Robust biometric-based user authentication scheme for wireless sensor networks
|
|
- Henry Wade
- 8 years ago
- Views:
Transcription
1 Robut bometrc-baed uer autentcaton ceme for wrele enor network Debao He* cool of Matematc and tattc Wuan nverty Wuan Cna Emal: Abtract: Wrele enor network (WN) are appled wdely a varety of area uc a realtme traffc montorng meaurement of emc actvty wldlfe montorng and o on. er autentcaton n WN a crtcal ecurty ue due to ter unattended and otle deployment n te feld. In 010 Yuan et al. propoed te frt bometrc-baed uer autentcaton ceme for WN. However Yoon et al. ponted out tat Yuan et al. ceme vulnerable to te nder attack uer mperonaton attack GW-node mperonaton attack and enor node mperonate attack. To mprove ecurty Yoon et al. propoed an mproved ceme and clamed ter ceme could wttand varou attack. nfortunately we wll ow Yoon et al. ceme vulnerable to te denal-of-ervce attack (Do) and te enor node mperonaton attack. To overcome te weaknee n Yoon et al. ceme we propoe a new bometrc-baed uer autentcaton ceme for WN. Te analy ow our ceme more utable for practcal applcaton. Key word: ecurty; Autentcaton; Bometrc; Wrele enor network; Cryptograpy 1. Introducton Wrele enor network (WN) are nnovatve ad-oc wrele network contng of a large number of enor node wt lmted power computaton torage and communcaton capablte [1]. Wt te development of enor tecnology mcroelectronc tecnology network tecnology and wrele communcaton tecnology WN are wdely ued n mltary envronmental montorng medcal buldng condton montorng and o on. In order to guarantee ecure communcaton autentcaton ceme for WN ave uccefully drawn reearcer attenton and been tuded wdely. In 004 Benenon et al. [] frt decrbed everal ecurty ue n WN epecally te acce control problem. Ten Benenon et al. [] propoed a uer autentcaton ceme ung ellptc curve cryptograpy (ECC). Wong et al. [4] ponted out tat Benenon et al. [] vulnerable to mperonaton attack and denal-of-ervce (Do) attack. To mproved ecurty Wong et al. [4] propoed a dynamc uer autentcaton ceme for WN. Wong et al. ceme very 1
2 effcent nce only one-way a functon and mple XOR operaton are requred n t. nfortunately Wong et al. ceme vulnerable to many attack uc a replay attack forgery attack tolen-verfer attack and paword gueng attack [ ]. Vadya et al. [8] alo ponted out tat Teng et al. ceme [5] Lee et al. and Ko et al. ceme [7] are vulnerable to replay of account-logn attack man-n-te-mddle attack forgery attack and tolenverfer attack and node capture attack. Vadya et al. alo propoed two mproved ceme to mprove te ecurty. In tradtonal autentcaton ceme for WN [4-8] te ecurty of te autentcaton ceme baed on paword. However mple paword are eay to break by mple dctonary attack nce tey ave low entropy. To olve te problem cryptograpc key (e.g. 18bt for te advanced encrypton tandard AE; [9]) are ued. However cryptograpc key are dffcult to memorze nce tey are very long and random. Furtermore bot paword and cryptograpc key are unable to provde non-repudaton becaue tey can be forgotten lot or wen tey are ared wt oter people tere no-way to know wo actual uer [10]. Terefore bometrc key are propoed wc are baed on pyologcal and beavoral caractertc of peron uc a fngerprnt face re and geometry and palm prnt etc. ome advantage of bometrc key are decrbed a follow [11]: Bometrc key cannot be lot or forgotten. Bometrc key are very dffcult to copy or are. Bometrc key are extremely ard to forge or dtrbute Bometrc key cannot be gueed ealy. omeone bometrc not eay to break tan oter. A a reult bometrc-baed uer autentcaton are nerently more relable and ecure tan uual tradtonal uer autentcaton ceme. In 010 Yuan et al. [1] propoe te frt bometrc-baed uer autentcaton ceme for WN. Ter ceme very effcent nce only te a functon ued n t. However Yoon et al. [1] ponted out tat Yuan et al. ceme vulnerable to te nder attack uer mperonaton attack GWnode mperonaton attack and enor node mperonate attack. To mprove ecurty Yoon et al. propoed an mproved ceme and clamed ter ceme could wttand varou attack. In t paper we wll demontrate tat Yoon et
