Improved PKC Provably Secure against Chosen Cipher text Attack

Size: px
Start display at page:

Download "Improved PKC Provably Secure against Chosen Cipher text Attack"

Transcription

1 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 Improv PKC Provly Scur gnst Chosn Cphr txt Attck Sushm Prhn Brnr Kumr Shrm 2 School of Stus n Mthmtcs, Pt Rv Shnkr Shukl Unvrsty, Rpur, Chhttsgrh sushprhn@gmlcom 2 School of Stus n Mthmtcs, Pt Rv Shnkr Shukl Unvrsty, Rpur, Chhttsgrh Shrmk07@gmlcom ABSTRACT A nw pulc ky cryptosystm s prsnt whch s s on Equvlnt-RSA tht s provly scur gnst ptv chosn cphr txt ttck (s fn y Rckoff [22]) KEYWORDS RSA Cryptosystm; Smntc scurty; Chosn cphr txt ttck; Aptv chosn cphr txt ttck; Mprm RSA; D-RSA; Equvlnt RSA prolm INTRODUCTION Pulc ky cryptosystms, n th sns of Dff-Hllmn [], prov pulc ccss to th ncrypton ky whl th crypton ky s kpt scrt y th rcpnt of th cphr txt Th lgrc structur n th form of morn mthmtcl tools provs consrl scurty n pulc ky cryptosystm, ut such systm s not yon th rch of ttckr Th clsscl vrson of most populr pulc ky cryptosystm RSA [23] s nthr smntclly scurs nor s t scur gnst ptv chosn chppr txt ttck Chosn Cphrtxt Scurty- To ssst th scurty of pulc ky cryptosystm gnst th Chosn Cphr txt Attck (CCA), th ssumpton s tht th cryptnlyst lso hs ccss to th crypton orcl Th cryptnlyst cn slct ny cphr txt, osrv th corrsponng plntxt Th cryptnlyst ms to fn out th scrt ky or ncrypt trgt cphrtxt A cryptosystm s s to scur gnst CCA f th cryptnlyst fls n ths ttck Nturl xtnson of CCA s, howvr th ptv chosn cphrtxt ttck It s fn y Rckoff Smon [22] A cryptosystm s s to scur gnst th Aptv Chosn Cphrtxt Attck (ACCA) f th cryptnlyst fls vn to otn ny prtl nformton out th plntxt rlvnt to th trgt cphrtxt On wy of mmunzng cryptosystm gnst ACCA s tht th ncrypton lgorthm shoul stroy th mthmtcl rltonshp twn th plntxt ts cphrtxt Morovr, th crypton lgorthm must sgn n such wy such tht t os not output th rsult, f th rsult os not stsfy prtrmn structur Ths wy, vry cphrtxt os not com goo/ccptl nput to th crypton orcl In othr wors, fnng n ccptl cphrtxt mpls tht th mssg s known to th vrsry (ths s known s th Plntxt-Awrnss []) Howvr, f th vrsry knows th mssg, h lrns nothng from cphrng th cphrtxt (, th chosn cphrtxt ttck mks no sns)snc, fnton of ACCA, svrl sgns of pkc r ntrouc wth clm to scur from ACCA Ths ppr rvws most of DOI : 052/jcs

2 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 thm uss most rcnt ncrypton schm gvn y Hossn Ghoos [8], n orr to propos ncrypton schm scur from ACC ACCA oth hvng mor _ctvly s compr to othrs To chv our gol w orgnz ths ppr s follows In scton 2, w frst gv rf rvw of prvous works W thn rvw th rsults chv y Pontchvl [3], snc th propos schm follows smlr structur In scton 3, w xpln th Equvlnt RSA (ERSA) [8] In scton 4, w scr th MPrm RSA mtho In scton 5, w show how to construct scur systms ccorng to sc schm of ERSA schm Fnlly, n scton 6 7, w conclu wth th scurty th ffcncy prformnc of th propos schms 2 RELATED WORK Nor Yung [20] hv construct pulc ky cryptosystm scur gnst CCA Ltr, Dolv Dwork Nor [2], Rckoff Smon [22] hv whch construct cryptosystms ws scur gnst ACCA Although ths schms wr provly scur ut ths wr vry nffcnt thrfor foun mprctcl Nxt, ttmpt to sgn n ffcnt pulc-ky cryptosystm scur gnst CCA ws m y Dmgr [0] In ths work two constructons, on s on ny trmnstc pulc ky systm th othr s on th ElGml pulc ky systm, hv n prsnt Howvr, thr s no proof of scurty n ths systm (n fct, th work ns wth n opn prolm; skng th rr to prov or sprov th ssumpton m n th ppr) Ths schm s scur gnst th lunchtm t-tck, ut s not scur gnst ACCA [25, 26] Zhng Srry [26] prsnt thr mthos for mmunzng pulc ky cryptosystms gnst ACCA In [9], Lm L hv shown tht, n som cryptosystms, Zhng-Srys mtho fls unr known plntxt ttcks Thy thn prsnt two schms tht r clm to scur gnst ACCA Howvr, oth schms wr susquntly rokn y Frnkl Yung [5] Bllr Rogwy [] prsnt th OAEP concpt, whch s hurstclly scur unr th rom orcl mol ( hsh functon plys th rol of rom orcl) Crmr Shoup [9] who pont out tht, lthough th scurty unr th rom orcl mol s vlul, t s not rll Thy prsnt nw pulc ky cryptosystm, whch s scur gnst ACCA unr str ntrctlty ssumptons Thr work ws th st sgn of pulc ky cryptosystms scur gnst ACCA Howvr, Pontchvl [3] rgu tht Crmr Shoups schm [9] rqurs mor thn four xponnttons for n ncrypton, prsnt nw schm s on th pnnt-rsa prolm Informlly, th pnnt-rsa prolm of [3] stts tht gvn m n n RSA systm, fn ( m +) Thr conjctur s tht, ths prolm s hr In orr to chv smntc scurty, thy hv fn nothr prolm cll th Dcsonl Dpnnt-RSA prolm Ths prolms stts tht, for romly chosn r, two prs ( m, r) ( m,( m + ) ) r nstngushl Thr conjctur s tht ths prolm s ntrctl whn s grtr thn 260 Bs on ths conjcturs, thy hv thn prsnt th followng schms: 8

3 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury Th DRSA- Encrypton Schm Ths s strngthn vrson of th DRSA ncrypton schm for ttnng scurty gnst l ACCA Lt l scurty prmtr, h : Z n Z n {0, } hsh functon Th cphrtxt of mssg m s trpl (A, B, H), such tht: A = k ; B = m ( k + ) H = h(m, k) Hr, k s rom vlu To crypt th cphrtxt, th rcvr computs: k = A (mo n) m = B /( k + ) (mon) thn chcks for qulty H = h (m, k) If th qulty s sts f, thn m s ccpt to th mssg; othrws, th cphrtxt s rjct Ths schm s to scur gnst ACCA, snc th prolty of gnrtng n ccptl cphrtxt, wthout knowng th mssg, s nglgl 22 Th DRSA-2 Encrypton Schm Ths s smlr to DRSA-, ut th rsultng schm s quvlnt to th computtonl prolm rthr thn to th csonl on Lt k th sz of th plntxt, k2 scurty prmtr, lt k : Z {0,} k k2 h n h :{0,} {0, } 2 Zn two hsh functons Th cphrtxt of mssg m s trpl (A, B, H), such tht: A = k ; B = m h (( k + ) mo n) H = h2 ( m, k) To crypt th cphrtxt, th rcvr computs: k = A (mo n) m = B / h (( k + ) mon) thn chcks for qulty H = h2 ( m, k) Thy hv shown tht ths schm s lso non-mlll, thus scur gnst ACCA 3 ERSA Encrypton Schm Hossn Ghoos [8] sgn pulc ky cryptosystms whch ws scur gnst chosn cphrtxt ttcks Th mn vntg of gvn schms s tht h mploy prolm quvlnt to th wll-stu RSA prolm, thus thr schm o not rly on conjcturs or unprovn clms Thrfor, th rsultng schms r s scur s th RSA systm Th Schm s s follows: Ky Gnrton An RSA systm wth pulc prmtrs n,, whr n s th RSA moulus s th ncrypton ky Lt th ncrypton ky h th propr hsh functon Encrypton To ncrypt mssg 0 m < n, slct = h( k + ) m(mon) th cphrtxt s (, ) Dcrypton Th rcpnt of th cphrtxt (, ) frst computs mssg, usng m = (mo n) h( k + ) k Z n comput = k (mo n) k = (mo n), thn rtrvs th 9

