An RSA-based (t, n) threshold proxy signature scheme with freewill identities

Size: px
Start display at page:

Download "An RSA-based (t, n) threshold proxy signature scheme with freewill identities"

Transcription

1 Int. J. Informaton an Computr Scurty, Vol. 1, No. 1/2, An RSA-bas (t, n) thrshol proxy sgnatur schm wth frwll ntts Ya-Fn Chang Grauat Insttut of Accountng, Natonal Chung Hsng Unvrsty, Tachung 42, Tawan R.O.C. Dpartmnt of Computr Scnc an Informaton Engnrng, Natonal Tachung Insttut of Tchnology, Tachung 44, Tawan, R.O.C. E-mal: Chn-Chn Chang* Dpartmnt of Informaton Engnrng an Computr Scnc, Fng Cha Unvrsty, Tachung, Tawan 4724, R.O.C. Dpartmnt of Computr Scnc an Informaton Engnrng, Natonal Chung Chng Unvrsty, Chay, Tawan 621, R.O.C. Fax: (886) E-mal: *Corrsponng author Abstract: Hwang, Lu an Ln (23) propos a (t, n) thrshol proxy sgnatur schm, bas on th RSA cryptosystm. Latr, Wang t al. (24a) ncat that ths schm was nscur bcaus th orgnal sgnr s prvat ky coul b rv. Morovr, th lgats ntts ha to b chosn carfully. In ths papr, w propos an mprov RSA-bas (t, n) thrshol proxy sgnatur schm, whch wthstans ths scurty flaw an also offrs th convnnc of choosng ntts at wll. Kywors: cryptography; nformaton an computr scurty; proxy sgnatur; RSA; (t, n) thrshol. Rfrnc to ths papr shoul b ma as follows: Chang, Y-F. an Chang, C-C. (27) An RSA-bas (t, n) thrshol proxy sgnatur schm wth frwll ntts, Int. J. Informaton an Computr Scurty, Vol. 1, No. 1/2, pp Bographcal nots: Ya-Fn Chang rcv th BS gr n Computr Scnc an Informaton Engnrng from Natonal Chao Tung Unvrsty, Hsnchu, Tawan n 2. Sh rcv hr PhD gr n Computr Scnc an Informaton Engnrng n 25 from Natonal Chung Chng Unvrsty, Chay, Tawan. Snc 26, sh has bn an Assstant Profssor of Natonal Tachung Insttut of Tchnology. Hr currnt rsarch ntrsts nclu lctronc commrc, nformaton scurty, cryptography an mobl communcatons. Copyrght 27 Inrscnc Entrprss Lt.

2 22 Y-F. Chang an C-C. Chang Chn-Chn Chang rcv th BS gr n Appl Mathmatcs n 1977 an th MS gr n Computr an Dcson Scncs n 1979, both from Natonal Tsng Hua Unvrsty, Hsnchu, Tawan. H rcv hs PhD n Computr Engnrng n 1982 from Natonal Chao Tung Unvrsty, Hsnchu, Tawan. Snc 22, h has bn a Char Profssor of Natonal Chung Chng Unvrsty. Snc 25, h has bn a Char Profssor of Fng Cha Unvrsty. Hs currnt rsarch ntrsts nclu atabas sgn, computr cryptography, mag comprsson an ata structur. Dr. Chang was th char an s th honorary char of th xcutv commtt of th Chns Cryptography an Informaton Scurty Assocaton of th Rpublc of Chna. 1 Introucton Mombo, Usua an Okamoto (1996) propos th concpt of proxy sgnaturs. Ths allow th orgnal sgnr to lgat thr sgnng capacty to anothr, th proxy sgnr. Employng th a of scrt sharng (Shamr, 1979; Prsn, 1991a; Prsn, 1991b; Km, Part an Won, 1997; Zhang, 1997) prsnt th frst thrshol proxy sgnatur schms. In a (t, n) thrshol proxy sgnatur schm, th orgnal sgnr lgats th sgnng capacty to n proxy sgnrs (Huang an Chang 23). If mor than (t 1) proxy sgnrs cooprat, thy can gnrat th val sgnatur on bhalf of th orgnal sgnr, who can st t frly such that 1 t n. Consquntly, th thrshol proxy sgnatur schm s mor practcal, flxbl an scur than th convntonal proxy sgnatur schm. Accorng to Hwang, Lu an Ln (23), th rqurmnts of a practcal an scur (t, n) thrshol proxy sgnatur schm nclu: 1 Scrcy: th orgnal sgnr s prvat ky cannot b rv. 2 Proxy Protcton: no on can gnrat th val partal proxy sgnatur xcpt th sgnat proxy sgnr. 3 Unforgablty: only f t or mor proxy sgnrs cooprat to gnrat a val proxy sgnatur. 4 Non-rpuaton: proxy sgnrs cannot ny sgnng th mssag, nor can th orgnal sgnr ny lgatng th capacty to th proxy sgnrs. 5 Tm Constrant: th proxy sgnng kys can only b us urng th lgaton pro. 6 Known Sgnrs: th actual sgnrs of a gvn thrshol proxy sgnatur can b trmn for an ntrnal aut. Although many thrshol proxy sgnatur schms hav bn propos (Km, Part an Won, 1997; Zhang, 1997; Sun, 1999a; Sun, 1999b; Hwang, Ln an Lu, 2; Hsu, Wu an Wu, 21; Wang t al., 24b), most of thm o not comply wth all of th abov rqurmnts. All of ths schms ar bas on th scrt logarthm cryptosystms (ElGamal, 1985; Schnorr, 1991) bcaus t s ffcult to shar th prvat ky among multpl parts n th RSA cryptosystm (Rvst, Shamr an Alman, 1978).