3 al. ceme vulnerable to te denal-of-ervce attack (Do) and te enor node mperonaton attack. We alo propoe an mproved ceme to overcome te weaknee n Yoon et al. ceme. Te ret of t paper organzed a follow. ecton revew te concept of Yoon et al. ceme and ecton dcue t weakne analy. ecton 4 ow te detal of our propoed ceme wle ecton 5 demontrate te ecurty analy of our propoed ceme. ecton 6 compare te performance of te related ceme. Fnally ecton 7 conclude t paper.. Revew of Yoon et al. ceme In t ecton we wll revew Yoon et al. ceme. For convenence te notaton ued trougout t paper are ummarzed a follow: : te t uer; ID PW repectvely; B : GW node : te gateway node of WN; : te t enor node; dentty paword and bometrc template ID : dentty; d() : ymmetrc parametrc functon; τ : predetermned treold for bometrc verfcaton; Ek () : a ymmetrc encrypton functon wt key k ; Dk () : te decrypton functon correpondng to Ek ( ) ; () : ecure one-way a functon; :bt-we excluve-or(xor) operaton; : concatenaton operaton; Yoon et al. ceme nclude tree pae: regtraton pae logn pae and autentcaton pae. Tey are decrbed a follow..1. Regtraton pae In t pae template lcene to ubmt a value of dentty ID and bometrc B to GW node n a ecure manner. Ten GW node ue a. Te detaled tep a own n Fg. 1 are depcted a follow:
4 1). nput bometrc B on te pecfc devce compute E = ( ID B) and end ID and E to te GW node n a ecure manner. ). On recevng ID and E te GW node compute R = ID ( x) E and W = ( ID y) E were ecret nformaton x known to only GW GW node and y a ecret parameter generated by node and tored n ome degnated enor node before te node n te feld are deployed. ). GW node generate a mart card wt parameter ID E R W () d( ) and τ were d( ) a ymmetrc parametrc functon and τ a predetermned treold [14] for bometrc verfcaton... Logn pae Wen Fg. 1. Regtraton pae of Yoon et al. ceme enter B n order to delver ome query to or acce data from te network a own Fg. te mart card mut perform te followng tep to valdate te legtmacy of. 1). nert mart card nto te card reader and nput B on te pecfc devce. ). Te mart card compute E = ( ID B) and read E from te mart card. If de ( E) τ ten te mart card top te eon. Oterwe te mart card compute D = R E F = W E and V = ( D F T) were T te current tmetamp. ) end te logn meage M1 = ( ID V T) to GW node... Autentcaton pae Wen GW node receve te logn meage M 1 at tme T t wll perform te followng tep to autentcate. 4
5 1). GW node ceck te frene of T by verfe weter te equaton T T Δ T old. If te equaton old GW node top te eon were Δ T te expected tme nterval for te tranmon delay. ). GW node compute D = ( ID x) F = ( ID y) and V = ( D F T). Ten GW node ceck weter V and V are equal. If tey are not equal GW node top te eon. Oterwe GW node compute V = ( ID ID F T ) and end te meage M = ( ID V T ) g g g g to were T g te current tmetamp. ). pon recevng te meage M ceck te frene of T g by verfe weter te equaton T Tg Δ T old were T te tme receve M. If te equaton old expected tme nterval for te tranmon delay. top te eon were Δ T te 4). ceck weter V g and ID ( ID ID ( y) T g) are equal. If tey are not equal top te eon key. Oterwe compute V = ( ID ( ID y) RM T) and end M = ( RM V T ) to were T te current tmetamp and RM repond. 5). pon recevng te meage M verfe weter te equaton receve M. If te equaton old expected tme nterval for te tranmon delay. ceck te frene of T by T T Δ T old were T te tme top te eon were Δ T te 6). ceck weter V and ID ( F RM T ) are equal. If tey are not equal meage RM. top te eon key. Oterwe accept te repone 5
6 Fg.. Logn and autentcaton pae of Yoon et al. ceme. Cryptanaly of Yoon et al ceme.1. Denal-of-ervce attack One of te fundamental properte of a ecure one-way a functon tat te output are very entve to mall perturbaton n ter nput. Te cryptograpc a functon cannot be appled tragtforwardly wen te nput data are wt noy uc a bometrc [15]. Ten te predetermned treold for bometrc verfcaton cannot be ued to meaure output of a functon. In regtraton pae of Yoon et al. ceme te uer compute E = ( ID B) baed on dentty ID and peronal bometrc template Te a value B. E tored n te mart card for purpoe of autentcaton. However te autentcaton procedure may reult n erou flaw becaue de ( E) < τ may never ucceed nce te nputted bometrc belongng to te ame peron may dffer lgtly from tme to tme. Tu te condton de ( E) < τ may never ucceed due to bac property of te one-way a functon ( ). A a reult t may caue te legal uer unable to pa bometrc verfcaton at te logn pae of Yoon et al. ceme. Terefore Yoon et al. ceme vulnerable to te denal-of-ervce attack. 6