4 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 It s not ffcult to show tht cphrtxt n ERSA systm looks lk romly chosn pr, snc th frst ntry s cphrtxt of rom vlu n th orgnl RSA thus s nstngushl from rom vlu Th scon ntry s th multplcton of th mssg, m, n th output of hsh functon, thrfor s rom Not tht n rom pr, on cnnot fn ny logcl rltonshp twn two ntrs Whl n ERSA systm, thr s strong rltonshp twn two ntrs of cphrtxt Ths rltonshp, howvr, cnnot utlz n orr to stngush cphrtxt from rom pr, xcpt on cn solv th RSA prolm Tht s, shown y th followng thorm Thorm If RSA prolm s ntrctl, thn cphrtxt n th ERSA systm s nstngushl from rom pr 3 ERSA- Encrypton Schm In orr to chv scurty gnst ACCA, common tchnqu s to ttch tg to th cphrtxt Intlzton: Consr n RSA systm wth pulc prmtrs (n, ) th scrt ky Lt h propr hsh functon Encrypton To ncrypt mssg 0 m < n k Z, slct n, comput, = k, = h( k + ) m c = h( m // k) whr m//k nots th conctnton of m k Th cphrtxt s (,, c) Dcrypton For ths schm w ssum tht th ncrypton lgorthm s n orcl tht works n th followng wy ) It computs k = (mo n), thn rtrvs th mssg m, usng = h( k +) 2) It outputs th mssg m f c = h(m//k) As t cn sn, ny mofcton to th scon ntry of th cphrtxt mpls som mofcton of th thr ntry; othrws th ncrypton orcl wll tct th mofcton Howvr, th thr ntry s hsh functon Bcus of th on-wynss proprty of th unrlyng hsh functon, t s ntrctl to know th output wthout knowlg of th nput But th nput to ths hsh functon s conctnton of m k Hnc, gnrtng goo/ccptl cphrtxt mpls knowlg of th mssg Tht s, th plntxt wrnss proprty, whch s quvlnt to non-mlllty, s chv Thorm2 Th ERSA- ncrypton schm s smntclly scur gnst ACCA 32 ERSA-2 Encrypton Schm Intlzton Consr n RSA systm wth pulc prmtrs (n; ) Lt l th sz of th plntxt h (), h2() h : {0,} two hsh functons, such tht Z n Encrypton To ncrypt mssg 0 m < n, th snr choos k Z n 0

5 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 computs = k (mon), = m h (( k + )mo n) thn s trpl (,, c) c = h2 ( m // k) Th cphrtxt Dcrypton Th rcpnt of th cphrtxt frst computs, k = (mo n) An m = = h (( k + )mo If c = h ( m // 2 k n ) thn t outputs th mssg m; othrws, t outputs? ) Thorm3 Th ERSA-2 ncrypton schm s smntclly scur gnst ptv chosn cphrtxt ttck 4 Mprm RSA-(Mult-prm RSA) Mprm RSA ws ntrouc y Collns [7], who mof th RSA moulus so tht t conssts of N = p, p2, pk k prms nst of th trtonl two prm s p q Th ky gnrton, ncrypton crypton lgorthms r s follows: Ky gnrton Th ky gnrton lgorthm rcvs s prmtr th ntgr k, nctng th numr of prms to us Th ky prs pulc prvt r gnrt ccorng to th followng stps: log n p, p, p () Comput k stnct prms 2 k, ch on k N = p ts n lngth (2) Comput such tht = mo(n), whr gc(, ( N)) = ( N) ( ), = p = (3) For k, comput = mo( p ) Encrypton Gvn pulc ky N, thus c = M mo N mssg m Z n, ncrypts M xctly s n th orgnl RSA, Dcrypton M To crypt cphrtxt C, frst clcult = C mo p for ch, k Nxt, pply th CRT to th M s to gt M = C mo N 5 Propos Schms Scur Agnst CCA ACCA Now w propos nw schm whch s scur gnst th ACC ACCA n orr to chv n stngush lty of cphrtxt wth rom pr, w mploy propr hsh functon to h + K s follows:

6 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury Schm Ths schm s smlr to ERSA sc schm, ut t utlzs hsh functon lso th ky gnrton s smlr to MPrm RSA Th schm works s follows: Ky Gnrton Lt th ky wll gnrt y usng th ky gnrton of Multprm RSA schm: Th ky gnrton lgorthm rcvs s prmtr th ntgr k, nctng th numr of prms to us Th ky prs pulc prvt r gnrt ccorng to th followng stps: logn p, p, p () Comput k stnct prms 2 k ch on k N = p ts n lngth (2) Comput such tht = mo(n), whr gc(, ( N)) = ( N) ( ), = p = (3) For k, comput = mo( p ) Encrypton l To ncrypt mssg 0 m < n h : Z, Lt L scurty prmtr, n Z n {0, } hsh k Z functon slct n C k (mo n) comput = C h( k ) m(mo n) = + th ( C, ) cphrtxt s C Dcrypton (, ) Th rcpnt of th cphrttx C C C m = (mon) mssg, usng h( k + ) frst computs k = (mo n), thn rtrvs th 52 Schm2 Ky Gnrton Th ky gnrton s sm s schm Encrypton To ncrypt mssg 0 m < n k Z, slct n C k C h k m, comput, =, = ( + ) C c = h( m // k) ( C,, ) whr m//k nots th conctnton of m k Th cphrtxt s C Cc Dcrypton For ths schm w ssum tht th ncrypton lgorthm s n orcl tht works n th followng wy k = C (mo n) ) It computs C = ( +), thn rtrvs th mssg m, usng h k 2) It outputs th mssg m f c = h (m//k) 2

7 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury Schm3 Ky Gnrton Th ky gnrton s sm s schm Encrypton To ncrypt mssg 0 m < n k Z, th snr choos n c k (mon), C m h (( )mo ) An computs = = k + n ( C,, ) thn s trpl C Cc C ( m // c = h 2 k ) Th cphrtxt Dcrypton Th rcpnt of th cphrtxt frst computs, k = C (mo n) m = C h (( k )mo An = + n ) If C c = h2 ( m // k) thn t outputs th mssg m; othrws, t outputs? 6 Scurty of th Propos Schm () Smntc Scur- Scurty of ERSA, ERSA-, ERSA-2 ncrypton schms (from th pont of vw of smntcl scurty scurty gnst chosn cphrtxt ttcks) cn monstrt n th wy of Pontchvls work [3], snc ths schms r smlr to DRSA, DRSA-, DRSA-2 In our sc schm, th cphrtxt (k;m_ k+) os not hlp n opponnt to lrn ny usful nformton out th mssg Tht s, vng th scon ntry y th frst ntry /or computng th grtst common vsors of ths two tms gvs solutly no usful nformton to th opponnt (2) Prtl Ky Exposur Attck- W know tht such prvt xponnt s lrg nough to com nffctv for th ttcks of th smll prvt xponnts [3] Th ttck on th smll pulc xponnts s lso not prolm, u to th sz of th pulc xponnt whch s gnrt y th gnrton lgorthm MJson Hnk [6] m n nlyss of th prtl ky xposur ttck on th MPrm RSA vrf tht for thr four prms th ttck coms nffctv Thus t woul sm n our schm lso (3) Rom Orcl Mol- If w consr th scurty n th rom orcl mol, th schm- rchs th scurty gnst ptv chosn-cphrtxt ttcks wth n sm our ffcncy (4) ACC-Attck- Howvr, th most ntrstng schm s th Schm-2 cryptosystm tht rchs smntc scurty oth gnst ptv chosn-cphrtxt ttcks, n stuton whr t s prctclly quvlnt to th RSA prolm In, smllr xponnt, such s = (or vn 3), cn us, hnc n mprov ffcncy s otn wth N = 024, ths schm s lry fstr thn OAEP, for oth ncrypton crypton Ths schm cn gn hghr rts, com much fstr thn th orgnl RSA ncrypton schm 7 Effcncy Prformnc Pontchvl [3] hs clm tht hs schm s th most ffcnt schm to t n ths fl Hr, f w compr th ffcncy of our schms wth hs work, thus w fn tht oth schms 3