3 An RSA-bas (t, n) thrshol proxy sgnatur schm 23 Hwang, Lu an Ln (23) propos a (t, n) thrshol proxy sgnatur schm bas on th RSA cryptosystm. Thy clam that thr schm provs both computaton an communcaton ffcncs. Howvr, th proxy sgnr must choos thr ntty carfully, falng whch th sgnr cannot gnrat th partal proxy sgnatur succssfully. Ths poss a lmtaton on th proxy sgnrs bcaus thy cannot choos thr own ntts at wll. Consquntly, proxy sgnrs may b forc to own a har-tormmbr ntty. Thrfor, f th ntts ar not chosn carfully, th schm wll not work; th ntts may n to b chang to satsfy th crtcal contons of th schm. Ths proprty maks th schm mpractcal. Wang t al. (24a) ncat that Hwang, Lu an Ln (23) s schm s nscur an os not comply wth all of th rqurmnts. Morovr, th orgnal sgnr s prvat ky can b rv whn t proxy sgnrs cooprat. Whn th thrshol t s not vry larg, t s qut angrous, placng a havr burn on choosng th ntts. For ths rasons, w propos an mprov RSA-bas (t, n) thrshol proxy sgnatur schm wth fr-wll ntts. In Scton 2, w rvw Hwang Lu an Ln (23) s (t, n) thrshol proxy sgnatur schm an Wang t al. (24a) s crtqu of t. Our propos schm s prsnt n Scton 3, follow by th scusson n Scton 4. Fnally, som conclusons ar rawn n Scton 5. 2 A rvw of Hwang, Lu an Ln (23) s t-out-of-n proxy sgnatur schm Hwang, Lu an Ln (23) s (t, n) thrshol proxy sgnatur schm conssts of thr phass: proxy sharng, proxy sgnatur ssung an vrfcaton. Th schm s ntat as follows. Lt S not th orgnal sgnr, an S 1, S 2,, S n not n proxy sgnrs. Lt N, whch s ntcal to p *q, b a publc RSA moulus for S, whr p an q ar two scrt larg prms wth =, 1,, n. S owns a prvat ky, a publc ky an th ntty ID, whr gc[, (N )] = 1 an * = 1 mo (N ), Lt w, whch s a warrant mnt by S, nclu mportant nformaton such as th valty pro of th proxy ky, th proxy sgnrs ntts, th orgnal sgnr an so on. T nots th proxy sgnatur group, whr T = {S 1, S 2,, S n }. Lt L ID /( ID ID ), whr L Z, for = 1, 2,, n Th proxy sharng phas S, ST, S lgats th sgnng powr to n popl, S 1, S 2,, S n, as follows: w Stp 1: S computs D mo ( N) an E mo ( N), whr D s th group proxy sgnatur ky an E s th proxy vrfcaton ky. Thn S publshs {w, E, ( w E) mo N }. Stp 2: S gnrats a scrt polynomal f of gr (t1), whr f(x) = D + r 1 x + r 2 x r t1 x t1 mo (N ), whr r 1, r 2,, r t1 ar t1 ranom numbrs. S computs S s partal proxy sgnng ky k = f(id ), an sns ( k mo N k) mo N to S, whr = 1, 2,, n. w

4 24 Y-F. Chang an C-C. Chang Stp 3: Aftr rcvng th transmtt ata, S computs (((k mo N ) mo N to gt k, whr = 1, 2,, n. 2.2 Th proxy sgnatur ssung phas mo N k ) mo N ) Whn t mmbrs of T want to sgn a mssag M coopratvly on bhalf of S, thy o so as follows: ( ) Stp 1: Each mmbr from th st of th t mmbrs computs x Lk M mo N. Thn, x mo N s comput an th rsult wth x s snt to th combnr. Stp 2: Th combnr vrfs ach x wth th corrsponng proxy sgnr s publc ky, collcts ach x mo N, an thn computs th proxy sgnatur S of M, whr D S x mo N M mo N. ST 2.3 Th vrfcaton phas A vrfr V who wants to vrfy th proxy sgnatur xcuts th followng procur: Stp 1: V frst chcks whthr (w E) = (( w E) mo N ) mo N. If t hols, V chcks th valty pro. If th pro has xpr, t ncats that th proxy vrfcaton ky s nval; othrws, th phas contnus. Stp 2: V computs S E mo N an chcks f th computaton rsult s qual to M. Stp 3: Th collct ( x mo N ) can b mploy to ntfy th actual sgnr. 2.4 Scurty flaw n Hwang, Lu an Ln (23) s RSA-bas (t, n) thrshol proxy sgnatur schm Hr, w monstrat how to rtrv S s prvat ky (Wang t al., 24a). Assum t mmbrs of T cooprat to rtrv S s prvat ky, as follows: Stp 1: Th mmbrs comput D= D mo (N ) coopratvly wthout knowng (N ). w w Stp 2: Thy comput P = D* E 1 = ( mo (N ))*( mo (N )) 1= b* (N ) +1 1= b* (N ), whr b s an ntgr. Stp 3: If gc(, P) = c 1, P = P/c go to Stp 3; f gc(, P)=1, can b obtan such that * = 1 mo P, whr b s an ntgr, P = b* (N ), an b b. Snc * = 1 mo b* (N ), * = b*b* (N ) + 1, whr b s an ntgr. That s, * = 1 mo (N ). As a rsult, S s prvat ky can b succssfully obtan.

