Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
|
|
- Ronald Nelson
- 8 years ago
- Views:
Transcription
1 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and Jandong Wang ollege of Informaton Scence and Technology Nanng Unversty of Aeronautcs and Astronautcs Nanng hna Emal: fanglmng@nuaaeducn entre for omuter and Informaton Securty Research School of omuter Scence and Software Engneerng Unversty of Wollongong Australa Emal: wsuslo@uoweduau do:0456/dctavol4 ssue98 Abstract A roxy re-encryton scheme enables a roxy to re-encryt a chertext and desgnate t to a delegatee Proxy re-encryton schemes have been found useful n many alcatons ncludng e-mal forwardng law-enforcement montorng and content dstrbuton Lbert and Vergnaud resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model n PK 008 In ths aer we show the nsecurty of Lbert and Vergnaud's scheme aganst chosen ublc ey attac We note that ths nsecurty s not consdered n the orgnal model roosed by Lbert and Vergnaud's but we argue that our attac s very realstc and mortant n ths scenaro Furthermore we resent a new and effcent constructon roxy re-encryton (PRE scheme We rovde chosen ublc ey and chosen chertext attac securty analyss for our scheme and comare ther erformance Keywords: Informaton Securty Proxy Re-encryton Parng Based rytograhy Introducton A roxy re-encryton (PRE scheme allows a roxy to transform a chertext under delegator s ub-lcey nto a delegatee s chertext on the same message by usng some addtonal nformaton Ths concet s roosed by Blaze Bleumer and Strauss [] and formalzed later by Atenese et al [] PRE schemes have been found useful n many alcatons such as e-mal forwardng lawenforcement montorng and content dstrbuton Recently anett and Hohenberger [5] descrbed a constructon of roxy re-encryton rovdng chosen-chertext securty accordng to an arorate defnton of PRE systems In contrast to the revous wor ther scheme reles on the fact that the roxy ey can be used to translate chertexts from delegatee to delegator hence ths s called bdrectonal (cf undrectonal scheme that was orgnally roosed n the model by Blaze et al [] Tll then there was no nown undrectonal PRE systems wth chosen-chertext securty that rely on the standard model To fll ths ga Lbert and Vergnaud [] resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model Nonetheless they left an oen roblem on how to cature a scenaro where adversares are allowed to generate ublc eys on behalf of corruted artes (ossbly non-unformly or as a functon of honest artes ublc eys Ths s a dauntng roblem where the adversares can generate any ublc eys on behalf of the corruted artes and Lbert and Vergnaud s scheme [] cannot deter aganst ths attac Motvaton of Ths Wor Although Lbert and Vergnaud scheme [] PRE scheme s very elegant there are several unsolved ssues wth regards to the securty of PRE that are outlned as follows In [] the adversares are not ermtted to generate ublc eys on behalf of the corruted artes One ossble soluton to revent ths attac s to requre users to rove ther nowledge of secret eys durng the regstraton hase Nonetheless ths aroach requres zero-nowledge roof system whch may not be desrable n several alcatons In contrast to ths aroach we tae a dfferent drecton n ths wor We ncororate a trusted arty wth a system secret ey When the user selects ts ublc - 5 -
2 g g hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang ey the trusted arty runs the ey generaton algorthm wth the system secret ey together wth the user s ublc ey and the user s secret ey then wll be generated for the user A new roblem wth ths aroach s that the attacer n ths model has to share ts secret ey wth the thrd arty whch wll be qute natural Snce relatve to Lbert and Vergnaud s securty model the challenger s requred to generate all ublc eys for all artes and allow the adversary to obtan rvate eys for some of these users Furthermore Lbert and Vergnaud only consdered a statc corruton model n whch the challenger generates ublc eys for all artes Provng securty aganst adatve corrutons s a challengng and dauntng tas Fnally Lbert and Vergnaud only rovded a scheme n a selectve ublc ey model where the target (challenge ublc ey has to be determned