7 .. enor node mperonaton attack Generally peakng enor node are often deployed n a otle envronment [16]. Ten ome enor node may be captured by te adverary A. Once A capture a enor node + 1 e could extract te ecret key y troug te dfferental power attack [17 18]. Ten e could mperonate any oter legal enor node GW a follow. 1) A ntercept te meage M = ( ID Vg Tg) ent to by node. ) A forge a repond RM compute V = ( ID ( ID y) RM T ) and end M = ( RM V T ) to were It to ay receved meage ent by te node mperonaton attack. V could pa te verfcaton of 4. Propoed ceme T te current tmetamp.. Ten beleve tat te. Terefore Yoon et al. ceme vulnerable to To olve te weakne of Yoon et al. ceme we propoe a new bometrcbaed uer autentcaton ceme for WN. In order to execute te propoed framework we condered tat te gateway a truted node and t old two mater key ( x and y ) wc are uffcently large for te enor network. Before tartng te ytem t aumed tat a long-term ecret key ID ( y ) generated by gateway tored n enor node before te node deployed were ID te dentty of Regtraton pae Wen a uer want to regter and become a new legal uer a own n Fg. te followng tep are performed durng te uer regtraton pae. 1). generate a random number b freely cooe dentty paword enor. PW and alo mprnt peronal bometrc mpreon ID B at te ten nteractvely ubmt { ID B ( PW B b )} to GW node va ecure cannel. 7
8 ) GW node compute R = ID ( x) PW ( B b) were x a ecret key mantaned by GW node. Ten GW node wrte te ecure nformaton { R B ( ) d( ) τ} to te memory of mart card and ue t to troug a ecure cannel. ) pon recevng te mart card nput te random number b and fn te regtraton. 4.. Logn pae Wen Fg.. Regtraton pae of our ceme enter B n order to delver ome query to or acce data from te network a own Fg. 4 te mart card mut perform te followng tep to valdate te legtmacy of. 1). nert mart card nto te card reader and nput B * on te pecfc devce. ) If d B B * ( ) τ mart card reect te requet. Oterwe enter paword PW and dentty ID and ten te mart card generate a random number r and compute D = Z ( PW B b) k = ( D T) C = E ( ID r) were T te current tmetamp. k ) end te logn meage M1 = ( ID C T) to GW node... Autentcaton pae Wen GW node receve te logn meage M 1 at tme T t wll perform te followng tep to autentcate. 8
9 1). GW node ceck te frene of T by verfe weter te equaton T T Δ T old. If te equaton old GW node top te eon were Δ T te expected tme nterval for te tranmon delay. ). GW node compute D = ( ID x) k = ( D T) and ID r = Dk ( C). Ten GW node ceck weter ID and ID are equal. If tey are not equal GW node top te eon. Oterwe GW node compute k = ( ( ID y) T ) C = E ( ID r ) and end te meage g g g kg M = ( ID Cg Tg) to were T g te current tmetamp. ). pon recevng te meage M ceck te frene of T g by verfe weter te equaton T Tg Δ T old were T te tme receve M. If te equaton old top te eon were Δ T te expected tme nterval for te tranmon delay. 4). compute k g = ( D Tg) and ID r = Dk ( Cg). Ten ceck g weter ID and ID are equal. If tey are not equal top te eon. Oterwe compute V = ( ID r RM T ) and end M = ( RM V T ) to were T te current tmetamp and RM repond. 5). pon recevng te meage M verfe weter te equaton receve M. If te equaton old expected tme nterval for te tranmon delay. ceck te frene of T by T T Δ T old were T te tme top te eon were Δ T te 6). ceck weter V and ID ( r RM T ) are equal. If tey are not equal meage RM. top te eon key. Oterwe accept te repone 9
10 Fg. 4. Logn and autentcaton pae of our ceme 4. ecurty analy In t ecton we wll dcu te ecurty of our ceme a follow. Denal-of-ervce attack. In our ceme wen te uer nput bometrc * B te mart wll ceck te valdty of B * bye ceckng weter db B * ( ) τ old. Troug te work n [15] we know tat * B could pa te verfcaton of te mart card altoug tere ome lgt dfference between B * and B. Terefore our ceme could wttand denal-of ervce attack. enor mperonaton attack. Te adverary A may capture ome enor node + 1 and extract te ecret key ID ( + 1 y) troug te dfferental power attack [17 18]. He may ntercept te meage M = ( ID C T ) g g tranmtted to te enor node. However e cannot decrypt te meage C g nce e doe not ave ecret key ID ( y ). Ten e cannot generate a legal meage M = ( RM V T ). Terefore our ceme could wttand te enor mperonaton attack. 10