5 An RSA-bas (t, n) thrshol proxy sgnatur schm 25 3 Th propos t-rsa-bas out-of-n proxy sgnatur schm Th propos (t, n) thrshol proxy sgnatur schm also conssts of thr phass: proxy sharng, proxy sgnatur ssung an vrfcaton. Th ntaton of th propos schm s smlar to Hwang, Lu an Ln (23) s schm wth th followng ffrncs: 1 L ID mo N, whr = 1, 2,, n. ID S, S T, ID 2 C s a trust thr party wth th RSA publc ky (N c, c ) an th RSA prvat ky c, whr N c s largr than any proxy sgnr S s publc ky N an S s publc ky N. 3 h(): a publc on-way collson-rsstant hash functon. 3.1 Th proxy sharng phas S lgats th powr to sgn mssags to n popl as follows: Stp 1: S computs G mo ( N ), D h(w) mo N, an mo ( ) E N, whr G* E ( * )mo ( N ) 1. G Lt = (w E) mo N. S thn publshs {w, E,, N }. Stp 2: S gnrats a scrt polynomal f of gr (t 1), whr f(x) = D + r 1 x + r 2 x r t 1 x t 1 mo N. S computs S s partal proxy sgnng ky k = f(id ), whr = 1, 2,, n, computs an sns z = ( k mon k) mo N to S. If ( k mo N k) s gratr than N, t wll b v nto two or mor tms such that ach tm s smallr than N, an ach tm s ncrypt by S s publc ky sparatly. Stp 3: Aftr rcvng th transmtt ata, S computs ( z mon ) mon to gt k for = 1, 2,, n. 3.2 Th proxy sgnatur ssung phas For t mmbrs of T to sgn a mssag M coopratvly on bhalf of S : Stp 1: Each mmbr computs x ( L k)mon, th partal sgnatur g = ( ( )) x M h x M mon, an c g mo N c. Thn g c mo N c s snt to C by ach mmbr. If g s gratr than N c, t wll b v nto two or mor tms (g s) such that ach g s smallr than N c, an ach tm s ncrypt by C s publc ky sparatly. Stp 2: C frst uss hs/hr prvat ky c to gt g, vrfs x wth th corrsponng proxy sgnr s publc ky, collcts ach x an g, an computs th proxy sgnatur S of M, whr h(m) h(m) S ( x mon ) mon D mon. ST

6 26 Y-F. Chang an C-C. Chang 3.3 Th vrfcaton phas A vrfr V who wants to vrfy th proxy sgnatur xcuts th followng procur: Stp 1: V frst chcks f (w E) = (( w E) mo N ) mo N. If t hols, V chcks th valty pro. If th pro has xpr, t nots that th proxy vrfcaton ky s nval; othrws, th phas contnus. E h(m)*e G*h(M)*E Stp 2: V computs S D h(w) mo N an h (w) mo N. V vrfs M by chckng whthr th computaton rsults ar qual or not. Stp 3: If thr s a n to ntfy th actual sgnrs, th collct g s can b us. h(m) 4 Dscusson Th followng scton monstrats th scurty of th propos schm how th proxy sgnr can choos hs/hr own ntty at wll an how th schm satsfs th sx rqurmnts mnton n Scton 1. In sub-scton 4.3, practcs for managrs ar rcommn 4.1 Proxy sgnr can choos hs/hr own ntty at wll L S,ST, ID ID ID mo N S,ST, (ID *(ID ID 1 ) ) mo N n our propos schm. Bcaus N s known, (ID ID ) 1 mo N can b obtan. That s, rrspctv of th ntts, L must b an ntgr. As a rsult, proxy sgnrs can choos thr own ntts at wll. 4.2 Scurty of th schm Th clrk C s trust n th schm. Thrfor, th partal sgnatur must b concal such that only C can rval t to combn all th collct partal sgnaturs. As shown n Stp 1 of sub-scton 3.2, th partal sgnatur g s ncrypt by C s publc ky an so only C can accss t. As shown n sub-scton 3.3, th valty of th gnrat proxy sgnatur s nsur. If a proxy sgnr ns sgnng th sgnatur, th partal sgnatur g can b mploy bcaus g = ( ( )) x M h x M mo N. Although th clrk C can gt x s, C cannot forg th val partal sgnaturs bcaus th corrsponng prvat kys ar unknown. In Hwang, Lu an Ln (23) s schm, th scurty of th orgnal sgnr s prvat ky s thratn bcaus b*(n ) s known, whr b s an ntgr. Hr, no on can rtrv S s prvat ky bcaus of th ffcults n solvng th scrt logarthms from D. Morovr, snc D an E ar th proucts wth th moul N an (N ), rspctvly, no nformaton on (N ) wll b known vn f D s rtrv. If D s obtan, anyon can comput th val proxy sgnatur. Ths wll rsult h(m) n srous amag to th proxy an orgnal sgnr. From S D mo N, no on can rv D bcaus (N ) s unknown. Consquntly, h(m) 1 mo (N ) s not avalabl to

