A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes
|
|
- Shonda Cobb
- 7 years ago
- Views:
Transcription
1 Journal of Computer Scence 7 (5): , 2011 ISSN Scence Publcatons A Novel Enhancement Technque of the Hll Cpher for Effectve Cryptographc Purposes 1 A.F.A. Abdn, 1 O.Y. Chuan and 2 M.R.K. Arffn 1 Department of Computer Scence, Faculty of Informatcs, Unversty Sultan Zanal Abdn, Kuala Terengganu, Terengganu, Malaysa 2 Insttute for Mathematcal Research, Unversty Putra Malaysa, UPM Serdang, Selangor, Malaysa Abstract: Problem statement: The Hll cpher s the frst polygraph cpher whch has a few advantages n data encrypton. However, t s vulnerable to known plantext attack. Besdes, an nvertble key matrx s needed for decrypton. It may become problematc snce an nvertble key matrx does not always exst. Approach: In ths study, a robust Hll algorthm (Hll++) has been proposed. The algorthm s an extenson of Affne Hll cpher. A random matrx key, RMK s ntroduced as an extra key for encrypton. An algorthm proposed for nvolutory key matrx generaton s also mplemented n the proposed algorthm. Results: A comparatve study has been made between the proposed algorthm and the exstng algorthms. The encrypton qualty of the proposed algorthm s also measured by usng the maxmum devaton factor and correlaton coeffcent factor. Concluson/Recommendatons: The proposed algorthm ntroduced a random matrx key whch s computed based on the prevous cphertext blocks and a multplyng factor. A modfed of Hll Cpher s free from the all-zero plantext blocks vulnerablty. Usage of nvolutory key for encrypton and decrypton managed to solve the non nvertble key matrx problem. It also smplfy the computatonal complexty n term of generatng the nverse key matrx. Key words: Affne cpher, cryptography theory, hll cpher, nvolutory matrx, polygraph cpher, data encrypton, symmetrc cryptosystem, Advanced Encrypton Standard (AES), Data Encrypton Standard (DES), Intal Vector (IV), proposed algorthm INTRODUCTION Today, nformaton s one of the most valuable ntangble assets. Due to ths fact, nformaton securty had become an mportant ssue. Cryptography s one of the methods used to protect data from unauthorzed access and beng stolen. There are two types of cryptosystem, whch are symmetrc cryptosystem and asymmetrc cryptosystem. In Symmetrc cryptosystem, the sender and recpent share the same key. It means the same key s used for encrypton and decrypton. In Asymmetrc cryptosystem, dfferent keys are used. A publc key s used by sender to encrypt the message whle the recpent used a prvate key to decrypt t. Both of these cryptosystem have ther own pros and cons. For nstance, Symmetrc cryptosystem consume less computng power but t s less secure than Asymmetrc cryptosystem. Currently, there are a few cryptosystem whch are wdely mplemented such as Advanced Encrypton Standard (AES), Twofsh, Rver Cpher 4 (RC4) and Data Encrypton Standard (DES). However, these modern cryptosystem have ther orgns. The classcal cpher such as Caesar Cpher, Hll Cpher, Vgenère Cpher act as the foundaton for the cryptology s world today. Ths study focuses on Hll Cpher whch was frst descrbed n 1929 by ts nventor, the mathematcan Lester S. Hll, n the journal The Amercan Mathematcal Monthly (Esenberg, 1998). Although ts vulnerablty to cryptanalyss has rendered t unusable n practce, t stll serves an mportant pedagogcal role n cryptology and lnear algebra (Tooran and Falahat, 2009). Hll Cpher s the frst polygraph cpher. It has a few advantages n data encrypton such as resstant towards frequency analyss, hgh speed and hgh throughput. The core of Hll Cpher s matrx manpulaton (Bbhudendra, 2006; Al-Sad and Sad, 2009; Pour et al., 2009; Sastry and Shankar, 2007). It s Correspondng Author: A.F.A. Abdn, Faculty of Informatcs, Unversty Sultan Zanal Abdn, Kuala Terengganu, Terengganu, Malaysa 785