8 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 hv smlr structurs thrfor t s sy to compr thr ffcncy In [3], th snr th rcvr ch ns to prform two xponnttons Ths s u to clculton of k ( k +) whch must on y oth, th snr th rcvr In our schm, lthough th snr th rcvr comput k ( k +), th clculton of ( k +) ns just on multplcton ( k + ) = k k Anothr ffcncy fctor n our schms s tht our schms o not rqur ny constrnt on th sz of th pulc-ky Howvr, n orr to chv rsonl lvl of scurty n [3], t hs n conjctur tht th chosn must lrgr thn 260 Altogthr, th ffcncy of our schm s comprl to th clsscl RSA systm Th snr ns to prform on xponntton (to th sz of th pulc ky), th rcvr lso ns to prform on xponntton (to th sz of th scrt ky) wth on or two xtr multplctons /or computng hsh functons 8 Concluson W hv prsnt thr nw schms wth scurty proofs Th propos cryptosystm s smntclly scur gnst \chosn cphrtxt ttcks n th str mol, rltv to nw ffcult prolm (th nvrson prolm s quvlnt to RSA n mny css), wth n ncrypton rt 6 tms fstr thn El-Gml (wth smlr scurty lvls: RSA-024 ts vs El-Gml-52 ts) In ths wy, w conclu tht th propos schm s computtonlly lss xpnsv wth comprson to th ERSA schm Hnc our propos schm s mor ffcnt thn tht of th ERSA schm REFERENCES [] M Bllr, P Rogwy, (994) Optml Asymmtrc Encrypton How to Encrypt wth RSA,, Avncs n Cryptology EUROCRYPT 94, Vol 950, LNCS, pp 92- [2] D Blchnchr, (998) Chosn Cphrtxt Attcks Agnst Protocols Bs on th RSA Encrypton Str PKCS-, Avncs n Cryptology CRYPTO 98, Vol 462 LNCS, pp -2 [3] D Bonh, (999) Twnty Yrs of Attcks on th RSA Cryptosystm, Notcs of th Amrcn Mthmtcl Socty, Vol46 (2), pp [4] DBonh, G Durf Y Frnkl, (998) Exposng n RSA prvt ky gvn smll frcton of ts ts Avncs n cryptology- ASIACRYPT' 98, Vol 54, LNCS, pp [5] R Cntt, O Golrch, S Hlv, (998) Th Rom Orcl Mol, Rvst, 30th Symposum on th Thory of Computng (STOC) [6] Csr Alson Montcro Pxo, (2003) An ff cnt vrnt of th RSA cryptosystm, Cryptology Prnt Archv, pp 59 [7] T Collns, D Hopkn, Lngfor S Sn M,(997) Pulc ky cryptogrphc pprtus mtho US ptnt 5 [8] J Coron, D Nccch, Y Dsmt, A Olyzko, JP Strn, (2006) Inx Clculton Attcks on RSA Sgntur Encrypton Dsgn ", Cos Cryptogrphy, Vol 38, pp 4-53 [9] R Crmr V Shoup, (998) A Prctcl Pulc Ky Cryptosystm Provly Scur gnst Aptv Chosn Cphrtxt Attck ", Avncs n Cryptology CRYPTO 98, vol 462, LNCS, pp3-25 4

9 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 [0] I Dmgr, (992) Towrs Prctcl Pulc Ky Systms Scur Agnst Chosn Cphrtxt ttcks ", Avncs n Cryptology CRYPTO 9, Vol 576, LNCS, pp , [] W Dff M Hllmn, (976) Nw Drctons n Cryptogrphy", IEEE Trns On Inform Thory, vol IT-22, pp [2] D Dolv, C Dwork, M Nor, (99) Non-Mlll Cryptogrphy", 23r Annul Symposum on th Thory of Computng (STOC), pp [3] D Pontchvl, (999) "Nw Pulc Ky Cryptosystms Bs on th Dpnnt-RSA Prolm ", Avncs n Cryptology EUROCRYPT 99, Vol 592, LNCS, pp [4] T ElGml, (985) A Pulc Ky Cryptosystm Sgntur Schm Bs on Dscrt Logrthms ", IEEE Trns on Inform Thory, Vol IT-3, pp [5] Y Frnkl M Yung, (995) Cryptnlyss of th Immunz LL Pulc Ky Systms ", Avncs n Cryptology CRYPTO 95, Vol 963, LNCS, pp [6] M J Hnk, (2004) Nw prtl ky xposur ttcks on RSA rvst", Tchncl Rport CACR , Cntr for Appl Cryptogrphc Rsrch, Unvrsty of Wtrloo [7] S Golwssr, S Mcl, (984) Prolstc Encrypton ", Journl of Computr Systm Scncs, Vol 28, pp [8] Hossn Ghoos, (2007) An ffcnt pulc ky cryptosystm scur gnst chosn cphrtxt ttck ",Informton systm scurty, Vol-4332 (LNCS), pp [9] C Lm, P L, (994) Anothr Mtho for Attnng Scurty Agnst Aptvly Chosn Cphrtxt Attcks", Avncs n Cryptology CRYPTO 93, Vol 773, LNCS, pp [20] M Nor, MYung, (990) Pulc-ky Cryptosystms Provly Scur gnst Chosn Cphrtxt Attcks, 22n Annul ACM Symp on Thory of Computng, pp [2] T Okmoto D Pontchvl, (200) RSA-REACT: An Altrntv to RSA-OAEP", Procngs of Scon NESSIE Workshop, Eghm, UK [22] C Rcko_, D Smon, (992) Nonntrctv Zro-knowlg Proof of Knowlg Chosn Cphrtxt Attck ", Avncs n Cryptology CRYPTO 9, vol 576, LNCS, pp [23] R Rvst, A Shmr, L Almn, (978) A Mtho for Otnng Dgtl Sgnturs Pulc- Ky Cryptosystms", Communctons of th ACM, Vol 2, pp [24] V Shoup, R Gnnro, (998) Scurng Thrshol Cryptosystms gnst Chosn Cphrtxt Attck, n Avncs n Cryptology - Procngs of EUROCRYPT98 (K Nyrg, ), V ol 403 of Lctur Nots n Computr Scnc, pp 6 [25] Y Tsouns, M Yung, (998) On th Scurty of ElGml s Encrypton, Procngs of th Frst Intrntonl Workshop on Prctc Thory n Pulc Ky cryptogrphy (PKC 98), V ol 43, LNCS, pp 7-34 [26] Y Zhng, J Srry, (993) Prctcl Approchs to Attnng Scurty gnst Aptv Chosn Cphrtxt Attcks, Avncs n Cryptology CRYPTO 92, Vol 740, LNCS, pp