7 An RSA-bas (t, n) thrshol proxy sgnatur schm 27 rtrv D. Evn f D s rtrv, th sgn partal proxy sgnatur g, for trmnng th ral proxy sgnrs cannot b gnrat, snc th proxy sgnr s prvat ky s unknown. Th followng scton scusss how our propos schm satsfs th sx basc rqurmnts mnton n Scton Scrcy - th orgnal sgnr s prvat ky cannot b rv As shown n sub-scton 4.2, bcaus D an E ar th proucts wth th moul N an (N ), rspctvly, no nformaton of (N ) wll b known vn f D s rtrv. Morovr, G mo ( N) an G D h(w) mo N, bcaus of th ffcults n solvng th scrt logarthms, th orgnal sgnr s prvat ky s stll concal vn f D s rtrv Proxy protcton - no on can gnrat th val partal proxy sgnatur xcpt th lgat proxy sgnr As shown n sub-scton 3.2, th proxy sgnr S s partal sgnatur g = ( x M h(x M)) mo N. Only S can gnrat th val partal proxy sgnatur bcaus S s prvat ky s unknown Unforgablty - only f t or mor proxy sgnrs cooprat, a val proxy sgnatur can b crat As shown n sub-scton 3.2, f t or mor proxy sgnrs cooprat, C can gt D to gnrat th val proxy sgnatur Proxy sgnrs cannot ny that thy hav alray sgn th mssag. In aton, th orgnal sgnr cannot ny lgatng th sgnng capacty to th proxy sgnrs As shown n sub-scton 3.2, th proxy sgnr S s partal sgnatur g = ( x M h(x M)) mo N. Only S can gnrat th val partal proxy sgnatur, as S s prvat ky s unknown. C can us th collct partal sgnaturs g s to prov who th ral sgnr s. In th proxy sharng phas, S publshs {w, E, an N }, whr = (w E) mo N. Thrfor, S cannot ny lgatng th sgnng capacty to th proxy sgnrs Tm constrant th proxy sgnng kys can b us urng th lgaton pro. As shown n sub-scton 3.1, S computs mo ( ) G mo ( N), D = h(w) G mo N, an E N, whr G* E ( * )mo ( N ) 1. Thn S publshs {w, E, ((w E) mo N ) an N }. Th proxy sgnatur publc ky an th proxy sgnatur prvat ky ar th proucts of th warrant, an thrfor, th proxy sgnatur kys ar val only n th lgaton pro.

8 28 Y-F. Chang an C-C. Chang Known sgnrs - for ntrnal aut, th actual sgnrs of a gvn thrshol proxy sgnatur can b trmn. As shown n sub-scton 3.2, th proxy sgnr S s partal sgnatur g = ( x M h(x M)) mo N. Only S can gnrat th val partal proxy sgnatur. Thrfor, C can us th collct partal sgnaturs g s to prov who th ral sgnr s. 4.3 Rcommn practcs for managrs RSA cryptosystms ar us globally, an th RSA publc ky nfrastructur ar wll stablsh. Thus, plnty of applcatons nvolvng publc kys ar bas on RSA; for xampl gtal sgnatur, crtfcats an ky agrmnt. Dgtal sgnatur s th most common applcaton bcaus t provs authntcaton, ntgrty an non-rpuaton. Thy can b ralstcally appl to -commrc an offcal ocumnts, such as -chcks an -nvocs. All mportant ocumnts apply gtal sgnaturs to mak thm unforgabl. An mportant applcaton for offcal ocumnts s th proxy sgnatur. For xampl on partmnt managr alon may not b abl to manag th ntr partmnt an thus lgat th rsponsblty to othr managr(s). Th thrshol proxy sgnatur s sgn for such a scnaro. Th propos RSA proxy sgnatur schm aopts th wllstablsh RSA cryptosystm nsta of th scrt logarthm-bas cryptosystm. Ths allows th organsaton or company that wants to apply proxy sgnaturs to authors othrs to vlop th customr-spcfc proxy sgnatur systm ralstcally. 5 Concluson In ths papr, w rmy th flaws of Hwang, Lu an Ln (23) s (t, n) thrshol proxy sgnatur schm. As mnton abov, our propos schm can wthstan th scurty flaws of th arlr schm. Morovr, t offrs th convnnc of choosng th ntts at wll. Consquntly, our propos schm s not only scur but also practcal. Rfrncs ElGamal, T. (1985) A publc ky cryptosystm an a sgnatur schm bas on scrt logarthms, IEEE Transactons on Informaton Thory, Vol. 31, pp Hsu, C.L., Wu, T.S. an Wu, T.C. (21) Nw nonrpuabl thrshol proxy sgnatur schm wth known sgnrs, Th Journal of Systms an Softwar, Vol. 58, pp Huang, H.F. an Chang, C.C. (23) An ffcnt an practcal (t, n) thrshol proxy sgnatur schm wth known sgnrs, Funamnta Informatca, Vol. 56, pp Hwang, M.S., Ln, I.C. an Lu, J.L. (2) A scur nonrpuabl thrshol proxy sgnatur schm wth known sgnrs, Informatca, Vol. 11, pp.1 8. Hwang, M.S., Lu, J.L. an Ln, I.C. (23) A practcal (t, n) thrshol proxy sgnatur schm bas on th RSA cryptosystm, IEEE Transactons on Knowlg an Data Engnrng, Vol. 15, pp Km, S., Part, S. an Won, D. (1997) Proxy sgnatur, rvst, Papr prsnt at th Intrnatonal Confrnc on Informaton an Communcaton Scurty ICICS 97, Bng, Chna, pp In procngs. Mombo, M., Usua, K. an Okamoto, E. (1996) Proxy sgnatur: lgaton of th powr to sgn mssags, IEICE Transactons on Funamntals, Vol. E79-A, pp