by the challenger at the begnnng of the game A ossble enhancement s to allow adversares to adatvely query the target ublc ey at the challenge hase wthn the set of honest layers whch we refer to as the full ublc ey model Our ontrbutons In ths aer we address the roblem of constructng a PRE n the full ublc ey adatve corruton model and to allow the adversares to generate ublc eys on behalf of corruted artes Secfcally we show that Lbert and Vergnaud s scheme s nsecure aganst chosen ublc ey attac We note that although our attac s not alcable to the orgnal model resented by Lbert and Vergnaud s [] our attac s very natural and alcable n ractce Then we rovde a formal defnton of PRE-PA game n whch the adversary can chose any ublc ey freely We also resent a new constructon of chosen-chertext secure roxy re-encryton schemes whch are PRE- PA secure n the standard model Related Wor After the semnal wor by Blaze Bleumer and Strauss [] Atenese et al [] resented a undrectonal PRE scheme based on blnear arngs n 005 Both of these schemes are PA secure In 007 anett and Hohenberger [5] resented a constructon of A secure bdrectonal PRE scheme Later Lbert and Vergnaud [] resented a A secure undrectonal PRE scheme from blnear arngs Recently Deng et al [8] roosed a A secure bdrectonal PRE scheme wthout arngs In Parng 08 Lbert and Vergnaud [] ntroduced the noton of traceable roxy reencryton where malcous roxes leang ther re-encryton eys can be dentfed Snce n PKI-based settng t s needed to dstrbute ublc ey certfcates the wor [0 7 5] extended the above noton to dentty-based roxy re-encryton (IB-PRE Due to the fact that arng comutaton s a costly exensve oeraton the subsequent wor [8 6 4] studed PRE schemes to be constructed wthout blnear arngs esecally n comutaton resource lmted settngs Defntons In ths secton we frst revew the comlexty assumton requred n our schemes and then rovde the defnton and securty of a roxy re-encryton scheme Blnear Mas Let G G be multlcatve cyclc grous of rme order and be a generator ofg Here e: G G G s a blnear ( g G G e denote the blnear ma arameters We say that ma f the followng condtons hold a b ab e( g g e( g g for all a bz g g G e( g g 3 There s an effcent algorthm to comutee( g g for all g g G The Truncated q ABDHE Assumton Let e: G G G be a blnear ma and g be a generator of G Here - 5 -
3 ( g G G e qabdhe AdvG ( B Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 denote the blnear ma arameters We defne the advantage functon of an adversary B as q q q Pr[ B( g x g x g z g zx e( g g zx ] Pr[ B( g x g x g z g zx e( g g r ] where x z r Z are randomly chosen We say that the truncated q ABDHE assumton [9] relatve to generator G holds f q ABDHE AdvG ( B s neglgble for all PPT B 3 Proxy Re-encryton In the followng we wll rovde the defnton of a PRE scheme and ts game-based securty defnton Defnton (Proxy Re-encryton A roxy re-encryton scheme comrses the followng algorthms: Setu( : On nut a securty arameter a system ublc arameter PP and a system secret ey SK are generated KeyGen ( PP SK : On nut a system ublc arameter PP a system secret ey SK and a ublc ey outut the decryton ey s Enc( PP m : On nut a system ublc arameter PP an ublc ey outut the level chertext (e a regular chertext Re KeyGenLev ( s : On nut a secret ey s of ublc ey ey r Re KeyGenLev ( s s : On nut a secret ey s of ublc ey ublc ey outut the re-encryton ey Re ( r and a message m outut the re-encryton and a secret ey s of EncLev r : On nut a level re-encryton ey r and a level chertext under outut the new level chertext (e a re-encryton chertext under Re EncLev ( r : On nut a level re-encryton ey r and a level chertext under outut the new chertext under DecLev( s : On nut a secret ey s and any level chertext under outut m DecLev s : On nut a secret ey s and any level chertext under ( outut m In the followng we rovde the game-based securty defnton of PRE as follows Defnton (PRE-PA game [5] Let be the securty arameter and A be the adversary The game conssts of an executon of between an adversary A and a challenger wth the followng oracles subect to the constrants below: Setu: The challenger erforms Setu( to get a system ublc arameter PP and a system secret ey SK Gve the system ublc arameter PP to A Query hase A maes the followng queres: Key generaton query : A can choose any ublc ey as her wll A s gven the