10 Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 Authors Sushm Prhn rcv th BSc, MSc MPhll gr n Mthmtcs Pt Rv Shnkr Shukl Unvrsty, Rpur, Chttgrh, In n 2002, Sh jon School of Stus n Mthmtcs, Pt Rv Shnkr Shukl Unvrsty, Rpur, In for hr Rsrch work Sh s lf tm mmr of Cryptology Rsrch Socty of In (CRSI) Hr r of ntrst s Pulc Ky Cryptogrphy Intgr fctorzton Prolm Brnr Kumr Shrm Profssor, School of Stus n Mthmtcs, Pt Rvshnkr Shukl Unvrsty Rpur (C G) In H hs n workng for long tm n th fl of Non Lnr Oprtor Thory currntly n Cryptogrphy H hs rsrch scholrs work on mny rnchs of pulc ky cryptogrphy H s lf mmr of Inn Mthmtcl Socty th Rmnujn Mthmtcl Socty 6

An RSA-based (t, n) threshold proxy signature scheme with freewill identities

An RSA-based (t, n) threshold proxy signature scheme with freewill identities Int. J. Informaton an Computr Scurty, Vol. 1, No. 1/2, 27 21 An RSA-bas (t, n) thrshol proxy sgnatur schm wth frwll ntts Ya-Fn Chang Grauat Insttut of Accountng, Natonal Chung Hsng Unvrsty, Tachung 42,

More information

An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem

An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem Informton urnc n Scurt Lttr (00) 09-034 n ID-B Puc K rptotm on Intgr Fctorng n Dou Dcrt Logrthm Prom hnrhkhr Mhrm Shm Sunr grw Dprtmnt of pp Mthmtc Shr Shnkrchr Engnrng og Junwn Bh (G) In Em: c_mhrm@rffmcom

More information

Authenticated Encryption. Jeremy, Paul, Ken, and Mike

Authenticated Encryption. Jeremy, Paul, Ken, and Mike uthntcatd Encrypton Jrmy Paul Kn and M Objctvs Examn thr mthods of authntcatd ncrypton and dtrmn th bst soluton consdrng prformanc and scurty Basc Componnts Mssag uthntcaton Cod + Symmtrc Encrypton Both

More information

Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack

Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack Intrntonl Journl of ppld Oprtonl Rsrch Vol 1, No 1, pp 7-17, Summr 011 Journl hompg: wwworlur Constrnd Rnwl Rsourc llocton n Fuzzy Mtgrphs v Mn- Slck S S Hshmn* Rcvd: Jnury 31, 011 ; ccptd: My 1, 011 strct

More information

Change Your History How Can Soccer Knowledge Improve Your Business Processes?

Change Your History How Can Soccer Knowledge Improve Your Business Processes? Symposium Inuurl Lctur o Hjo Rijrs, VU, 26-6-2015 Chn Your History How Cn Soccr Knowl Improv Your Businss Procsss? Wil vn r Alst TU/ n DSC/ 1970 born Oostrbk 1988-1992 CS TU/ 1992-1994 TS TU/ 1994-1996

More information

Managing Multiple Outsourcing: Service Quality and Volume Issues

Managing Multiple Outsourcing: Service Quality and Volume Issues Prodngs of th 4 Intrntonl Confrn on Industrl Engnrng nd Oprtons Mngmnt l Indons Jnury 7 9 4 Mngng Multpl Outsourng: Srv ulty nd Volum Issus Smr K Mukhopdhyy SungKyunKwn Unvrsty GS Jongnogu Soul Kor -745

More information

DYNAMIC MODEL BASED PREDICTIVE CONTROL FOR MOBILE ROBOTS

DYNAMIC MODEL BASED PREDICTIVE CONTROL FOR MOBILE ROBOTS XII Rnón rjo n Procsmnto l Informcón y Control, 6 l 8 octr 27 DYNAMIC MODEL BASED PREDICIVE CONROL FOR MOBILE ROBOS Anrés Rosls, Mgl Pñ, Gstvo Scgl, Vcnt Mt, Frnno Scsco Insttto Atomátc (INAU. Unvrs Nconl

More information

Reading. Minimum Spanning Trees. Outline. A File Sharing Problem. A Kevin Bacon Problem. Spanning Trees. Section 9.6

Reading. Minimum Spanning Trees. Outline. A File Sharing Problem. A Kevin Bacon Problem. Spanning Trees. Section 9.6 Rin Stion 9.6 Minimum Spnnin Trs Outlin Minimum Spnnin Trs Prim s Alorithm Kruskl s Alorithm Extr:Distriut Shortst-Pth Alorithms A Fil Shrin Prolm Sy unh o usrs wnt to istriut il monst thmslvs. Btwn h

More information

Operation Transform Formulae for the Generalized. Half Canonical Sine Transform

Operation Transform Formulae for the Generalized. Half Canonical Sine Transform Appl Mhmcl Scnc Vol 7 3 no 33-4 HIKARI L wwwm-hrcom Opron rnorm ormul or h nrl Hl Cnoncl Sn rnorm A S uh # n A V Joh * # ov Vrh Inu o Scnc n Humn Amrv M S In * Shnrll Khnlwl Coll Aol - 444 M S In luh@mlcom

More information

Last time Interprocedural analysis Dimensions of precision (flow- and context-sensitivity) Flow-Sensitive Pointer Analysis

Last time Interprocedural analysis Dimensions of precision (flow- and context-sensitivity) Flow-Sensitive Pointer Analysis Flow-Insnsitiv Pointr Anlysis Lst tim Intrprocurl nlysis Dimnsions of prcision (flow- n contxt-snsitivity) Flow-Snsitiv Pointr Anlysis Toy Flow-Insnsitiv Pointr Anlysis CIS 570 Lctur 12 Flow-Insnsitiv

More information

Uses for Binary Trees -- Binary Search Trees

Uses for Binary Trees -- Binary Search Trees CS122 Algorithms n Dt Struturs MW 11:00 m 12:15 pm, MSEC 101 Instrutor: Xio Qin Ltur 10: Binry Srh Trs n Binry Exprssion Trs Uss or Binry Trs Binry Srh Trs n Us or storing n rtriving inormtion n Insrt,

More information

Applying the actuarial control cycle in private health insurance

Applying the actuarial control cycle in private health insurance Applyng th cturl control cycl n prvt hlth nsurnc Bn Oo FIAA Prsntd to th Insttut o Acturs o Austrl 2005 Bnnl Convnton 8 My 11 My 2005 Ths ppr hs bn prprd or th Insttut o Acturs o Austrl s (Insttut) Bnnl

More information

Online Load Balancing and Correlated Randomness

Online Load Balancing and Correlated Randomness Onln Load Balancng and Corrlatd Randomnss Sharayu Moharr, Sujay Sanghav Wrlss Ntworng and Communcatons Group (WNCG) Dpartmnt of Elctrcal & Computr Engnrng Th Unvrsty of Txas at Austn Austn, TX 787, USA

More information

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS?