9 An RSA-bas (t, n) thrshol proxy sgnatur schm 29 Prsn, T.P. (1991a) Dstrbut provrs wth applcatons to unnabl sgnaturs, Papr prsnt at th EUROCRYPT 91, Brghton, Englan, pp In procngs. Prsn, T.P. (1991b) A thrshol cryptosystm wthout a trust party, Papr prsnt at th EUROCRYPT 91, Brghton, Englan, pp In procngs. Rvst, R.L., Shamr, A. an Alman, L.M. (1978) A mtho for obtanng gtal sgnaturs an publc-ky cryptosystms, Communcatons of th ACM, Vol. 21, pp Schnorr, C. (1991) Effcnt sgnatur gnraton by smart cars, Cryptology, Vol. 4, pp Shamr, A. (1979) How to shar a scrt, Communcatons of th ACM, Vol. 22, pp Sun, H.M. (1999a) An ffcnt nonrpuabl thrshol proxy sgnatur schm wth known sgnrs, Computr Communcatons, Vol. 22, pp Sun, H.M., (1999b) Thrshol proxy sgnaturs, Papr prsnt at th Computrs an Dgtal Tchnqus, Vol. 146, pp In IEE procngs. Wang, G., Bao, F., Zhou, J. an Dng, R.H. (24a) Commnts on a practcal (t, n) thrshol proxy sgnatur schm bas on th RSA cryptosystm, IEEE Transactons on Knowlg an Data Engnrng, Vol. 16, pp Wang, G., Bao, F., Zhou, J. an Dng, R.H. (24b) Scurty analyss of som proxy sgnaturs, Papr prsnt at th Intrnatonal Confrnc on Informaton Scurty an Cryptology ICICS 3, Mongola, Chna, pp In procngs. Zhang, K. (1997) Thrshol proxy sgnatur schms, Papr prsnt at th Informaton Scurty Workshop ISW 97, Calforna, USA, pp In procngs.

Authenticated Encryption. Jeremy, Paul, Ken, and Mike

Authenticated Encryption. Jeremy, Paul, Ken, and Mike uthntcatd Encrypton Jrmy Paul Kn and M Objctvs Examn thr mthods of authntcatd ncrypton and dtrmn th bst soluton consdrng prformanc and scurty Basc Componnts Mssag uthntcaton Cod + Symmtrc Encrypton Both

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

Improved PKC Provably Secure against Chosen Cipher text Attack

Improved PKC Provably Secure against Chosen Cipher text Attack Intrntonl Journl on Computtonl Scncs & Applctons (IJCSA) Vo3, No, Frury 203 Improv PKC Provly Scur gnst Chosn Cphr txt Attck Sushm Prhn Brnr Kumr Shrm 2 School of Stus n Mthmtcs, Pt Rv Shnkr Shukl Unvrsty,

More information

Protecting E-Commerce Systems From Online Fraud

Protecting E-Commerce Systems From Online Fraud Protctng E-Commrc Systms From Onln Fraud Frst Author P.PhanAlkhya Studnt, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng & Tchnology, ongol, Andhra Pradsh, Inda. Scond Author Sk.Mahaboob Basha

More information

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Non-Linear and Unbalanced Three-Phase Load Static Compensation with Asymmetrical and Non Sinusoidal Supply