4 rvate ey hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang s of Re-encryton ey generaton level query : On nut by the adversary return the level re-encryton ey r to A We only allow the ReKeyGenLev query after the ey generaton query Re-encryton ey generaton level query : On nut by the adversary A s gven the level re-encryton ey r Re-encryton level query : On nut a level chertext and ublc ey A s gven the new level chertext Re-encryton level query: On nut a level chertext ey A s gven the new level chertext under ublc ey and ublc Decryton level query : On nut a ublc ey and any level chertext mae a Key Generaton query to get secret ey s of then decryt t A s gven m Decryton level query : On nut a ublc ey and any level chertext mae a ey generaton query on h to get secret ey s of then decryt t A s gven m 3 hallenge A resents ( m0 m where s called the challenge ublc ey If the s fresh the challenger chooses a bt b Z and returns the challenge chertext Enc( m b A ( s fresh f none of the followng queres made by A : Key generaton query Re-encryton ey generaton level query ( s the ublc ey dervatves of and then A maes Key generaton query or Re-encryton ey generaton level query Publc ey dervatves of ( are defned recursvely as follows ( s a dervatve of tself If ( s a dervatve of ( and ( ' s a dervatve of ( then ( ' s a dervatve of ( If A has quered the level re-encryton ey generaton oracle on nut ( or ( then ( s a dervatve of ( 4 Query hase A contnues mang queres as n the Query hase excet for the followng queres: Key generaton query Re-encryton ey generaton level query ( s the ublc ey dervatves of and then A maes Key generaton query or Reencryton ey generaton level query One of the ( and ( s fresh and the other s not fresh and Re-encryton level query
5 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 Decryton level query and ( s the level chertext dervatves of ( Decryton level query and ( ( ( s the level chertext dervatves of s the level chertext dervatves of ( f = and where ( = = Re EncLev( r s the level chertext dervatves of ( f = Re EncLev ( r 5 Guess A oututs the guess b ' f b ' = b then outut ; else outut 0 We say that A wns the PRE-PA game wth advantage f the robablty that the decson oracle s nvoed and oututs s at least / + omarng our scheme wth Lbert and Vergnaud s model [] our securty model outerforms Lbert and Vergnaud s scheme n the followng asects: In our securty model the adversares are ermtted to generate ublc eys on behalf of the corruted artes Furthermore Lbert and Vergnaud only consdered a statc corruton model n whch the challenger generates ublc eys for all artes In contrast our model allows the adversary to adatvely determne whch artes wll be comromsed Fnally Lbert and Vergnaud only rovded a scheme n a selectve ublc ey model where the target (challenge ublc ey has to be determned by the challenger at the begnnng of the game In contrast n our model the adversary can determne the target (challenge ublc ey at anytme 3 hosen Publc Key Attac on Lbert and Vergnaud PRE Lbert and Vergnaud [] resented the frst constructon of undrectonal roxy re-encryton scheme wth chosen chertext securty n the standard model Ther system s a remnscent of the ublc ey crytograhy system obtaned by alyng the anett-halev-katz transform to the second selectve-id secure dentty-based encryton scheme descrbed n [3] Unfortunately as they clamed ther scheme does not cature a scenaro where adversares generate ublc eys on behalf of corrut artes In ths secton we wll frstly revew ther scheme and show the chosen ublc ey attac subsequently The dea of the attac s as follows In Lbert-Vergnaud s scheme [] user s ublc ey s defned as where the rvate ey s rvate ey x and ublc ey X = x g for a random x x The adversary after queryng the Key Generaton for user to get the X = x g can choose the challenge ublc ey s PK = ( X a = ax g where a s randomly chosen Hence the adversary can comute the rvate ey of PK as We note that ths attac s not catured n the orgnal model of Lbert-Vergnaud s scheme [] Nonetheless our attac s very natural and realstc n ths scenaro 4 Our onstructon In ths secton we resent our PA secure PRE scheme from the q ABDHE assumton The dea of our scheme s based on the exonent nverson IBE scheme roosed by Gentry [9] 4 Our PRE Scheme ax We wll frst descrbe our scheme and follow wth the descrton on the roertes later Setu( : Let be the securty arameter and ( g G G e be the blnear ma