11 er mperonaton attack. uppoe an attacker want to forge a logn meage M1 = ( ID C T). However te attacker can not forge C wtout knowng D = ( ID x) or te mater key x. Terefore our ceme could wttand uer mperonaton attack. Gateway mperonaton attack. A long a an attacker doe not poe te ecret key ID ( y ) e cannot mperonate te gateway and cannot ceat te enor node nce e cannot generate legal C g. Hence t frutrate attacker to generate te vald meage M = ( ID C T ) to te enor node. Terefore our g g ceme could wttand gateway mperonaton attack. Mutual autentcaton. Our ceme provde mutual autentcaton were all entte (.e. uer gateway and enor node) are mutually autentcatng eac oter. More pecfcally wen GW node receve te meage M1 = ( ID C T) t can make ure tat weter te meage generated by troug ceckng weter te equaton ID = ID old. Wen te enor node receve meage M = ( ID C T ) t enure tat t meage generated by g g GW node troug ceckng weter te equaton ID = ID. Furtermore wen te uer receve meage M = ( RM V T ) e can alo confrm tat t meage generated by te enor node by ceckng weter te equaton V = ( ID r RM T ) old. Terefore our ceme could provde mutual autentcaton. Replay attack. Our ceme retant to replay attack becaue te autentcty of meage M 1 M and M are valdated by ceckng te frene of four tmetamp. Let aume an ntruder ntercept a logn requet meage M1 = ( ID C T ) and attempt to acce te enor node by replayng te ame meage M 1. Te verfcaton of t logn attempt fal nce te tme dfference expre (.e. T T Δ T ). mlarly f an ntruder ntercept a vald meage M = ( ID C T ) and attempt to replay t to te enor node te g g verfcaton requet wll fal at te enor node becaue of te tme dfference expre agan (.e. attack. T Tg Δ T ). Terefore our ceme could wttand replay 11
12 Man-n-te-mddle attack: Man-n-te-mddle attack mean tat an actve attacker ntercept te communcaton lne between a legal uer and te erver and ue ome mean to uccefully maquerade a bot te erver to te uer and te uer to te erver. Ten te uer wll beleve tat e talkng to te ntended erver and vce vera. From te above dcuon we know tat our ceme can provde mutual autentcaton ten our ceme could wttand man-n-temddle attack. tolen-verfer attack. An attacker wo teal te paword-verfer (e.g. aed paword) from te gateway can ue te tolen-verfer to mperonate a legal uer to logn to te ytem. Te propoed ceme free from te tolen verfer attack. Tere no uc nformaton tored at te erver by wc an adverary can make a fabrcated logn requet to mperonate a legal uer to logn te erver or can mperonate te gateway to ceat te legal uer and te enor node. Inder attack. It poble n a real-tme envronment wen te gateway manager or ytem admntrator can ue te uer paword paword) to mperonate te uer PW (e.g. weak troug any oter network gateway. In t cae our ceme doe not gve any room for prvleged nder nce n te regtraton pae te uer paword. Tu te nder of GW pang PW ( B b ) ntead of te plan node cannot get pw ealy. Here b a uffcently g entropy number wc not revealed to GW node. Furtermore te propoed ceme doe not tore any verfer table and can ret te nder attack. 5. Performance comparon For te convenence of evaluatng te computatonal cot we defne ome notaton a follow T : Te tme of executng a one-way a functon. T ym : Te tme of executng a ymmetrc encrypton/decrypton functon. In Table 1 we ummarze te performance reult of te propoed ceme. Accordng to Table 1 we know tat te uer te enor node and te gate way requre T +1T ym T +1T ym T +T ym eparately. It well known tat a one- 1
13 way a functon and a ymmetrc encrypton/decrypton functon a almot ame computatonal cot. Ten te computatonal cot of te uer te enor node and te gate way n our ceme are lgtly ger tan tat of Yuan et al. ceme and Yoon et al. ceme. However Yuan et al. ceme cannot wttand denal-of-ervce attack nder attack uer mperonaton attack gateway node mperonaton attack and enor node mperonaton attack. Bede Yoon et al. ceme vulnerable denal-of-ervce attack and enor node mperonaton attack. It acceptable to enance te ecurty at te cot of ncreang uer computaton cot lgtly. Ten our ceme more utable for WN. 6. Concluon Te paper demontrate tat Yoon et al. ceme vulnerable to te denalof-ervce attack and te enor node mperonaton attack. To overcome te ecurty vulnerablty we provde a new bometrc-baed uer autentcaton ceme for WN. Te analy ow te propoed ceme more uted to WN envronment. Reference [1] Akyldz I. u W. an Y. Cayrc E. A urvey on aenor network. IEEE Comm. Mag [] Benenon Z.; Gartner F.; Kedogan D. er Autentcaton n enor network (extended abtract). In Proceedng of te Informatk Jaretagung der Geellcaft fur Informatk Workop on enor Network lm Germany eptember 004. [] Benenon Z.; Gedcke N.; Ravo O. Realzng robut uer autentcaton n enor network. In Proceedng of te Workop on Real-World Wrele enor Network (REALWN 05) tockolm weden 0 1 June 005. [4] Wong K.H.M.; Zeng Y.; Cao J.; Wang. A dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Internatonal Conference on enor Network bqutou and Trutworty Computng (TC 06) Tacung Tawan 5 7 June 006. [5] Teng H.R.; Jan R.H.; Yang W. An mproved dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Global Communcaton Conference (GLOBECOM 07) Wangton DC A 6 0 November 007; pp [6] Lee T.H. mple dynamc uer autentcaton protocol for wrele enor network. In Proceedng of te nd Internatonal Conference on enor Tecnologe and Applcaton (ENORCOMM 08) Cap Eterel France 5 1 Augut 008; pp
14 [7] Ko L.C. A novel dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Internatonal ympoum on Wrele Communcaton ytem 008 IWC'08 Reykavk Iceland 1 4 October 008; pp [8] Vadya B.; Rodrgue J.J.P.C.; Park J.H. er autentcaton ceme wt peudonymty for ubqutou enor network n NGN. Internatonal Journal Communcaton ytem [9] Advanced Encrypton tandard /ttp://crc.nt.gov/encrypton/ae/. [10] L C. Hwang M.: An effcent bometrc-baed remote autentcaton ceme ung mart card Journal of Network and Computer Applcaton [11] Ln C. La Y.: A flexble bometrc remote uer autentcaton ceme Comput. tandard Interf (1) 19. [1] Yuan J. Jang C. Jang Z. A bometrc-baed uer autentcaton for wrele enor network Wuan nverty Journal of Natural cence vol. 15 no. pp [1] Yoon E. Yoo K. A New Bometrc-baed er Autentcaton ceme wtout ung Paword for Wrele enor Network 011 0t IEEE Internatonal Workop on Enablng Tecnologe: Infratructure for Collaboratve Enterpre [14] Inuma M. Otuka A. Ima H. Teoretcal framework for contructng matcng algortm n bometrc autentcaton ytem In proc. of ICB 009 LNC 5558 pp [15] Lnnartz J.-P. Tuyl P.: New eldng functon to enance prvacy and prevent mue of bometrc template. Proc. Audo and Vdeo-Baed Bometrc Peron Autentcaton 00 (LNC 688) pp [16] Perrg A tankovc J Wagner D ecurty n Wrele enor Network. Communcaton of te ACM (6):5-57. [17] P. Kocer J. Jaffe B. Jun Dfferental power analy Proceedng of Advance n Cryptology (CRYPTO 99) 1999 pp [18] T.. Meerge E.A. Dabb R.H. loan Examnng mart-card ecurty under te treat of power analy attack IEEE Tranacton on Computer 00; 51 (5):
15 Table 1. Performance comparon among dfferent ceme Computatonal (er) Computatonal (enor node) Computatonal (Gateway) cot cot cot Ret denal-ofervce attack Ret mperonaton attack uer Ret enor node mperonaton attack Ret gateway mperonaton attack Yuan et al. ceme[1] 4T 1T 4T Yoon et al. ceme [1] T T 4T Our ceme T +1T ym 4T T +1T ym T T +T ym 5T Ret nde attack Mutual autentcaton Ret replay attack Ret tolen-verfer attack Ret man-n-temddle attack 15
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationControl and Coordination of Interactive Videoconferencing over Hybrid Networks
1 of 5 ontrol and oordnaton of Interactve Vdeoconferencng over Hybrd Network Tng-hao Hou, horng-horng Yang., Yun-Sun hu, and Km-Joan hen epartment of Electrcal Engneerng Natonal hung heng Unverty 160,
More informationTHE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko
Internatonal Journal "Informaton Theore & Applcaton" Vol5 / 28 253 TE ANALYSIS AND OTIMIATION OF SURVIVABILITY OF MLS NETWORS Mohammadreza Moavar, Yur aychenko Abtract: The problem of MLS network urvvablty
More informationPass by Reference vs. Pass by Value
Pa by Reference v. Pa by Value Mot method are paed argument when they are called. An argument may be a contant or a varable. For example, n the expreon Math.qrt(33) the contant 33 paed to the qrt() method
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationPERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS
Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: alecu.felcan@e.ae.ro Abtract:
More informationT1 Estimates SAT - 2006
T1 Etmate SAT - 006 Tax and Lmoune Servce (TL) NAICS : 4853** by Javer Oyarzun BSMD Stattc Canada 007-1-1 1. Introducton 1.1 Ue of admntratve data Over the lat few year, Stattc Canada (STC) ha been accentuatng
More informationAbstract. 2.2. Adjusted PPM.