Non-Linear and Unbalanced Three-Phase Load Static Compensation with Asymmetrical and Non Sinusoidal Supply Non-Lnar and nbalancd Thr-Phas Load Statc Comnsaton wth Asymmtrcal and Non Snusodal Suly Rys S. Hrrra and P. Salmrón Elctrcal Engnrng Dartmnt Escula Poltécnca Suror, nvrsty of Hulva Ctra. Palos d la Frontra,

More information

Term Structure of Interest Rates: The Theories

Term Structure of Interest Rates: The Theories Handou 03 Econ 333 Abdul Munasb Trm Srucur of Inrs Ras: Th Thors Trm Srucur Facs Lookng a Fgur, w obsrv wo rm srucur facs Fac : Inrs ras for dffrn maurs nd o mov oghr ovr m Fac : Ylds on shor-rm bond mor

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

B-285141. April 21, 2000. The Honorable Charles B. Rangel Ranking Minority Member Committee on Ways and Means House of Representatives

B-285141. April 21, 2000. The Honorable Charles B. Rangel Ranking Minority Member Committee on Ways and Means House of Representatives Unit Stats Gnral Accounting Offic Washington, DC 20548 Halth, Eucation, an Human Srvics Division B-285141 April 21, 2000 Th Honorabl Charls B. Rangl Ranking Minority Mmbr Committ on Ways an Mans Hous of

More information

QUANTITATIVE METHODS CLASSES WEEK SEVEN

QUANTITATIVE METHODS CLASSES WEEK SEVEN QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Sun Synchronous Orbits for the Earth Solar Power Satellite System

Sun Synchronous Orbits for the Earth Solar Power Satellite System Sun Synchrnus Orbts fr th Earth Sar Pwr Satt Systm Sm f th mst prmsng rbts fr th Earth Sar Pwr Systm ar crcuar Sun synchrnus rbts whch nvr ntr Earth's shaw. In ths rbts, gravty grant stabz "pwr twrs" w

More information

Online Load Balancing and Correlated Randomness

Online Load Balancing and Correlated Randomness Onln Load Balancng and Corrlatd Randomnss Sharayu Moharr, Sujay Sanghav Wrlss Ntworng and Communcatons Group (WNCG) Dpartmnt of Elctrcal & Computr Engnrng Th Unvrsty of Txas at Austn Austn, TX 787, USA

More information

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book. Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl

More information

Adverse Selection and Moral Hazard in a Model With 2 States of the World

Adverse Selection and Moral Hazard in a Model With 2 States of the World Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,

More information

Entity-Relationship Model

Entity-Relationship Model Entity-Rlationship Modl Kuang-hua Chn Dpartmnt of Library and Information Scinc National Taiwan Univrsity A Company Databas Kps track of a company s mploys, dpartmnts and projcts Aftr th rquirmnts collction

More information

Reputation Management for DHT-based Collaborative Environments *

Reputation Management for DHT-based Collaborative Environments * Rputaton Managmnt for DHT-basd Collaboratv Envronmnts * Natalya Fdotova, Luca Vltr Unvrsty of Parma, Italy Abstract Ths artcl addrsss a problm of ntgraton of rputaton managmnt mchansms and lookup procsss

More information

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13) con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc

More information

Enabling Public Audit Ability and Data Dynamics for Storage Security in Cloud Computing Data Integrity Proofs In Cloud Storage

Enabling Public Audit Ability and Data Dynamics for Storage Security in Cloud Computing Data Integrity Proofs In Cloud Storage IOSR Jurnal f Cmputr Engnrng (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Vlum 6, Issu 1 (Sp-Oct. 2012), PP 06-11 Enablng Publc Audt Ablty and Data Dynamcs fr Strag Scurty n Clud Cmputng Data Intgrty Prfs

More information

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among

More information

is knowing the car market inside out.

is knowing the car market inside out. Exprts s knowng th car markt nsd out. Vokswagn Group Lasng s both a ft managmnt company and a dvson of Vokswagn Fnanca Srvcs (UK) Lmtd. Ths aows us to offr a comprhnsv rang of srvcs wth packags to sut

More information

5.4 Exponential Functions: Differentiation and Integration TOOTLIFTST:

5.4 Exponential Functions: Differentiation and Integration TOOTLIFTST: .4 Eponntial Functions: Diffrntiation an Intgration TOOTLIFTST: Eponntial functions ar of th form f ( ) Ab. W will, in this sction, look at a spcific typ of ponntial function whr th bas, b, is.78.... This

More information

Part 2 - Notes on how to complete your application form

Part 2 - Notes on how to complete your application form Tuton F Loan applcaton nots for nw part-tm studnts 2012/13 About ths nots Ths nots should b rad along wth your Tuton F Loan applcaton form. Th nots ar splt nto thr parts: Part 1 - Gnral nformaton Part

More information

ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS

ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS IFORTIO D OUITIO TEHOLOGIES D SERVIES, VOL. 9, O., RH 2 7 ERLG FORUL D ITS USE I THE LL ETERS Er HROY., Tbor ISUTH., atj KVKY. Dpartmnt of Tlcommuncatons, Faculty of Elctrcal Engnrng and Informaton Tchnology,

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN 077-358 IJTPE Journal www.iotp.com ijtp@iotp.com Sptmbr 015 Issu 4 Volum 7