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS? WHAT HAPPES WHE YOU MIX COMPLEX UMBERS WITH PRIME UMBERS? There s n ol syng, you n t pples n ornges. Mthemtns hte n t; they love to throw pples n ornges nto foo proessor n see wht hppens. Sometmes they

More information

CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES The CVF method

CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES The CVF method CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES Th CVF mthod Fbrc Chrstn 1, Konrd Kujkn 1,, Dtrch Bd 3, Cyrl Cvdor 4, Sbstn Drs 3, Olf Iwrt 3. 1 Kptyn Astronomcl

More information

Sun Synchronous Orbits for the Earth Solar Power Satellite System

Sun Synchronous Orbits for the Earth Solar Power Satellite System Sun Synchrnus Orbts fr th Earth Sar Pwr Satt Systm Sm f th mst prmsng rbts fr th Earth Sar Pwr Systm ar crcuar Sun synchrnus rbts whch nvr ntr Earth's shaw. In ths rbts, gravty grant stabz "pwr twrs" w

More information

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems. Distributed File Systems. Example: NFS Architecture

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems. Distributed File Systems. Example: NFS Architecture Distriut Systms Prinipls n Prigms Mrtn vn Stn VU mstrm, Dpt. Computr Sin stn@s.vu.nl Chptr 11: Vrsion: Dmr 10, 2012 1 / 14 Gnrl gol Try to mk fil systm trnsprntly vill to rmot lints. 1. Fil mov to lint

More information

Outline. Binary Tree

Outline. Binary Tree Outlin Similrity Srh Th Nikolus Augstn Fr Univrsity of Bozn-Bolzno Fulty of Computr Sin DIS 1 Binry Rprsnttion of Tr Binry Brnhs Lowr Boun for th Eit Distn Unit 10 My 17, 2012 Nikolus Augstn (DIS) Similrity

More information

m e d i a Online ONLINE MARKETPLACE MARKETS PLACEMENTS TYPES OF SITES

m e d i a Online ONLINE MARKETPLACE MARKETS PLACEMENTS TYPES OF SITES Onln ONLINE MARKETPLACE PWC forcst ntrnt vrtsng to grow t n vrg rt of $12% to rch $4.7 bllon n 2016. Srch n rctors tk th lon shr, wth 53% of ntrnt spn, gnrl sply s 24% n clssfs 23%. MARKETS Wbsts r ntonl

More information

Hermes: Dynamic Partitioning for Distributed Social Network Graph Databases

Hermes: Dynamic Partitioning for Distributed Social Network Graph Databases Hrms: Dynm Prttonn or Dstrut Sol Ntwork Grph Dtss Dnl Nor Unvrsty o Wtrloo nl.nor@ml.om Shhn Kml Unvrsty o Wtrloo s3kml@uwtrloo. Khuzm Duj Unvrsty o Wtrloo kuj@uwtrloo. L Chn HKUST lhn@s.ust.hk ABSTRACT

More information

DYNAMIC PROGRAMMING APPROACH TO TESTING RESOURCE ALLOCATION PROBLEM FOR MODULAR SOFTWARE

DYNAMIC PROGRAMMING APPROACH TO TESTING RESOURCE ALLOCATION PROBLEM FOR MODULAR SOFTWARE DYAMIC PROGRAMMIG APPROACH TO TESTIG RESOURCE ALLOCATIO PROBLEM FOR MODULAR SOFTWARE P.K. Kpur P.C. Jh A.K. Brdh Astrct Tstg phs of softwr gs wth modul tstg. Durg ths prod moduls r tstd dpdtly to rmov

More information

Term Structure of Interest Rates: The Theories

Term Structure of Interest Rates: The Theories Handou 03 Econ 333 Abdul Munasb Trm Srucur of Inrs Ras: Th Thors Trm Srucur Facs Lookng a Fgur, w obsrv wo rm srucur facs Fac : Inrs ras for dffrn maurs nd o mov oghr ovr m Fac : Ylds on shor-rm bond mor

More information

Lecture 20: Emitter Follower and Differential Amplifiers

Lecture 20: Emitter Follower and Differential Amplifiers Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.

More information

5.4 Exponential Functions: Differentiation and Integration TOOTLIFTST:

5.4 Exponential Functions: Differentiation and Integration TOOTLIFTST: .4 Eponntial Functions: Diffrntiation an Intgration TOOTLIFTST: Eponntial functions ar of th form f ( ) Ab. W will, in this sction, look at a spcific typ of ponntial function whr th bas, b, is.78.... This

More information

Chapter 3 Chemical Equations and Stoichiometry

Chapter 3 Chemical Equations and Stoichiometry Chptr Chmicl Equtions nd Stoichiomtry Homwork (This is VERY importnt chptr) Chptr 27, 29, 1, 9, 5, 7, 9, 55, 57, 65, 71, 75, 77, 81, 87, 91, 95, 99, 101, 111, 117, 121 1 2 Introduction Up until now w hv

More information

Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks

Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks Algorithmi Aspts o Ass Ntworks Dsign in BG/G Cllulr Ntworks Dvi Amzllg, Josph (Si) Nor,DnnyRz Computr Sin Dprtmnt Thnion, Hi 000, Isrl {mzllg,nny}@s.thnion..il Mirosot Rsrh On Mirosot Wy, Rmon, WA 980

More information

Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution

Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution Mnnum Vrtx Covr n Gnralzd Random Graphs wth Powr Law Dgr Dstrbuton André L Vgnatt a, Murlo V G da Slva b a DINF Fdral Unvrsty of Paraná Curtba, Brazl b DAINF Fdral Unvrsty of Tchnology - Paraná Curtba,

More information

Modern Portfolio Theory (MPT) Statistics

Modern Portfolio Theory (MPT) Statistics Modrn Portfolo Thory (MPT) Statstcs Mornngstar Mthodology Papr Novmr 30, 007 007 Mornngstar, Inc. All rghts rsrvd. Th nformaton n ths documnt s th proprty of Mornngstar, Inc. Rproducton or transcrpton

More information

Schedule C. Notice in terms of Rule 5(10) of the Capital Gains Rules, 1993

Schedule C. Notice in terms of Rule 5(10) of the Capital Gains Rules, 1993 (Rul 5(10)) Shul C Noti in trms o Rul 5(10) o th Cpitl Gins Ruls, 1993 Sttmnt to sumitt y trnsror o shrs whr thr is trnsr o ontrolling intrst Prt 1 - Dtils o Trnsror Nm Arss ROC No (ompnis only) Inom Tx

More information

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book. Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

DATA MANAGEMENT POLICY

DATA MANAGEMENT POLICY Dt Mngmnt Poly Etv: 2 Mrh 2011. R-ssu: 1 Sptmr 2011 DATA MANAGEMENT POLICY IMPORTANT NOTICE Durng th Am Yr 2011-2012, th Unvrsty wll rvsng ts ntrnl struturs whh, mongst othr thngs, my rsult n th rplmnt

More information

A New Efficient Distributed Load Balancing Algorithm for OTIS-Star Networks

A New Efficient Distributed Load Balancing Algorithm for OTIS-Star Networks Int'l Con. Pr. n Dst. Pro. T. n Appl. PDPTA' A Nw Ent Dstrut Lo Blnn Alortm or OTIS-Str Ntwors A. Aww 1, J. Al-S 1 Dprtmnt o CS, Unvrsty o Ptr, Ammn, Jorn Dprtmnt o ITC, Ar Opn Unvrsty, Ammn, Jorn Astrt

More information

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA 2009 Intrnatonal Confrnc on Advancd Informaton Ntworkng and Applcatons Rlablty-Drvn Rputaton Basd Schdulng for Publc-Rsourc Computng Usng GA Xaofng Wang #, Ch Shn Yo*, Rakumar Buyya* 2, Jnshu Su # 2 #Collg

More information

(404) 525-1085 (404) 418-6179

(404) 525-1085 (404) 418-6179 M d c L o R oru : E n ur ngv uf org or g H t hc r Con um r I ubr f S pt mb r2011 Pr p r dbyg or g W t c h ndg or g nf orh t hyf ut ur Mdc Lo Rto: Enurng Vu for Gorg Hth Cr Conumr w wrttn by: Hoy Lng Cndy

More information

Reputation Management for DHT-based Collaborative Environments *

Reputation Management for DHT-based Collaborative Environments * Rputaton Managmnt for DHT-basd Collaboratv Envronmnts * Natalya Fdotova, Luca Vltr Unvrsty of Parma, Italy Abstract Ths artcl addrsss a problm of ntgraton of rputaton managmnt mchansms and lookup procsss

More information

Quality and Pricing for Outsourcing Service: Optimal Contract Design

Quality and Pricing for Outsourcing Service: Optimal Contract Design Qulity nd Pricing for Outsourcing Srvic: Optiml Contrct Dsign Smr K. Mukhopdhyy Univrsity of Wisconsin-Milwuk Co-uthor: Xiowi Zhu, Wst Chstr Univrsity of PA Third nnul confrnc, POMS Collg of Srvic Oprtions