6 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang x arameters Let u g { Y y g } and where { y } and x are randomly {0} chosen n Z Let H be a hash functon from a famly of unversal one-way hash functons The system secret ey SK ({ y} x and the system ublc arameter PP ( g G G e u{ Y } H KeyGen ( PP SK : On nut a system ublc arameter PP a system secret ey SK and a ublc ey n Z select random { s } n Z comute s /( x d ( YK g where {0 } outut s { d s } Re KeyGenLev ( s : On nut a secret ey s { d s } the re-encryton ey of ublc ey outut r {( d } Re KeyGenLev ( s s : On nut a secret ey s { d s } of ublc ey and a secret ey s { d s } of ublc ey outut the re-encryton ey r {( s s } Enc( PP m : On nut a system ublc arameter PP an ublc ey and a message m G Select a random r Z and comute P Outut the level chertext ( ug r m e( g Y r 3 0 tr r 4 e( g Y e( g Y ( 3 4 e( g g r t H( m 3 Notce that encryton does not requre any arng comutatons once e( g g and e( g Y have been re-comuted Alternatvely e( g g and e( g Y can be ncluded n the system arameters Re EncLev( r : On nut a level chertext under and a level reencryton ey r let r {( d } let level chertext be ( 3 4 Reencryt the level chertext under I ' as: e( d ' outut the new level chertext as ( 3 4 {0} Re EncLev ( r : On nut a level re-encryton ey r and a level chertext under let r {( s s } and re-encryt the chertext to be under dentty as: '' ' s s outut the new chertext ( '' 3 4 {0} ( DecLev s : On nut a secret ey s { d s } and any level chertext ( comute 3 4 t s t s If 4 e( d d ( s 0 0 / 3 K e( d m K t H( m 3 then outut m DecLev s : On nut a secret ey s { d s } and any chertext '' ( 3 4 comute {0} '' s 0 K ( ( m / K
7 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 t H( 3 m (( (( (( (( then outut m If '' s t '' s 4 4 Securty of Our PRE In ths subsecton we rove the PA securty for our scheme wthout any random oracle Our PRE scheme wors n an adatve corruton model n whch the adversary has to determne the corruted artes (Key Generaton query adatvely and choce the ublc ey as her wll when mang the ey generaton query Addtonally we also allow the adversary to adatvely query a reencryton oracle and decryton oracles Theorem Let qq where q s the number of ey generaton queres If the q ABDHE assumton holds then our PRE scheme s PRE-PA secure n the standard model Proof Suose there exsts a olynomal-tme adversary A that can attac our scheme n the standard model Let q s the number of ey generaton queres We buld a smulator B that can lay a q ABDHE game The smulaton roceeds as follows: G Smulator B nuts a q We frst let the challenger set the grous G and G wth an effcent blnear ma e and a gene- rator g of ABDHE nstance ( q q x x x z zx g g g g g g T zx and has to dstngush T e( g g q from a random element n G Setu: Let be the securty arameter and ( g G G e be the blnear ma arameters Let H be a hash functon from a famly of unversal one-way hash functons B cs three random ( degree q olynomals f ( X where {0 } defnes { f x Y g } Ths mlctly defnes the system secret ey values as { y f ( x} and sends the system ublc arameter PP ( g G G e u{ Y } H to A Query hase A maes the followng queres: Key generaton query : A chooses as her le B sets { s f ( } ( f ( x f ( /( x comutes d g and stores the and s oututs s { d s } to A When q q { s f ( } s a random value from A s vew snce f ( X where {0 } are random degree q olynomals Re-encryton ey generaton level query : f A never made a Key generaton query on then mae a Key generaton query on outut the re-encryton ey r {( d } Re-encryton ey generaton level query on or outut the reencryton ey : f A never made a Key generaton query then mae a Key generaton query on or r {( s s } Re-encryton level query : On nut a level chertext ( under B queres a level re-encryton ey r 3 4 {( d } and re-encryt the ' level chertext under as: e( d outut the new level chertext ' ( 3 4 {0} Re-encryton level query : On nut a level chertext