More information

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam DEGREES OF EQUIVALECE I A EY COMPARISO Thang H. L., guyen D. D. Vetnam Metrology Insttute, Aress: 8 Hoang Quoc Vet, Hano, Vetnam Abstract: In an nterlaboratory key comparson, a ata analyss proceure for

More information

GIBBS ENSEMBLE AND SOCKETON ESSENTIAL COMPONENTS FOR CREATING CLOUD COMPUTING

GIBBS ENSEMBLE AND SOCKETON ESSENTIAL COMPONENTS FOR CREATING CLOUD COMPUTING Intrnatonal Journal on Cloud Computng: Srvcs and Archtctur (IJCCSA),Vol.3, o.3, Jun 013 GIBBS SMBL AD SOCKTO SSTIAL COMPOTS FOR CRATIG CLOUD COMPUTIG I ITRT SYSTM Xaoquan Gao Rchrch t Dévloppmnt Drcton

More information

A Note on Approximating. the Normal Distribution Function

A Note on Approximating. the Normal Distribution Function Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and

More information

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA 2009 Intrnatonal Confrnc on Advancd Informaton Ntworkng and Applcatons Rlablty-Drvn Rputaton Basd Schdulng for Publc-Rsourc Computng Usng GA Xaofng Wang #, Ch Shn Yo*, Rakumar Buyya* 2, Jnshu Su # 2 #Collg

More information

Modern Portfolio Theory (MPT) Statistics

Modern Portfolio Theory (MPT) Statistics Modrn Portfolo Thory (MPT) Statstcs Mornngstar Mthodology Papr Novmr 30, 007 007 Mornngstar, Inc. All rghts rsrvd. Th nformaton n ths documnt s th proprty of Mornngstar, Inc. Rproducton or transcrpton

More information

Category 7: Employee Commuting

Category 7: Employee Commuting 7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil

More information

Tax Collection, Transfers, and Corruption: the Russian Federation at the Crossroads 1)

Tax Collection, Transfers, and Corruption: the Russian Federation at the Crossroads 1) ÝÊÎÍÎÌÈ ÅÑÊÈÉ ÆÓÐÍÀË ÂØÝ ¹ 1 2003 3 ÂÎÏÐÎÑÛ ÒÅÎÐÈÈ Tax Collcton, Transfrs, and Corrupton: th Russan Fdraton at th Crossroads 1) M. Mokhtar, I. Grafova Abstract Aftr thortcally consdrng th problms of tax

More information

VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP. 122-155

VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP. 122-155 Ensayos sobr POÍTICA ECONÓMICA PENSION FUND MANAGERS AND THE STRUCTURE OF THE FOREIGN EXCHANGE MARKET HERNANDO VARGAS YANNETH ROCÍO BETANCOURT ENSAYOS SOBRE POÍTICA ECONÓMICA, VO. 25, NÚM. 54, EDICIÓN

More information

Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack

Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack Intrntonl Journl of ppld Oprtonl Rsrch Vol 1, No 1, pp 7-17, Summr 011 Journl hompg: wwworlur Constrnd Rnwl Rsourc llocton n Fuzzy Mtgrphs v Mn- Slck S S Hshmn* Rcvd: Jnury 31, 011 ; ccptd: My 1, 011 strct

More information

PRACTICAL ADVANTAGES OF USING THE MECHANICS OF CONTINUUM TO ANALYSE DEFORMATIONS OBTAINED FROM GEODETIC SURVEY

PRACTICAL ADVANTAGES OF USING THE MECHANICS OF CONTINUUM TO ANALYSE DEFORMATIONS OBTAINED FROM GEODETIC SURVEY PRACTICAL ADVANTAGES OF USING THE MECHANICS OF CONTINUUM TO ANALYSE DEFORMATIONS OBTAINED FROM GEODETIC SURVEY Mlan TALICH Rsarch Insttut of Godsy, Topography and Cartography, Zdby 98, CZ-5 66, Czch Rpublc

More information

The influence of advertising on the purchase of pharmaceutical products

The influence of advertising on the purchase of pharmaceutical products Th nflunc of advrtsng on th purchas of pharmacutcal products Jana VALEČKOVÁ, VŠB-TU Ostrava Abstract Th sz of th pharmacutcal markt and pharmacutcal sals s ncrasng constantly. Th markt s floodd wth nw

More information

Rural and Remote Broadband Access: Issues and Solutions in Australia

Rural and Remote Broadband Access: Issues and Solutions in Australia Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity

More information

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Logo Design/Development 1-on-1

Logo Design/Development 1-on-1 Logo Dsign/Dvlopmnt 1-on-1 If your company is looking to mak an imprssion and grow in th marktplac, you ll nd a logo. Fortunatly, a good graphic dsignr can crat on for you. Whil th pric tags for thos famous

More information

TRACKING PERFORMANCE OF GPS RECEIVERS WITH MORE THAN ONE MULTIPATH

TRACKING PERFORMANCE OF GPS RECEIVERS WITH MORE THAN ONE MULTIPATH TRACKING ERFORANCE OF GS RECEIVERS WITH ORE THAN ONE ULTIATH ABSTRACT Chrstoph ACABIAU, Bnoît ROTURIER, Abdlahad BENHALLA CNS Rsarch Laboratory of th ENAC, ENAC, 7 avnu Edouard Bln, B 45, 3155 TOULOUSE