More information

Recall from Last Time: Disjoint Set ADT

Recall from Last Time: Disjoint Set ADT Ltur 21: Unon n Fn twn Up-Trs Toy s An: Plntn n rown orst o Up-Trs Unon-n n Fn-n Extn xmpl Implmntn Unon/Fn Smrt Unon n Fn Unon-y-sz/t n Pt Comprsson Run Tm Anlyss s tou s t ts! Covr n Cptr 8 o t txtook

More information

Oracle PL/SQL Programming Advanced

Oracle PL/SQL Programming Advanced Orl PL/SQL Progrmming Avn In orr to lrn whih qustions hv n nswr orrtly: 1. Print ths pgs. 2. Answr th qustions. 3. Sn this ssssmnt with th nswrs vi:. FAX to (212) 967-3498. Or. Mil th nswrs to th following

More information

Higher. Exponentials and Logarithms 160

Higher. Exponentials and Logarithms 160 hsn uknt Highr Mthmtics UNIT UTCME Eponntils nd Logrithms Contnts Eponntils nd Logrithms 6 Eponntils 6 Logrithms 6 Lws of Logrithms 6 Eponntils nd Logrithms to th Bs 65 5 Eponntil nd Logrithmic Equtions

More information

Boolean Algebra. ECE 152A Winter 2012

Boolean Algebra. ECE 152A Winter 2012 Boolen Algebr ECE 52A Wnter 22 Redng Assgnent Brown nd Vrnesc 2 Introducton to Logc Crcuts 2.5 Boolen Algebr 2.5. The Venn Dgr 2.5.2 Notton nd Ternology 2.5.3 Precedence of Opertons 2.6 Synthess Usng AND,

More information

AC Circuits Three-Phase Circuits

AC Circuits Three-Phase Circuits AC Circuits Thr-Phs Circuits Contnts Wht is Thr-Phs Circuit? Blnc Thr-Phs oltgs Blnc Thr-Phs Connction Powr in Blncd Systm Unblncd Thr-Phs Systms Aliction Rsidntil Wiring Sinusoidl voltg sourcs A siml

More information

tis, cis cunc - cunc - tis, cis tis, cis cunc - tis, func - def - def - tis, U func - def - func - tis, pa - tri pa - tri pa - tri tu - per - tu -

tis, cis cunc - cunc - tis, cis tis, cis cunc - tis, func - def - def - tis, U func - def - func - tis, pa - tri pa - tri pa - tri tu - per - tu - 1 B Ihsu dulcs cuncts [Supr 1] [Supr 2] Tnr B B B B - B - B - Ih - Ih - Ih - su su su cs cs cs cunc - cunc - cunc - Amns, Bblthèqu Cntl L Agn, ms 162 D, ff 2v-10 ts, ts, ts, E-tr - E-tr - E-tr - n p n

More information

ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND

ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND 8 th Intrnatonal Confrnc of Modlng and Smulaton - MOSIM - May -2, 2 - Hammamt - Tunsa Evaluaton and optmzaton of nnovatv producton systms of goods and srvcs ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS

More information

December Homework- Week 1

December Homework- Week 1 Dcmbr Hmwrk- Wk 1 Mth Cmmn Cr Stndrds: K.CC.A.1 - Cunt t 100 by ns nd by tns. K.CC.A.2 - Cunt frwrd bginning frm givn numbr within th knwn squnc (instd f hving t bgin t 1). K.CC.B.4.A - Whn cunting bjcts,

More information

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13) con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc

More information

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957

More information

Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission

Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission Enhning Downlink Prormn in Wirlss Ntworks y Simultnous Multipl Pkt Trnsmission Zhngho Zhng n Yunyun Yng Dprtmnt o Eltril n Computr Enginring, Stt Univrsity o Nw York, Stony Brook, NY 11794, USA Astrt In

More information

A simple algorithm to generate the minimal separators and the maximal cliques of a chordal graph

A simple algorithm to generate the minimal separators and the maximal cliques of a chordal graph A smpl lgortm to gnrt t mnml sprtors nd t mxml lqus o ordl grp Ann Brry 1 Romn Pogorlnk 1 Rsr Rport LMOS/RR-10-04 Fbrury 11, 20 1 LMOS UMR CNRS 6158, Ensmbl Sntqu ds Cézux, F-63 173 Aubèr, Frn, brry@sm.r

More information

Revised Conditions (January 2009) LLOYDS BANKING GROUP SHARE ISA CONDITIONS

Revised Conditions (January 2009) LLOYDS BANKING GROUP SHARE ISA CONDITIONS Rvis Conitions (Jnury 2009) LLOYDS BANKING GROUP SHARE ISA CONDITIONS Contnts 1 Who r th prtis?... 2 Wht o wors n phrss in ol typ mn?... 3 Whn i my pln strt?... 4 How o I invst in my pln?... 5 Who owns

More information

Protecting E-Commerce Systems From Online Fraud

Protecting E-Commerce Systems From Online Fraud Protctng E-Commrc Systms From Onln Fraud Frst Author P.PhanAlkhya Studnt, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng & Tchnology, ongol, Andhra Pradsh, Inda. Scond Author Sk.Mahaboob Basha

More information

Important result on the first passage time and its integral functional for a certain diffusion process

Important result on the first passage time and its integral functional for a certain diffusion process Lcturs Mtmátics Volumn 22 (21), págins 5 9 Importnt rsult on th first pssg tim nd its intgrl functionl for crtin diffusion procss Yousf AL-Zlzlh nd Bsl M. AL-Eidh Kuwit Univrsity, Kuwit Abstrct. In this

More information

Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration

Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration Procdns of th 43rd Hawa Intrnatonal Confrnc on Systm Scncs - 2010 Manan th Outsourcn of Two-Lvl Srvc Procsss: Ltratur Rvw and Intraton Edal Pnkr Unvrsty of Rochstr pnkr@smon.rochstr.du Robrt Shumsky Dartmouth

More information

Magic Message Maker Amaze your customers with this Gift of Caring communication piece

Magic Message Maker Amaze your customers with this Gift of Caring communication piece Magic Mssag Makr maz your customrs with this Gift of aring communication pic Girls larn th powr and impact of crativ markting with this attntion grabbing communication pic that will hlp thm o a World of

More information

Transistor is a semiconductor device with fast respond and accuracy. There are two types

Transistor is a semiconductor device with fast respond and accuracy. There are two types Tranitor Amplifir Prpard y: Poa Xuan Yap Thory: Tranitor i a miondutor dvi with fat rpond and auray. Thr ar two typ of tranitor, a Bipolar Juntion Tranitor and a Fild Efft Tranitor. Hr, w will looking

More information

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions CPS 22 Thory of Computation REGULAR LANGUAGES Rgular xprssions Lik mathmatical xprssion (5+3) * 4. Rgular xprssion ar built using rgular oprations. (By th way, rgular xprssions show up in various languags:

More information

Fundamentals of Tensor Analysis

Fundamentals of Tensor Analysis MCEN 503/ASEN 50 Chptr Fundmntls of Tnsor Anlysis Fll, 006 Fundmntls of Tnsor Anlysis Concpts of Sclr, Vctor, nd Tnsor Sclr α Vctor A physicl quntity tht cn compltly dscrid y rl numr. Exmpl: Tmprtur; Mss;

More information

Advantageous Selection versus Adverse Selection in Life Insurance Market

Advantageous Selection versus Adverse Selection in Life Insurance Market Covr Pag Advantagous Slcton vrsus Advrs Slcton n f Insuranc Markt Ghadr Mahdav mahdav@conomcs.mbo.mda.kyoto-u.ac.j Post Doctoral Rsarch Assocat: Jaan Socty for th Promoton of Scnc JSPS, Graduat School

More information

QUANTITATIVE METHODS CLASSES WEEK SEVEN

QUANTITATIVE METHODS CLASSES WEEK SEVEN QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.

