret ey s { d s } t s t s If 4 e( d d s 0 0 K e( d t m / K 3 H( m 3 then outut m and comutes 3 4 Decryton level query : On nut any level chertext '' ( 3 4 B queres a secret ey {0} s { d s } and comutes '' s 0 K ( ( If '' s t '' s 4 t 0 m / K 3 H( m 3 (( (( (( (( then outut m 3 hallenge A resents { m0 m } where s the challenge ublc ey and m0 m G If the challenge ublc ey fts the restrctons descrbed n Defnton B resonds by choosng a random b{0} and set { s f ( } {0} ( f ( ( /( Then B comutes x f x d g It defnes the degree q olynomal q q q F ( X ( X ( / ( X 0 ( F X It also comutes g ( g q zx q z ( q F q z x F T e( g ( g 0 m e( d ( 3 b 0 t H ( m 3 t 4 e( ( d d ( and oututs the challenge chertext ( Let r zf ( x f 3 b 0 T b s0 3 4 zx e( g g q then ( x r g m e( g Y r t r r e( g Y e( g Y 4 st s e( g g r 4 Query hase A contnues mang queres as n the Query hase excet for the restrctons descrbed n Defnton 5 Guess Fnally A wll outut a guess b ' If b b' then B oututs otherwse B oututs 0 zx Probablty Analyss: If T e( g g q b correctly wth robablty / + Else T s unformly random and thus ( then the smulaton s erfect and A wll guess the bt s a unformly /( x random and ndeendent element In ths case the nequalty e( g holds wth robablty / When these nequalty hold the value of K e( d ( s 0 /( /( 0 e( ( Y0 x (( / ( ( x e g s s unformly random and ndeendent from A s

9 vew (excet for the value snce 3 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 s0s unformly random (when q q { s f ( } are random values from A s vew and ndeendent from A s vew (excet for the value Thus 3 s unformly random and ndeendent and can reveal no nformaton regardng the 3 bt b 5 Performance omarson ( 3 In ths secton we comare our schemes wth the exstng PRE schemes wthout random oracles from the lterature We denote LV as Lbert and Vergnaud s roosed [] undrectonal roxy reencryton scheme wth chosen chertext securty n the standard model We denote t t t and e s t v as the comutatonal cost of a blnear arngs an exonentaton over a blnear grou a one-tme sgnature and verfcaton resectvely Notce that encryton n our scheme does not requre any arng comutatons once e( g g and e( g Y have been re-comuted Let G and G be the blnear grous and sv and be the onetme sgnatures ublc ey and sgnature The result of the comarson s outlned n Table From the table t s observed that our PRE from Secton 3 gves comarable generalzaton erformance as that of Lbert and Vergnaud s constructon Our PRE scheme wors n an adatve corruton and chosen ublc ey attac model n whch the adversary has to determne the corruted artes adatvely by the chosen ublc ey 6 oncluson Table omarson Among Varous PRE Schemes wthout random oracles Scheme LV Our scheme omuteost Enc 35t e + t s omuteost Re Enc t +4t e + t s omuteost DecLev 3 t +t e + t v omuteost DecLev hertextsze Level 5 t +t e + t v 5 t e 3 t +3t e t +3t e 5t e sv G G G 3G hertextsze Level sv 4 G G 6 G Adatve orrutons Selectve Model PA In ths aer we show the nsecurty of Lbert and Vergnaud s scheme aganst chosen ublc ey attac And then we resent a new constructon of roxy re-encryton scheme whch s chosen chertext and ublc ey secure n the standard model 7 References [] G Atenese K Fu M Green and S Hohenberger Imroved roxy re-encryton schemes wth alcatons to secure dstrbuted storage In Proc Internet Socety (ISO 9 43 [] M Blaze G Bleumer and M Strauss Dvertble rotocols and atomc roxy crytograhy In Proc EURORYPT (998 [3] D Boneh and X Boyen Effcent selectve-id Identty based encryton wthout random oracles {0}