2 lnear algebra equaton s C = K P (mod m), where C represents cpher text row vector, K represents key matrx and P represents plantext row vector respectvely. For decrypton, an nverse key matrx, K -1 s needed. Ths s the major drawback of Hll cpher snce not every key matrx s nvertble. Another vulnerablty of the Hll cpher s t compromsed to the known-plantext attacks. Ths means the message encrypted can be broken f the attacker gans enough pars of plantexts and cphertexts. In ths study, a modfed verson of Hll cpher s proposed to overcome all the drawbacks mentoned above. The proposed algorthm s an extenson from Affne Hll cpher. The rest of ths study s organzed as follows. J. Computer Sc., 7 (5): , 2011 needed for decrypton and ths defntely smplfy the computatonal complexty and save the computatonal tme. However, ths algorthm stll contans some of the major drawbacks of the orgnal Hll cpher such as the vulnerablty to known-plantext attack. Besdes, ths algorthm s also not sutable to encrypt all-zeroes plantext as C wll always equals zero when P equals zero (Rangel-Romero et al., 2006). MATERIALS AND METHODS The proposed algorthm: The proposed algorthm s based on Affne Hll cpher, whch s the combnaton of Hll cpher and affne cpher. Affne Hll cpher mxes the Hll cpher wth a nonlnear affne transformaton (Stndon, 2006). Dfferng from the Hll cpher, the plantext s encrypted as C = PK + V (mod m). To produce a robust cryptosystem, we extend ths encrypton core. Ths extenson wll solve the nonnvertble key matrx problem and ncrease the randomzaton of the algorthm to enhance ts resstance towards common attacks. Wth the proposed algorthm, the plantext s encrypted as C = PK + RMK (mod m) wth three parameters, α, β and γ. The non-nvertble key matrx problem s solved by mplementng an algorthm proposed by Bbhudendra (2006). Ths algorthm produces an nvolutory key matrx whch can be used for both encrypton and decrypton process. Obvously, t reduces the computatonal complexty n decrypton. Besdes, a random matrx key, RMK s needed for encrypton apart from the nvolutory key matrx. Ths RMK s computed based on the prevous cphertext blocks and a multplyng factor. It enhances the securty of the proposed algorthm as t ncreased the resstance of the algorthms to known plantext attack. Lterature revew: Snce the Hll Cpher serves as an mportant pedagogcal role n both cryptology and lnear algebra, several researches have been done to mprove the Hll cpher. Rushd and Mousa (2009) had desgned a robust cryptosystem algorthm for nonnvertble matrces based on Hll cpher. The nonnvertble key matrx problem s solved by convertng each plantext character nto two cpher text characters. So wth the decrypton, the process nvolves the converson of two cpher text characters nto one plantext character. Although ths algorthm solved the non-nvertble key problem, t s tme-consumng as the decrypton process nvolved the computaton of an nverse key matrx. It wll defntely delay the decrypton process especally when t nvolved hgh dmensonal key matrx. Ismal et al. (2006) proposed a modfed Hll cpher whch used one-tme-one key matrx to encrypt each plantext blocks. In ths algorthm, each plantext block s encrypted by usng ts own key. Ths unque key s computed by multplyng the current key wth a secret Mathematcal notaton: Intal Vector (IV). The multplyng operaton s carred out row by row, thus the algorthm s named as Hll C = Cphertext Multplyng Rows by Intal Vector (Hll MRIV). Ths P = Plantext algorthm s proved to yeld better encrypton qualty. K = n n matrx key However, t s proved by Rangel-Romero et al. (2006) RMK = Random n n matrx key that ths proposed algorthm s stll vulnerable towards α = 1st seed number known-plantext attack. Besdes, Ismal et al. (2006) β = 2nd seed number does not tackle the non-nvertble key matrx problems γ = Multplyng factor whch may lead to falure n decrypton. n = Length of matrx rows and columns Bbhudendra (2006) also proposed an advanced m = Value of modulus, m > 1 Hll cpher algorthm (AdvHll) whch s able to solve b = Number of plantext blocks the non-nvertble key matrx problem. To make sure every cphertext block can be decrypted, an nvolutory Proposed algorthm: The encrypton algorthm s as key matrx s used for encrypton. An nvolutory key follows: matrx s a key whch can be used for both encrypton and decrypton. It means an nverse key matrx s not Randomly select α, β and γ 786