More information

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim

More information

Part 2 - Notes on how to complete your application form

Part 2 - Notes on how to complete your application form Tuton F Loan applcaton nots for nw part-tm studnts 2012/13 About ths nots Ths nots should b rad along wth your Tuton F Loan applcaton form. Th nots ar splt nto thr parts: Part 1 - Gnral nformaton Part

More information

11 + Non-verbal Reasoning

11 + Non-verbal Reasoning Prti Tst + Non-vrl Rsoning R th instrutions rfully. Do not gin th tst or opn th ooklt until tol to o so. Work s quikly n s rfully s you n. Cirl th orrt lttr from th options givn to nswr h qustion. You

More information

Predicting Current User Intent with Contextual Markov Models

Predicting Current User Intent with Contextual Markov Models Priting Currnt Usr Intnt with Contxtul Mrkov Mols Juli Kislv, Hong Thnh Lm, Mykol Phnizkiy Dprtmnt of Computr Sin Einhovn Univrsity of Thnology P.O. Box 513, NL-5600MB, th Nthrlns {t.l.hong, j.kislv, m.phnizkiy}@tu.nl

More information

Link-Disjoint Paths for Reliable QoS Routing

Link-Disjoint Paths for Reliable QoS Routing Link-Disjoint Pths or Rlil QoS Routing Yuhun Guo, Frnno Kuiprs n Pit Vn Mighm # Shool o Eltril n Inormtion Enginring, Northrn Jiotong Univrsity, Bijing, 000, P.R. Chin Fulty o Inormtion Thnology n Systms,

More information

MANAGEMENT OF INFORMATION SECURITY AND FORENSICS

MANAGEMENT OF INFORMATION SECURITY AND FORENSICS MANAGEMENT OF INFORMATION SECURITY AND FORENSICS CS 307 Ctlog Dsription PREREQUISITE: CS 0. Stuy of informtion surity n igitl fornsis using prtil s stuis. Emphsis is on vloping surity poliis, surity mngmnt

More information

Section 3: Logistic Regression

Section 3: Logistic Regression Scton 3: Logstc Rgrsson As our motvaton for logstc rgrsson, w wll consdr th Challngr dsastr, th sx of turtls, collg math placmnt, crdt card scorng, and markt sgmntaton. Th Challngr Dsastr On January 28,

More information

ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS

ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS IFORTIO D OUITIO TEHOLOGIES D SERVIES, VOL. 9, O., RH 2 7 ERLG FORUL D ITS USE I THE LL ETERS Er HROY., Tbor ISUTH., atj KVKY. Dpartmnt of Tlcommuncatons, Faculty of Elctrcal Engnrng and Informaton Tchnology,

More information

PROXIMITY OPERATIONS OF ON-ORBIT SERVICING SPACECRAFT USING AN ECCENTRICITY/INCLINATION VECTOR SEPARATION

PROXIMITY OPERATIONS OF ON-ORBIT SERVICING SPACECRAFT USING AN ECCENTRICITY/INCLINATION VECTOR SEPARATION PROXMY OPERAONS O ON-ORB SERVCNG SPACECRA USNG AN ECCENRCYNCLNAON VECOR SEPARAON J. Sprmnn 1, S. D Amco 1 DLR, Grmn Spc Oprtons Cntr, 83 Wsslng, jorn.sprmnn@dlr.d DLR, Grmn Spc Oprtons Cntr, 83 Wsslng,

More information

Operational Procedure: ACNC Data Breach Response Plan

Operational Procedure: ACNC Data Breach Response Plan OP 2015/03 Oprtionl Prour: ACNC Dt Brh Rspons Pln This Oprtionl Prour is issu unr th uthority of th Assistnt Commissionr Gnrl Counsl n shoul r togthr with th ACNC Poliy Frmwork, whih sts out th sop, ontxt

More information

SAN JOSE UNIFIED RETURNING VOLUNTEER DRIVER PACKET

SAN JOSE UNIFIED RETURNING VOLUNTEER DRIVER PACKET SAN JOSE UNIFIED ETUNING VOLUNTEE DIVE PACKET VOLUNTEE DIVE S NAME: STUDENT NAME /ID# SCHOOL: SPOT/ACTIVITY: STUDENT NAME /ID# SCHOOL: SPOT/ACTIVITY: STUDENT NAME /ID# SCHOOL: SPOT/ACTIVITY: STUDENT NAME

More information

Positive Integral Operators With Analytic Kernels

Positive Integral Operators With Analytic Kernels Çnky Ünverte Fen-Edeyt Fkülte, Journl of Art nd Scence Sy : 6 / Arl k 006 Potve ntegrl Opertor Wth Anlytc Kernel Cn Murt D KMEN Atrct n th pper we contruct exmple of potve defnte ntegrl kernel whch re

More information

MPLS FOR MISSION-CRITICAL MICROWAVE NETWORKS BUILDING A HIGHLY RESILIENT MICROWAVE NETWORK WITH MULTI-RING TOPOLOGY

MPLS FOR MISSION-CRITICAL MICROWAVE NETWORKS BUILDING A HIGHLY RESILIENT MICROWAVE NETWORK WITH MULTI-RING TOPOLOGY MPLS FOR MISSION-CRITICAL MICROWAVE NETWORKS BUILDING A HIGHLY RESILIENT MICROWAVE NETWORK WITH MULTI-RING TOPOLOGY TECHNICAL WHITE PAPER H rslny n srv vllty r ky sn onsrtons wn uln msson-rtl mrowv ntworks.

More information

Network Decoupling for Secure Communications in Wireless Sensor Networks

Network Decoupling for Secure Communications in Wireless Sensor Networks Ntwork Doupling for Sur Communitions in Wirlss Snsor Ntworks Wnjun Gu, Xiol Bi, Srirm Chllppn n Dong Xun Dprtmnt of Computr Sin n Enginring Th Ohio-Stt Univrsity, Columus, Ohio 43210 1277 Emil: gu, ixi,

More information

Level 3. Monday FRACTIONS ⅔ ⅗ 2) ⅔ =?/18. 1) What is a) ⅕ of 30? b) ⅖ of 30?

Level 3. Monday FRACTIONS ⅔ ⅗ 2) ⅔ =?/18. 1) What is a) ⅕ of 30? b) ⅖ of 30? 2014 Th Wkly Pln. All rights rsrv. Mony 2) ⅔ =?/18 1) Wht is ) ⅕ o 30? ) ⅖ o 30? 4) Us or = to show th rltionship twn th ollowing rtions: 3) Writ n quivlnt rtion or ½ ⅔ ⅗ 5) Brook pik ouqut o 24 lowrs.

More information

Personalized Web Search by User Interest Hierarchy

Personalized Web Search by User Interest Hierarchy Prsonalzd Wb arch by Usr Intrst Hrarchy Abstract Most of th wb sarch ngns ar dsgnd to srv all usrs, ndpndnt of th nds of any ndvdual usr. Prsonalzaton of wb sarch s to carry out rtrval for ach usr ncorporatng

More information

Traffic Information Estimation Methods Based on Cellular Network Data

Traffic Information Estimation Methods Based on Cellular Network Data TOPCO 崇 越 論 文 大 賞 論 文 題 目 ( 以 中 文 繕 寫 論 文 者 請 用 中 文 題 目 英 文 繕 寫 者 請 用 英 文 ): Traffc Informaton Estmaton Mthods Basd on Cuar Ntwork Data 報 名 編 號 : AI002 基 於 蜂 巢 網 路 資 料 之 交 通 資 訊 估 計 方 法 摘 要 近 年 來 隨 著 經

More information

Adverse Selection and Moral Hazard in a Model With 2 States of the World

Adverse Selection and Moral Hazard in a Model With 2 States of the World Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,

More information

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian

More information

CPU. Rasterization. Per Vertex Operations & Primitive Assembly. Polynomial Evaluator. Frame Buffer. Per Fragment. Display List.