10 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang In Proc EURORYPT 004 LNS 307 Srnger-Verlag 3 38 (004 [4] D Boneh and M Franln Identty-based encryton from the wel arng In Proc RYPTO (00 [5] R anett and S Hohenberger hosen-chertext secure roxy re-encryton In Proc the 4th AM conference on omuter and communcatons securty AM New Yor NY USA (007 [6] R anett H Krawczy and JB Nelsen Relaxng chosen-chertext securty In Proc RYPTO 003 LNS 79 Srnger-Verlag (003 [7] hu and W Tzeng Identty-based roxy re-encryton wthout random oracles In Proc of IS 007 LNS vol Srnger Hedelberg (007 [8] R H Deng J Weng S Lu K hen hosen-ertext Secure Proxy Re-Encryton wthout Parngs In Proc of ANS 008 LNS vol Srnger Hedelberg (008 [9] Gentry Practcal dentty-based encryton wthout random oracles In Proc EURORYPT 006 LNS 4004 Srnger-Verlag (006 [0] M Green and G Atenese Identty-based roxy re-encryton In Proc ANS 007 LNS vol Full verson: rytology eprnt Archeve: Reort 006/473 [] BLbert DVergnaud Undrectonal hosen-hertext Secure Proxy Re-Encryton In Proc PK 08 LNS 4939 Srnger-Verlag (008 [] BLbert DVergnaud Tracng Malcous Proxes n Proxy Re-Encryton In Proc Parng 08 LNS 509 Srnger-Verlag (008 [3] T Matsuo Proxy Re-encryton Systems for Identty-Based Encryton In Proc Parng 007 LNS 4575 Srnger-Verlag (007 [4] T Matsuda R Nshma and K Tanaa A Proxy Re-Encryton wthout Blnear Mas n the Standard Model In Proc of PK 00 LNS vol Srnger Hedelberg (00 [5] J La W Zhu R Deng S Lu and W Kou New constructons for dentty-based undrectonal roxy re-encryton JOURNAL OF OMPUTER SIENE AND TEHNOLOGY Exress Vol 5 No (00 [6] J Shao and Z ao A-secure roxy re-encryton wthout arngs In Proc of PK 009 LNS vol Srnger Hedelberg (

Inter-domain Alliance Authentication Protocol Based on Blind Signature

Inter-domain Alliance Authentication Protocol Based on Blind Signature Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity Dynamc Load Balancng of Parallel Comutatonal Iteratve Routnes on Platforms wth Memory Heterogenety Davd Clare, Alexey Lastovetsy, Vladmr Rychov School of Comuter Scence and Informatcs, Unversty College

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

A Structure Preserving Database Encryption Scheme

A Structure Preserving Database Encryption Scheme A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach

More information

From Selective to Full Security: Semi-Generic Transformations in the Standard Model

From Selective to Full Security: Semi-Generic Transformations in the Standard Model An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Identity-Based Encryption Gone Wild

Identity-Based Encryption Gone Wild An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Load Balancing of Parallelized Information Filters

Load Balancing of Parallelized Information Filters IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE

More information

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo **

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo ** Fuse, Taash A New Technque for Vehcle Tracng on the Assumton of Stratosherc Platforms Taash FUSE * and Ehan SHIMIZU ** * Deartment of Cvl Engneerng, Unversty of Toyo ** Professor, Deartment of Cvl Engneerng,

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Research Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality

Research Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality Hndaw Publshng Cororaton Mathematcal Problems n Engneerng Volume 2012, Artcle ID 524809, 21 ages do:10.1155/2012/524809 Research Artcle Cometton and Integraton n Closed-Loo Suly Chan Network wth Varatonal