8 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang ' ( 3 4 under {0} B queres a level re-encryton ey r {( s s } re-encryt the chertext to be under ublc ey as: '' ' s s '' outut the new chertext ( 3 4 {0} Decryton level query : On nut any level chertext ( under B queres a secret ey s { d s } t s t s If 4 e( d d s 0 0 K e( d t m / K 3 H( m 3 then outut m and comutes 3 4 Decryton level query : On nut any level chertext '' ( 3 4 B queres a secret ey {0} s { d s } and comutes '' s 0 K ( ( If '' s t '' s 4 t 0 m / K 3 H( m 3 (( (( (( (( then outut m 3 hallenge A resents { m0 m } where s the challenge ublc ey and m0 m G If the challenge ublc ey fts the restrctons descrbed n Defnton B resonds by choosng a random b{0} and set { s f ( } {0} ( f ( ( /( Then B comutes x f x d g It defnes the degree q olynomal q q q F ( X ( X ( / ( X 0 ( F X It also comutes g ( g q zx q z ( q F q z x F T e( g ( g 0 m e( d ( 3 b 0 t H ( m 3 t 4 e( ( d d ( and oututs the challenge chertext ( Let r zf ( x f 3 b 0 T b s0 3 4 zx e( g g q then ( x r g m e( g Y r t r r e( g Y e( g Y 4 st s e( g g r 4 Query hase A contnues mang queres as n the Query hase excet for the restrctons descrbed n Defnton 5 Guess Fnally A wll outut a guess b ' If b b' then B oututs otherwse B oututs 0 zx Probablty Analyss: If T e( g g q b correctly wth robablty / + Else T s unformly random and thus ( then the smulaton s erfect and A wll guess the bt s a unformly /( x random and ndeendent element In ths case the nequalty e( g holds wth robablty / When these nequalty hold the value of K e( d ( s 0 /( /( 0 e( ( Y0 x (( / ( ( x e g s s unformly random and ndeendent from A s
9 vew (excet for the value snce 3 Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 s0s unformly random (when q q { s f ( } are random values from A s vew and ndeendent from A s vew (excet for the value Thus 3 s unformly random and ndeendent and can reveal no nformaton regardng the 3 bt b 5 Performance omarson ( 3 In ths secton we comare our schemes wth the exstng PRE schemes wthout random oracles from the lterature We denote LV as Lbert and Vergnaud s roosed [] undrectonal roxy reencryton scheme wth chosen chertext securty n the standard model We denote t t t and e s t v as the comutatonal cost of a blnear arngs an exonentaton over a blnear grou a one-tme sgnature and verfcaton resectvely Notce that encryton n our scheme does not requre any arng comutatons once e( g g and e( g Y have been re-comuted Let G and G be the blnear grous and sv and be the onetme sgnatures ublc ey and sgnature The result of the comarson s outlned n Table From the table t s observed that our PRE from Secton 3 gves comarable generalzaton erformance as that of Lbert and Vergnaud s constructon Our PRE scheme wors n an adatve corruton and chosen ublc ey attac model n whch the adversary has to determne the corruted artes adatvely by the chosen ublc ey 6 oncluson Table omarson Among Varous PRE Schemes wthout random oracles Scheme LV Our scheme omuteost Enc 35t e + t s omuteost Re Enc t +4t e + t s omuteost DecLev 3 t +t e + t v omuteost DecLev hertextsze Level 5 t +t e + t v 5 t e 3 t +3t e t +3t e 5t e sv G G G 3G hertextsze Level sv 4 G G 6 G Adatve orrutons Selectve Model PA In ths aer we show the nsecurty of Lbert and Vergnaud s scheme aganst chosen ublc ey attac And then we resent a new constructon of roxy re-encryton scheme whch s chosen chertext and ublc ey secure n the standard model 7 References [] G Atenese K Fu M Green and S Hohenberger Imroved roxy re-encryton schemes wth alcatons to secure dstrbuted storage In Proc Internet Socety (ISO 9 43 [] M Blaze G Bleumer and M Strauss Dvertble rotocols and atomc roxy crytograhy In Proc EURORYPT (998 [3] D Boneh and X Boyen Effcent selectve-id Identty based encryton wthout random oracles {0}