Effectvene of Avance an Authentcate Packet Markng Scheme for Traceback of Denal of Servce Attack Blal Rzv an Emmanuel Fernánez-Gaucheran Department of Electrcal & Computer Engneerng &Computer Scence Unverty
More informationDevelopment and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements
evelopment and ue of predcton model n Buldng Acoutc a n EN 1354 Eddy TNO Scence and Indutry, P.O. Box 155, N-600 A elft, The Netherland, eddy.gerreten@tno.nl Improvng the acoutc clmate n buldng an mportant
More informationA Novel Architecture Design of Large-Scale Distributed Object Storage System
Internatonal Journal of Grd Dtrbuton Computng Vol.8, No.1 (2015), pp.25-32 http://dx.do.org/10.14257/gdc.2015.8.1.03 A Novel Archtecture Degn of Large-Scale Dtrbuted Obect Storage Sytem Shan Yng 1 and
More informationE-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
More informationPolarimetric parameters associated to commercial optical fibers
RESEARCH Revta Mexcana de Fíca 6 14 443 45 NOVEMBER-DECEMBER 14 Polarmetrc parameter aocated to commercal optcal fber O. J. Velae-Ecobar a, K. M. Sala-Alcántara b, R. Epnoa-Luna b,, G. Atondo-Rubo a, and
More informationAuthenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 47 Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: sdx86@uow.edu.au
More informationAn Integrated Resource Management and Scheduling System for Grid Data Streaming Applications
An Integrated eource Management and Schedulng Sytem for Grd Data Streamng Applcaton Wen Zhang, Junwe Cao 2,3*, Yheng Zhong,3, Lanchen Lu,3, and Cheng Wu,3 Department of Automaton, Tnghua Unverty, Bejng
More informationPayback Period Estimation of Ground-Source and Air-Source Multi Heat Pumps in Korea Based on Yearly Running Cost Simulation
Purdue nverty Purdue e-pub Internatonal Refrgeraton and Ar ondtonng onference Scool of Mecancal Engneerng 00 Payback Perod Etmaton of Ground-Source and Ar-Source Mult Heat Pump n Korea Baed on Yearly Runnng
More informationA Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones
A Novel teganograpic Algoritm and Haing to Improve Autentication uing Mobile Pone G. umalata 1 & P. Maduravani 2 1 Dept. o IT, ree Nidi Intitute o cience & Tecnology 2 Dept. o CE Malla Reddy College o
More informationARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( )
COMAID:5 JID:COMAID AID:5 /FLA [mg; v 79; Prn:/0/009; 4:0] P -) Computer Aded Geometrc Degn ) Content lt avalable at ScenceDrect Computer Aded Geometrc Degn wwwelevercom/locate/cagd Fat approach for computng
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationBasic Principle of Buck-Boost
Bac Prncple of Buck-Boot he buck-boot a popular non-olated nvertng power tage topology, ometme called a tep-up/down power tage. Power upply degner chooe the buck-boot power tage becaue the requred output
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationMATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH
. About Matcad MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH DE TING WU Depart of Mat Moreouse College Atlanta, GA.33, USA dtwu@moreouse.edu. Introducton Matcad s one of popular computer
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationCERTIFICATE OF ANALYSIS ERM -EB313 AlMg3
n cooperaton wth the WG Alumnum of the Commttee of Chemt of GDB Date of ue: February 2006 (reved Aprl 2011) CERTIFICATE OF ANALYSIS ER -EB313 Alg3 Certfed Value Certfed value 1) Uncertanty 2) Element a
More informationA Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,
More informationREVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012.