3 J. Computer Sc., 7 (5): , 2011 Generate {x 1, x 2,, x n } based on α Produce a n n matrx based on the set of numbers {x 1,x 2,, x n } Wth ths n n matrx, generate an nvolutory matrx K based on the algorthm proposed by Bbhudendra et al. (2009) Generate {y 1, y 2,, y n n } based on β Produce a n n matrx, Ktemp 1 based on the set of numbers {y 1, y 2,, y n n } Compute RMK 1 by multplyng each rows of Ktemp 1 matrx key wth γ 1 For the frst plantext block P 1, the encrypton formula s: C 1 = P 1 K 1 + RMK 1 (mod m) Repeat Step 1 to 4 to produce the remanng nvolutory matrx key, {K 2, K 3,, K b }. To compute the remanng n n random matrx key, {RMK 2, RMK 3,, RMK b }, the formula s: RMK = C -1 γ, where = {2, 3,, b} The proposed encrypton algorthm s as follows: ( ) ( ) C = PK + RMK mod m, = 1 C = C = PK + RMK mod m where, RMK = C -1 γ, = {2, 3,, b}. To compute the remanng n n random matrx key, {RMK 2, RMK 3,, RMK b }, the formula s: RMK = C -1 γ, where = {2, 3,, b}. The proposed decrypton algorthm s as follows: ( ) ( ) = ( ) ( ) P = C RMK K mod m, = 1 P = P C RMK K mod m where, RMK = C -1 γ, = {2, 3,, b}. RESULTS AND DISCUSSION Comparson has been done between the proposed encrypton algorthm, Hll++ and a few others prevous Hll algorthms. Table 1 shows that Hll++ has features whch obvously overcome some of the vulnerabltes n the exstng Hll algorthms. Obvously, Table 1 shows that Hll++ s the better than all the prevous Hll algorthms as t fulflled the two comparson factors. Snce the algorthm (Bbhudendra, 2006) s mplemented n Hll++, thus an nverse key matrx s not needed for the decrypton process. Apart from ths, all the algorthms ncludng the algorthm proposed by Bbhudendra (2006) suffered a same problem. When all the characters n a plantext block are zeroes, all these algorthms may become problematc as f P equals zero, C wll also become 0. It means the encrypton process wll totally faled. However, Hll++ stll have the ablty to encrypt the plantext effectvely even f P equals zero. The decrypton algorthm s as follows: Generate {x 1, x 2,, x n } based on α Produce a n n matrx based on the set of numbers {x 1, x 2,, x n } Wth ths n n matrx, generate an nvolutory matrx K based on the algorthm proposed by Bbhudendra et al. (2009). Generate {y 1, y 2,, y n n } based on β 1 Produce a n n matrx, Ktemp 1 based on the set of numbers {y 1, y 2,, y n n } Compute RMK 1 by multplyng each rows of Ktemp 1 matrx key wth γ 1 For the frst plantext block P 1, the decrypton formula s: P 1 = (C 1 RMK 1 ) K 1 (mod m) 787 Measurng factors of encrypton s qualty: The comparson done on prevously had showed that Hll++ s better compared to the exstng Hll algorthms. But, dependng on ths comparson only s not enough n judgng the encrypton qualty of the proposed algorthm. Thus, two measurng technques have been used to evaluate the encrypton qualty of the proposed algorthm. These technques are the maxmum devaton measures Zedan et al. (2003) and the correlaton coeffcent measures. Table 1: Comparson between Hll++ and exstng hll algorthm Comparson factor Vulnerable f Need nversed there are Cpher key matrx all-zero blocks Orgnal hll Yes Yes Ismal et al. s algorthm Yes Yes Rushd et al. s algorthm Yes Yes Bbhudendra et al. s algorthm No Yes Hll++ No No
4 J. Computer Sc., 7 (5): , 2011 Fg. 1: Devaton graph between plantext and cphertext encrypted usng dfferent algorthms Table 2 showed the comparsons of the results from two dfferent measurng factors. In Table 2, MF1 ndcates the maxmum devaton measure whle MF2 represent the correlaton coeffcent measure. From the table, t showed that Hll++ has the greatest MF1 and ts MF2 s the closest to zero. A negatve value of correlaton coeffcent means that the two varables (plantext and cphertext) are negatvely correlated. The MF2 of Hll++ whch s nearly zero showed that Hll++ can encrypt plantext nto totally dfferent cphertext. Wth the greatest MF1 and MF2 whch s the closest to zero, t can be concluded that Hll++ s a better algorthm compared to the orgnal Hll and HllMRIV. CONCLUSION Table 2: The evaluaton for encrypton qualty of orgnal Hll cpher, HllMRIV and Hll++ Measurng factor Cpher MF1 MF2 Orgnal hll Hll MRIV Hll The maxmum devaton factor measures the qualty of encrypton based on the devaton between the plantext and cphertext. The more s the cphertext devated from the