CPU. Rasterization. Per Vertex Operations & Primitive Assembly. Polynomial Evaluator. Frame Buffer. Per Fragment. Display List. Elmntary Rndring Elmntary rastr algorithms for fast rndring Gomtric Primitivs Lin procssing Polygon procssing Managing OpnGL Stat OpnGL uffrs OpnGL Gomtric Primitivs ll gomtric primitivs ar spcifid by

More information

Taiwan Stock Forecasting with the Genetic Programming

Taiwan Stock Forecasting with the Genetic Programming Procings of th 2011 Confrnc on Tchnologis an Applications of Artificial Intllignc (TAAI 2011) Taiwan Stock Forcasting with th Gntic Programming Siao-Ming Jhou, Chang-Biau Yang an Hung-Hsin Chn Dpartmnt

More information

EuroFGI Workshop on IP QoS and Traffic Control TITOLO. A Receiver Side Approach for Real-Time Monitoring of IP Performance Metrics

EuroFGI Workshop on IP QoS and Traffic Control TITOLO. A Receiver Side Approach for Real-Time Monitoring of IP Performance Metrics EuroFGI Workhop on IP QoS n Trff Conrol TITOLO A Rvr S Approh for Rl-T Monorng of IP Prforn Mr TESI R. G. Grroppo, S. Gorno, F. Oppno, G. Pro Dp. of Inforon Engnrng Unvry of P 1 Lbon, Porugl, Dbr 6-7,

More information

Continuity Cloud Virtual Firewall Guide

Continuity Cloud Virtual Firewall Guide Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY

More information

Logo Design/Development 1-on-1

Logo Design/Development 1-on-1 Logo Dsign/Dvlopmnt 1-on-1 If your company is looking to mak an imprssion and grow in th marktplac, you ll nd a logo. Fortunatly, a good graphic dsignr can crat on for you. Whil th pric tags for thos famous

More information

Usability Test Checklist

Usability Test Checklist Crtifi Profssionl for Usility n Usr Exprin Usility Tsting (CPUX-UT) Vrsion.0, Jun 0 Pulishr: UXQB. V. Contt: info@uxq.org www.uxq.org Autorn: R. Molih, T. Gis, B. Rumml, O. Klug, K. Polkhn Contnt Lgn...

More information

Outside Cut 1 of fabric Cut 1 of interfacing

Outside Cut 1 of fabric Cut 1 of interfacing a a Outsi Cut o abric Cut o intracing a a b b Outsi Cut o abric Cut o intracing Placmnt lin or Mony Pockts Dix Not: F. Cut Fol b. Pin t /8 in 5. Nx bottom pics sw th 6. For t Prss, 7. Lay togth on th 8.

More information

GIBBS ENSEMBLE AND SOCKETON ESSENTIAL COMPONENTS FOR CREATING CLOUD COMPUTING

GIBBS ENSEMBLE AND SOCKETON ESSENTIAL COMPONENTS FOR CREATING CLOUD COMPUTING Intrnatonal Journal on Cloud Computng: Srvcs and Archtctur (IJCCSA),Vol.3, o.3, Jun 013 GIBBS SMBL AD SOCKTO SSTIAL COMPOTS FOR CRATIG CLOUD COMPUTIG I ITRT SYSTM Xaoquan Gao Rchrch t Dévloppmnt Drcton

More information

The influence of advertising on the purchase of pharmaceutical products

The influence of advertising on the purchase of pharmaceutical products Th nflunc of advrtsng on th purchas of pharmacutcal products Jana VALEČKOVÁ, VŠB-TU Ostrava Abstract Th sz of th pharmacutcal markt and pharmacutcal sals s ncrasng constantly. Th markt s floodd wth nw

More information

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

Data Encryption and Decryption Using RSA Algorithm in a Network Environment IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics

More information

Pain-Free Injections

Pain-Free Injections T N S Bk P-F Ij I P Bk DV Dv Iv D D - I 8 8 9 1 D v C U C Y N D j I W U v v I k I W j k T k z D M I v 965 1 M Tk C P 1 2 v T I C G v j V T D v v A I W S DD G v v S D @ v DV M I USA! j DV - v - j I v v

More information

Irregular Repeat Accumulate Codes 1

Irregular Repeat Accumulate Codes 1 Irregulr epet Accumulte Codes 1 Hu Jn, Amod Khndekr, nd obert McElece Deprtment of Electrcl Engneerng, Clforn Insttute of Technology Psden, CA 9115 USA E-ml: {hu, mod, rjm}@systems.cltech.edu Abstrct:

More information

Optimal Pricing Scheme for Information Services

Optimal Pricing Scheme for Information Services Optml rcng Scheme for Informton Servces Shn-y Wu Opertons nd Informton Mngement The Whrton School Unversty of ennsylvn E-ml: shnwu@whrton.upenn.edu e-yu (Shron) Chen Grdute School of Industrl Admnstrton

More information

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN 077-358 IJTPE Journal www.iotp.com ijtp@iotp.com Sptmbr 015 Issu 4 Volum 7

More information

Discovering Petri Nets From Event Logs

Discovering Petri Nets From Event Logs Disovring Ptri Nts From Evnt Logs W.M.P. vn r Alst n B.F. vn Dongn Dprtmnt of Mthmtis n Computr Sin, Thnish Univrsitit Einhovn, Th Nthrlns. {W.M.P.v..Alst,B.F.v.Dongn}@tu.nl Astrt. As informtion systms

More information

C H A P T E R 1 Writing Reports with SAS

C H A P T E R 1 Writing Reports with SAS C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd

More information

VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP. 122-155

VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP. 122-155 Ensayos sobr POÍTICA ECONÓMICA PENSION FUND MANAGERS AND THE STRUCTURE OF THE FOREIGN EXCHANGE MARKET HERNANDO VARGAS YANNETH ROCÍO BETANCOURT ENSAYOS SOBRE POÍTICA ECONÓMICA, VO. 25, NÚM. 54, EDICIÓN

More information

Standard Conditions for Street Traders The Royal Borough of Kensington and Chelsea. Revised standard conditions for street trading

Standard Conditions for Street Traders The Royal Borough of Kensington and Chelsea. Revised standard conditions for street trading Stnr Conitions or Strt Trrs Th Royl Borough o Knsington n Chls Rvis stnr onitions or strt tring Th Royl Borough o Knsington n Chls strt tring linss stnr onitions 2006 1 Dinitions Th ollowing xprssions

More information

Vector Geometry for Computer Graphics

Vector Geometry for Computer Graphics Vector Geometry for Computer Grphcs Bo Getz Jnury, 7 Contents Prt I: Bsc Defntons Coordnte Systems... Ponts nd Vectors Mtrces nd Determnnts.. 4 Prt II: Opertons Vector ddton nd sclr multplcton... 5 The

More information

Form: Parental Consent for Blood Donation

Form: Parental Consent for Blood Donation A R C Wt, C 20006 Ptl Ct f B i Ifi T f t y t ll f i y tl t q y t l A R C ly. Pl ll 1-800-RE-CROSS (1-800-733-2767) v. if y v q r t t i I iv t f yr,, t, y v t t: 1. Y y t t l i ly, 2. Y y t t t l i ( k

More information

One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks

One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks On Ring to Rul thm All: Srvi Disovry n Bining in Strutur Pr-to-Pr Ovrly Ntworks Migul Cstro Mirosot Rsrh, J J Thomson Clos, Cmrig, CB 0FB, UK. mstro@mirosot.om Ptr Drushl Ri Univrsity, 100 Min Strt, MS-1,

More information