10 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge Jandong Wang In Proc EURORYPT 004 LNS 307 Srnger-Verlag 3 38 (004 [4] D Boneh and M Franln Identty-based encryton from the wel arng In Proc RYPTO (00 [5] R anett and S Hohenberger hosen-chertext secure roxy re-encryton In Proc the 4th AM conference on omuter and communcatons securty AM New Yor NY USA (007 [6] R anett H Krawczy and JB Nelsen Relaxng chosen-chertext securty In Proc RYPTO 003 LNS 79 Srnger-Verlag (003 [7] hu and W Tzeng Identty-based roxy re-encryton wthout random oracles In Proc of IS 007 LNS vol Srnger Hedelberg (007 [8] R H Deng J Weng S Lu K hen hosen-ertext Secure Proxy Re-Encryton wthout Parngs In Proc of ANS 008 LNS vol Srnger Hedelberg (008 [9] Gentry Practcal dentty-based encryton wthout random oracles In Proc EURORYPT 006 LNS 4004 Srnger-Verlag (006 [0] M Green and G Atenese Identty-based roxy re-encryton In Proc ANS 007 LNS vol Full verson: rytology eprnt Archeve: Reort 006/473 [] BLbert DVergnaud Undrectonal hosen-hertext Secure Proxy Re-Encryton In Proc PK 08 LNS 4939 Srnger-Verlag (008 [] BLbert DVergnaud Tracng Malcous Proxes n Proxy Re-Encryton In Proc Parng 08 LNS 509 Srnger-Verlag (008 [3] T Matsuo Proxy Re-encryton Systems for Identty-Based Encryton In Proc Parng 007 LNS 4575 Srnger-Verlag (007 [4] T Matsuda R Nshma and K Tanaa A Proxy Re-Encryton wthout Blnear Mas n the Standard Model In Proc of PK 00 LNS vol Srnger Hedelberg (00 [5] J La W Zhu R Deng S Lu and W Kou New constructons for dentty-based undrectonal roxy re-encryton JOURNAL OF OMPUTER SIENE AND TEHNOLOGY Exress Vol 5 No (00 [6] J Shao and Z ao A-secure roxy re-encryton wthout arngs In Proc of PK 009 LNS vol Srnger Hedelberg (
Inter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationDynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity
Dynamc Load Balancng of Parallel Comutatonal Iteratve Routnes on Platforms wth Memory Heterogenety Davd Clare, Alexey Lastovetsy, Vladmr Rychov School of Comuter Scence and Informatcs, Unversty College
More informationCompact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
More informationA Structure Preserving Database Encryption Scheme
A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach
More informationFrom Selective to Full Security: Semi-Generic Transformations in the Standard Model
An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationIdentity-Based Encryption Gone Wild
An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationLoad Balancing of Parallelized Information Filters
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE
More informationA New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo **
Fuse, Taash A New Technque for Vehcle Tracng on the Assumton of Stratosherc Platforms Taash FUSE * and Ehan SHIMIZU ** * Deartment of Cvl Engneerng, Unversty of Toyo ** Professor, Deartment of Cvl Engneerng,
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationResearch Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality
Hndaw Publshng Cororaton Mathematcal Problems n Engneerng Volume 2012, Artcle ID 524809, 21 ages do:10.1155/2012/524809 Research Artcle Cometton and Integraton n Closed-Loo Suly Chan Network wth Varatonal
More informationA Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,
More informationReal-Time Traffic Signal Intelligent Control with Transit-Priority
738 JOURNAL OF SOFTWARE, VOL. 7, NO. 8, AUGUST 202 Real-Tme Traffc Sgnal Intellgent ontrol wth Transt-Prorty Xanyan Kuang School of vl Engneerng and Transortaton, South hna Unversty of Technology, GuangZhou,
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationRUHR-UNIVERSITÄT BOCHUM
RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationSecure and Efficient Proof of Storage with Deduplication
Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationEvaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling
MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationEfficient Dynamic Integrity Verification for Big Data Supporting Users Revocability
nformaton Artcle Effcent Dynamc Integrty Verfcaton for Bg Data Supportng Users Revocablty Xnpeng Zhang 1,2, *, Chunxang Xu 1, Xaojun Zhang 1, Tazong Gu 2, Zh Geng 2 and Guopng Lu 2 1 School of Computer
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationAn Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
More informationTailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization
Internatonal Journal of Database Theory and Alcaton,.191-202 htt://dx.do.org/10.14257/jdta.2015.8.3.16 Talorng Fuzzy -Means lusterng Algorth for Bg Data Usng Rando Salng and Partcle Swar Otzaton Yang Xanfeng
More informationA Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks
A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationAn Analytical Model for Multi-tier Internet Services and Its Applications
An Analytcal Model for Mult-ter Internet Servces and Its Alcatons Bhuvan Urgaonkar, Govann Pacfc, Prashant Shenoy, Mke Sretzer, and Asser Tantaw Det. of Comuter Scence, Servce Management Mddleware Det.,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationComplete Fairness in Secure Two-Party Computation
Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationA NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac.
A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas MYaghoub@ece.ut.ac.r M. J. Yazdananah Yazdan@ut.ac.r N. Yazdan Yazdan@ut.ac.r Control and Intellgent Processng Center
More informationAdaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems
Adatve Load Balancng of Parallel Alcatons wth Mult-Agent Renforcement Learnng on Heterogeneous Systems Johan PAREN, Kata VERBEECK, Ann NOWE, Krs SEENHAU COMO, VUB Brussels, Belgum Emal: ohan@nfo.vub.ac.be,
More informationChapter 3: Dual-bandwidth Data Path and BOCP Design
Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationMonitoring Network Traffic to Detect Stepping-Stone Intrusion
Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationEvaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications
Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech
More informationADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY
ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY He L, School of Economc Informaton Engneerng, Southwestern Unversty of Fnance and Economcs, Chengdu, Chna, olverlhe@gmalcom Jng
More informationA practical approach of diffusion load balancing algorithms
A practcal approach of dffuson load balancng algorthms Emmanuel Jeannot and Flaven Verner Abstract In ths paper, a practcal approach of dffuson load balancng algorthms and ts mplementaton are studed. Three
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationTuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationA Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationPricing Model of Cloud Computing Service with Partial Multihoming
Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationEmbedding lattices in the Kleene degrees
F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded
More informationAd-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationSoftware project management with GAs
Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de
More informationOptimal maintenance of a production-inventory system with continuous repair times and idle periods
Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs
More informationPerformance attribution for multi-layered investment decisions
Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management
More informationSome literature also use the term Process Control
A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationRate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationAn ACO Algorithm for. the Graph Coloring Problem
Int. J. Contemp. Math. Scences, Vol. 3, 2008, no. 6, 293-304 An ACO Algorthm for the Graph Colorng Problem Ehsan Salar and Kourosh Eshgh Department of Industral Engneerng Sharf Unversty of Technology,
More informationSecure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
More informationBusiness Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2
Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationEnergy Efficient Routing in Ad Hoc Disaster Recovery Networks
Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationTracker: Security and Privacy for RFID-based Supply Chains
Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationLearning User's Scheduling Criteria in a Personal Calendar Agent!
Learnng User's Schedulng Crtera n a Personal Calendar Agent! Shh-ju Ln and Jane Yung-jen Hsu Deartment of Comuter Scence and Informaton Engneerng Natonal Tawan Unversty 1 Sec 4 Roosevelt Road, Tae, 106
More information