More information

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,

More information

Real-Time Traffic Signal Intelligent Control with Transit-Priority

Real-Time Traffic Signal Intelligent Control with Transit-Priority 738 JOURNAL OF SOFTWARE, VOL. 7, NO. 8, AUGUST 202 Real-Tme Traffc Sgnal Intellgent ontrol wth Transt-Prorty Xanyan Kuang School of vl Engneerng and Transortaton, South hna Unversty of Technology, GuangZhou,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability nformaton Artcle Effcent Dynamc Integrty Verfcaton for Bg Data Supportng Users Revocablty Xnpeng Zhang 1,2, *, Chunxang Xu 1, Xaojun Zhang 1, Tazong Gu 2, Zh Geng 2 and Guopng Lu 2 1 School of Computer

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Tailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization

Tailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization Internatonal Journal of Database Theory and Alcaton,.191-202 htt://dx.do.org/10.14257/jdta.2015.8.3.16 Talorng Fuzzy -Means lusterng Algorth for Bg Data Usng Rando Salng and Partcle Swar Otzaton Yang Xanfeng

More information

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

An Analytical Model for Multi-tier Internet Services and Its Applications

An Analytical Model for Multi-tier Internet Services and Its Applications An Analytcal Model for Mult-ter Internet Servces and Its Alcatons Bhuvan Urgaonkar, Govann Pacfc, Prashant Shenoy, Mke Sretzer, and Asser Tantaw Det. of Comuter Scence, Servce Management Mddleware Det.,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Complete Fairness in Secure Two-Party Computation

Complete Fairness in Secure Two-Party Computation Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac.

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac. A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas MYaghoub@ece.ut.ac.r M. J. Yazdananah Yazdan@ut.ac.r N. Yazdan Yazdan@ut.ac.r Control and Intellgent Processng Center

More information

Adaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems

Adaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems Adatve Load Balancng of Parallel Alcatons wth Mult-Agent Renforcement Learnng on Heterogeneous Systems Johan PAREN, Kata VERBEECK, Ann NOWE, Krs SEENHAU COMO, VUB Brussels, Belgum Emal: ohan@nfo.vub.ac.be,

More information

Chapter 3: Dual-bandwidth Data Path and BOCP Design

Chapter 3: Dual-bandwidth Data Path and BOCP Design Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Monitoring Network Traffic to Detect Stepping-Stone Intrusion

Monitoring Network Traffic to Detect Stepping-Stone Intrusion Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech

More information

ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY

ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY He L, School of Economc Informaton Engneerng, Southwestern Unversty of Fnance and Economcs, Chengdu, Chna, olverlhe@gmalcom Jng

More information

A practical approach of diffusion load balancing algorithms

A practical approach of diffusion load balancing algorithms A practcal approach of dffuson load balancng algorthms Emmanuel Jeannot and Flaven Verner Abstract In ths paper, a practcal approach of dffuson load balancng algorthms and ts mplementaton are studed. Three

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Pricing Model of Cloud Computing Service with Partial Multihoming

Pricing Model of Cloud Computing Service with Partial Multihoming Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Embedding lattices in the Kleene degrees

Embedding lattices in the Kleene degrees F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

Optimal maintenance of a production-inventory system with continuous repair times and idle periods

Optimal maintenance of a production-inventory system with continuous repair times and idle periods Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs

More information

Performance attribution for multi-layered investment decisions

Performance attribution for multi-layered investment decisions Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

An ACO Algorithm for. the Graph Coloring Problem

An ACO Algorithm for. the Graph Coloring Problem Int. J. Contemp. Math. Scences, Vol. 3, 2008, no. 6, 293-304 An ACO Algorthm for the Graph Colorng Problem Ehsan Salar and Kourosh Eshgh Department of Industral Engneerng Sharf Unversty of Technology,

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2 Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

Tracker: Security and Privacy for RFID-based Supply Chains

Tracker: Security and Privacy for RFID-based Supply Chains Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Learning User's Scheduling Criteria in a Personal Calendar Agent!

Learning User's Scheduling Criteria in a Personal Calendar Agent! Learnng User's Schedulng Crtera n a Personal Calendar Agent! Shh-ju Ln and Jane Yung-jen Hsu Deartment of Comuter Scence and Informaton Engneerng Natonal Tawan Unversty 1 Sec 4 Roosevelt Road, Tae, 106

More information