plantext, the better s the encrypton algorthm. The correlaton coeffcent factor measures the qualty of encrypton based on the relatonshp between two varables, whch are plantext and cphertext n ths case. If the correlaton coeffcent s one, t means that the plantext and cphertext are hghly dependent. If the correlaton coeffcent s zero, t means that the cphertext and the plantext are not correlated (ndependent between these two varables). Thus, the smaller s the values of the correlaton coeffcent, the better s the qualty of encrypton. Results and analyss: In our experment, a smple message wth a total of one hundred and twelve characters s encrypted by usng three dfferent verson of Hll cpher algorthm. These algorthms are the orgnal Hll, HllMRIV and Hll++. The results are presented both n graph and table. Graph n Fg. 1 showed three curves whch represent the absolute dfference between plantext and cphertext (encrypted by usng three dfferent algorthms, orgnal Hll, HllMRIV and Hll++ respectvely). Based on the graph, the area under the absolute dfference curve can be computed. The wder s the area under the absolute dfference curve, the better s the qualty of encrypton. The sum of devaton (area) computed from ths graph s presented under the MF1 column n Table We have presented a modfed verson of Hll cpher whch s an extenson of Affne Hll cpher. We called t as Hll++. Hll++ ntroduces a random matrx key whch s computed based on the prevous cphertext blocks and a multplyng factor. Ths sgnfcantly ncreased the resstance of the algorthm to the known plantext attack. Hll++ also mplemented an nvolutory key generaton algorthm where the same key matrx can be used for both encrypton and decrypton. It means Hll++ does not requre any addtonal operaton to compute an nverse key, whch s defntely more tme-savng. The comparson showed that Hll++ s the only algorthm whch full flled both comparson factors, whch are no nverse key needed and not vulnerable f there are all-zeroes block. Statstcal analyss presented also showed satsfactory results. Hll++ has better encrypton qualty compared to the orgnal Hll cpher and HllMRIV. REFERENCES Al-Sad, N.M.G. and M.R.M. Sad, A new approach n cryptographc systems usng fractal mage codng. J. Math. Stat., 5: DOI: /jmssp Bbhudendra, A., Novel methods of generatng self-nvertble matrx for hll cpher algorthm. Int. J. Secur., 1: Bbhudendra, A., K.P. Saroj, K.P. Sarat and P. Ganapat, Image encrypton usng advanced hll cpher algorthm. Int. J. Recent Trends Eng., 1: /jrte pdf
5 J. Computer Sc., 7 (5): , 2011 Esenberg, M., Hll cphers and modular lnear algebra. Mmeographed notes. Unversty of Massachusetts. Ismal, I.A., M. Amn and H. Dab, How to repar the hll cpher. J. Zhejang Unv. Sc. A., 7: DOI: /jzus.2006.A2022 Pour, D.R., M.R.M. Sad, K.A.M. Atan and M. Othman, The new varable-length key symmetrc cryptosystem. J. Math. Stat., 5: DOI: /jmssp Rangel-Romero, Y., G. Vega-García, A. Menchaca- Méndez, D. Acoltz-Cervantes and L. Martínez- Ramos et al., Comments on How to repar the Hll cpher. J. Zhejang Unv. Sc. A., 9: DOI: /jzus.A Rushd, A.H. and F. Mousa, Desgn of a robust cryptosystem algorthm for non-nvertble matrces based on hll cpher. Int. J. Comput. Sc. Network Secur., 9: pdf Sastry, V.U.K. and N.R. Shankar, Modfed hll cpher wth nterlacng and teraton. J. Comput. Sc., 3: DOI: /jcssp Stndon, D.R., Cryptography Theory and Practce. 3rd Edn., Chapman and Hall/CRC, ISBN: , pp: 593. Tooran, M. and A. Falahat, A secure varant of the hll cpher. Proceedngs of the 40th IEEE Symposum on Computers and Communcatons Sousse, July 5-8, Tunsa, pp: ISSN: Zedan, I.E., M.M. Fouad and D.H. Salem, Applcaton of data encrypton standard to btmap and JPEG mages. Proceedngs of the 20th Natonal Rado Scence Conference, Mar , Caro, Egypt, pp: ber=
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationDATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM
G. RAMESH AD R. UMARAI: DATA SECURITY I LOCAL AREA ETWORK BASED O FAST ECRYPTIO ALGORITHM DATA SECURITY I LOCAL AREA ETWORK BASED O FAST ECRYPTIO ALGORITHM G. Ramesh and R. Umaran Department of MCA, Thruvalluvar
More informationSIMPLE LINEAR CORRELATION
SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.