REVISA INVESIGACIÓN OPERACIONAL VOL., 33, NO. 3, 33-44,. ORDERING POLICY FOR INVENORY MANAGEMEN WHEN DEMAND IS SOCK- DEPENDEN AND A EMPORARY PRICE DISCOUN IS LINKED O ORDER UANIY Nta H. Shah Department
More informationThe Design of Reliable Trust Management Systems for Electronic Trading Communities
The Degn of Relale Trut Management Sytem for Electronc Tradng Communte Chryantho Dellaroca Sloan School of Management Maachuett Inttute of Technology Room E53-315 Camrdge, MA 02139 dell@mt.edu Atract:
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationHospital care organisation in Italy: a theoretical assessment of the reform
Dartmento d Scenze Economche Unvertà d Breca Va S. Fautno 7/b 5 BESCIA Tel. 3 98885 Fax. 3 988837 e-mal: levagg@eco.unb.t otal care organaton n Italy: a theoretcal aement of the reform oella evagg Abtract.
More informationMultifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm
Journal of Computatonal Informaton Sytem 7:2 (211) 385-393 Avalable at http://www.jofc.com Multfuncton Phaed Array Radar Reource Management: Real-me Schedulng Algorm Janbn LU 1,, Hu XIAO 2, Zemn XI 1,
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More information2.23 Gambling Rehabilitation Services. Introduction
2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority
More informationAdvances in Military Technology Vol. 10, No. 1, June 2015
AM Avance n Mltary echnology Vol., No., June 5 Mechancal an Computatonal Degn for Control of a -PUS Parallel Robot-bae Laer Cuttng Machne R. Zavala-Yoé *, R. Ramírez-Menoza an J. Ruz-García ecnológco e
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationThe issue of whether the Internet will permanently destroy the news media is currently a
Wll the Internet etroy the New Meda? or Can Onlne Advertng Market Save the Meda? by Suan Athey, Emlo Calvano and Johua S. Gan * Frt raft: October, 009 Th Veron: November, 00 PRELIMINARY PLEASE O NOT QUOTE
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationDynamic Control of Data Streaming and Processing in a Virtualized Environment
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynamc Control of Data Streamng and Proceng n a Vrtualzed Envronment Junwe Cao, Senor Member, IEEE, Wen Zhang,
More informationJCS&T Vol. 11 No. 1 April 2011
Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan,
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationCoalition Formation for Sourcing Contract Design with Cooperative Replenishment in Supply Networks
Coalton Formaton for Sourcng Contract Degn wth Cooperatve Replenhment n Supply Network Shem Ben Jouda Saouen Krchen Wald Klb November 014 CIRRELT-014-61 Coalton Formaton for Sourcng Contract Degn wth Cooperatve
More informationNew method for grain size characterization of a multi-crystalline silicon ingot
New method for gran ze characterzaton of a mult-crytallne lcon ngot Maxme Forter, Erwann Fourmond, Jean-Mare Lebrun, Roland Enhau, Jed Kraem, Mutapha Lemt To cte th veron: Maxme Forter, Erwann Fourmond,
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More informationModeling ISP Tier Design
Modelng ISP Ter Degn We Da School of Informaton and Computer Scence Unverty of Calforna, Irvne Irvne, CA, US daw1@uc.edu Scott Jordan School of Informaton and Computer Scence Unverty of Calforna, Irvne
More informations-domain Circuit Analysis
S-Doman naly -Doman rcut naly Tme doman t doman near rcut aplace Tranform omplex frequency doman doman Tranformed rcut Dfferental equaton lacal technque epone waveform aplace Tranform nvere Tranform -
More informationImpact of the design method of permanent magnets synchronous generators for small direct drive wind turbines for battery operation
Impact o the degn method o permanent magnet ynchronou generator or mall drect drve wnd turbne or battery operaton Mha PREDESCU, Dr. eng.*, Aurelan CRǍCIUNESCU, Pro. Dr. **, Andre BEJINARIU, Eng.*, Octavan
More informationThe Impact of the Internet on Advertising Markets for News Media
The Impact of the Internet on Advertng Market for New Meda by Suan Athey, Emlo Calvano and Johua S. Gan * Frt Draft: October, 009 Th Veron: October 0 In th paper, we explore the hypothe that an mportant
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationCoordinate System for 3-D Model Used in Robotic End-Effector
AU JT 8(: 8 (Apr Codnate Sytem f D Model Ued n Robot EndEffer ulfqar Al Soomro Shool of Advaned Stude, Aan Inttute of Tehnology Pathum Than, Thaland Abtrat Th paper reve the onept of odnate ytem on new
More informationQOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationThe Cox-Ross-Rubinstein Option Pricing Model
Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage
More informationNetherlands Published online: 27 Jun 2013.