More informationLoop Parallelization
- - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationLogical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationFully Homomorphic Encryption Scheme with Symmetric Keys
Fully Homomorphc Encrypton Scheme wth Symmetrc Keys A Dssertaton submtted n partal fulfllment for the award of the Degree of Master of Technology n Department of Computer Scence & Engneerng (wth specalzaton
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationAdaptive Fractal Image Coding in the Frequency Domain
PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationComparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions
Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda
More informationGRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM
GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: jean-perre.barrot@cnes.fr 1/Introducton The
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationPRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.
PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato
More informationBinomial Link Functions. Lori Murray, Phil Munz
Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationTHE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationLaddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationResearch on Transformation Engineering BOM into Manufacturing BOM Based on BOP
Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationSPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:
SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationCompressed Sensing Based Encryption Approach for Tax Forms Data
Vol. 4, o.11, 15 Compressed Sensng Based Encrypton Approach for Tax Forms Data Adran Brezulanu Gheorghe Asach Techncal Unversty of Ias Ias, Romana Monca Fra Romanan Academy Insttute of Computer Scence
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationwhere the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More information1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
More informationErasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures
Internatonal Journal of Grd Dstrbuton Computng, pp.5-26 http://dx.do.org/0.4257/gdc.205.8.2. Erasure Codes-based Storage-aware Protocol for Preservng Cloud Data under Correlaton Falures Zhqang Ruan and
More informationFast Variants of RSA
Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n
More informationSecure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
More informationAn interactive system for structure-based ASCII art creation
An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am
More informationPriv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks
Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal
More informationDocument Clustering Analysis Based on Hybrid PSO+K-means Algorithm
Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationA Fast Incremental Spectral Clustering for Large Data Sets
2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School
More informationDecision Tree Model for Count Data
Proceedngs of the World Congress on Engneerng 2012 Vol I Decson Tree Model for Count Data Yap Bee Wah, Norashkn Nasaruddn, Wong Shaw Voon and Mohamad Alas Lazm Abstract The Posson Regresson and Negatve
More informationSEVERAL trends are opening up the era of Cloud
IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationAuditing Cloud Service Level Agreement on VM CPU Speed
Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationAn Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
More informationSearch Efficient Representation of Healthcare Data based on the HL7 RIM
181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of
More informationHow To Know The Components Of Mean Squared Error Of Herarchcal Estmator S
S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta
More informationE-book Review on the Natonal System of Permutaton
Memory-Based and Dsk-Based Algorthms for Very Hgh Degree Permutaton Groups Gene Cooperman College of Computer Scence Northeastern Unversty Boston, MA 02115 / USA gene@ccs.neu.edu Erc Robnson College of
More information行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告
行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同
More informationEffective wavelet-based compression method with adaptive quantization threshold and zerotree coding
Effectve wavelet-based compresson method wth adaptve quantzaton threshold and zerotree codng Artur Przelaskowsk, Maran Kazubek, Tomasz Jamrógewcz Insttute of Radoelectroncs, Warsaw Unversty of Technology,
More informationSecure encrypted-data aggregation for wireless sensor networks
In Wreless Networks, 16:4, May 2010, pp. 915-927 Wreless Netw (2010) 16:915 927 DOI 10.1007/s11276-009-0177-y Secure encrypted-data aggregaton for wreless sensor networks Shh-I Huang Æ Shuhpyng Sheh Æ
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationSciences Shenyang, Shenyang, China.
Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng
More informationsscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationEnsuring Data Storage Security in Cloud Computing
1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc
More informationPortfolio Loss Distribution
Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationSEVERAL trends are opening up the era of Cloud
1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor
More information