Th artcle wa downloaded by: [Bblotheek TU Delft] On: 04 Noveber 2013, At: 08:09 Publher: Routledge Infora Ltd Regtered n England and Wale Regtered Nuber: 1072954 Regtered offce: Morter Houe, 37-41 Morter
More informationHow To Understand Propect Theory And Mean Variance Analysis
Invetment Management and Fnancal Innovaton, Volume 6, Iue 1, 2009 Enrco De Gorg (Swtzerland ), Thorten Hen (Swtzerland) Propect theory and mean-varance analy: doe t make a dfference n wealth management?
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationA Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C.
ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C Bob Hardy Thunder Scentfc Corporaton, Albuquerque, NM, USA Abtract:
More informationGRADUATION PROJECT REPORT
SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationMath 113 HW #5 Solutions
Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten
More informationService Provider SIP trunk Validation Detailed Test Plan
E Document Number EDC-827327 Based on emplate EDC-206096 Rev 35 Create By Cecly Lu ervce Provder P trunk Valdaton Detaled Plan odfcatons Revson Name User d Date Comments 1 ony Banuelos tbanuelo 11/2/2009
More informationEvidence for Adverse Selection in the Automobile Insurance Market
Evdence for Adverse Selecton n te Automoble Insurance Market Racel J. Huang * Assstant Professor, Fnance Department Mng Cuan Unversty, Tape, Tawan Larry Y. Tzeng Professor, Department of Fnance Natonal
More informationTangent Lines and Rates of Change
Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims
More informationHole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure
IJCSI International Journal of Computer Science Iue, Vol. 9, Iue, No, January 0 ISSN (Online): 694-084 www.ijcsi.org 3 Hole Detection for Increaing Coverage in Wirele Senor Network Uing Triangular Structure
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationA new look at atomic broadcast in the asynchronous. crash-recovery model
A new look at atomc broadcast n the asynchronous crash-recovery model Sergo Mena André Schper École Polytechnque Fédérale de Lausanne (EPFL) Dstrbuted Systems Laboratory CH-1015 Lausanne, Swtzerland Tel.:
More informationPractical Design Considerations for Next Generation High-Speed Data Wireless Systems
Practcal Desgn Consderatons for ext Generaton Hgh-peed Data Wreless ystems ChngYao Huang and Hue Yuan u Wreless Informaton and Technology Lab Department of Electroncs Engneerng atonal Chao Tung Unversty
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationHow To Ensure That An Eac Edge Program Is Successful
Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.
More informationThresPassport A Distributed Single Sign-On Service
ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn
More information1. Introduction. 2. Derivation of a time-discrete algorithm for a PID controller
PID Controller Calulu for HERMS home-brewng ytem Introuton h oument erbe the ervaton of a PID ontroller that an be mplemente n the brew applaton he PID ontroller houl be apable of ontrollng the temperature
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationMall Cell Network - Power, Memory and Networking
Slow admon and power control for mall cell network va dtrbuted optmzaton Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah To cte th veron: Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah. Slow admon and power control
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More information3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
More informationADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
ADVANCED SECURE USER AUTHENTICATION FRAMEWOR FOR CLOUD COMPUTING Ri Jiang School of Information Science and Engineering Sotheat Univerity, Jiang 210096 Nanjing, ChinaS Email: R.Jiang@e.ed.cn Sbmitted:
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationCryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationApplying the Value/Petri Process to ERP Software Development in China
Applyng the Value/Petr Proce to ERP Software Development n Chna LGuo Huang Barry Boehm Computer Scence Department Unverty of Southern Calforna Lo Angele, CA 90089-0781, USA 001 213-740-6470 {lguohua, boehm}@
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationApplying the Francis-Hunston Model to a one-to-one EFL conversation
Unverty of Brmngam Centre for Engl Language Stude September 2006 Module 4 Claroom & Spoken Dcoure -------------------------------------------------------- Applyng te Franc-Hunton Model to a one-to-one
More information