More information

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian

More information

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

Data Encryption and Decryption Using RSA Algorithm in a Network Environment IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics

More information

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions CPS 22 Thory of Computation REGULAR LANGUAGES Rgular xprssions Lik mathmatical xprssion (5+3) * 4. Rgular xprssion ar built using rgular oprations. (By th way, rgular xprssions show up in various languags:

More information

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131 Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,

More information

Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration

Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration Procdns of th 43rd Hawa Intrnatonal Confrnc on Systm Scncs - 2010 Manan th Outsourcn of Two-Lvl Srvc Procsss: Ltratur Rvw and Intraton Edal Pnkr Unvrsty of Rochstr pnkr@smon.rochstr.du Robrt Shumsky Dartmouth

More information

No 28 Xianning West Road, Xi an No 70 Yuhua East Road, Shijiazhuang. yongchunliang@hotmail.com

No 28 Xianning West Road, Xi an No 70 Yuhua East Road, Shijiazhuang. yongchunliang@hotmail.com On-Ln Dynamc Cabl Ratng for Undrground Cabls basd on DTS and FEM Y.C.Lang *, Y.M.L School of Elctrcal Engnrng * Dpartmnt of Elctrcal and Informaton X an Jaotong Unvrsty Hb Unvrsty of Scnc and Tchnology

More information

Who uses our services? We have a growing customer base. with institutions all around the globe.

Who uses our services? We have a growing customer base. with institutions all around the globe. not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt

More information

Hardware Modules of the RSA Algorithm

Hardware Modules of the RSA Algorithm SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,

More information

Use a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects

Use a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects Chaptr 3: Entity Rlationship Modl Databas Dsign Procss Us a high-lvl concptual data modl (ER Modl). Idntify objcts of intrst (ntitis) and rlationships btwn ths objcts Idntify constraints (conditions) End

More information

Buffer Management Method for Multiple Projects in the CCPM-MPL Representation

Buffer Management Method for Multiple Projects in the CCPM-MPL Representation Industra ngnrng & Managmnt Systms Vo No 4 Dcmbr 22 pp.397-45 ISSN 598-7248 ISSN 2234-6473 http://dx.do.org/.7232/ms.22..4.397 22 KII Buffr Managmnt Mthod for Mutp Projcts n th CCPM-MP Rprsntaton Nguyn

More information

Life Analysis for the Main bearing of Aircraft Engines

Life Analysis for the Main bearing of Aircraft Engines f Analyss for th Man barng of Arcraft Engns Png n a, Xaolng Zhang a, png H a, anglang Dng a a School of Mchancs, Elctronc, and Industral Engnrng, Unvrsty of Elctronc Scnc and Tchnology of Chna, Chngdu,

More information

C H A P T E R 1 Writing Reports with SAS

C H A P T E R 1 Writing Reports with SAS C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

A Probabilistic Approach to Latent Cluster Analysis

A Probabilistic Approach to Latent Cluster Analysis Procdngs of th Twnty-Thrd Intrnatonal Jont Confrnc on Artfcal Intllgnc A Probablstc Approach to Latnt Clstr Analyss Zhpng X R Dong, Zhnghng Dng, Zhnyng H, Wdong Yang School of Comptr Scnc Fdan Unrsty,

More information

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability

More information

A Secure Web Services for Location Based Services in Wireless Networks*

A Secure Web Services for Location Based Services in Wireless Networks* A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution

Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution Mnnum Vrtx Covr n Gnralzd Random Graphs wth Powr Law Dgr Dstrbuton André L Vgnatt a, Murlo V G da Slva b a DINF Fdral Unvrsty of Paraná Curtba, Brazl b DAINF Fdral Unvrsty of Tchnology - Paraná Curtba,

More information

A Generalized Temporal and Spatial Role-Based Access Control Model

A Generalized Temporal and Spatial Role-Based Access Control Model 92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: swang@mal.cpu.edu.tw

More information

Personalized Web Search by User Interest Hierarchy

Personalized Web Search by User Interest Hierarchy Prsonalzd Wb arch by Usr Intrst Hrarchy Abstract Most of th wb sarch ngns ar dsgnd to srv all usrs, ndpndnt of th nds of any ndvdual usr. Prsonalzaton of wb sarch s to carry out rtrval for ach usr ncorporatng

More information

A Graph-based Proactive Fault Identification Approach in Computer Networks

A Graph-based Proactive Fault Identification Approach in Computer Networks A Graph-basd Proacti Fault Idntification Approach in Computr Ntworks Yijiao Yu, Qin Liu and Lianshng Tan * Dpartmnt of Computr Scinc, Cntral China Normal Unirsity, Wuhan 4379 PR China E-mail: yjyu, liuqin,

More information

A Project Management framework for Software Implementation Planning and Management

A Project Management framework for Software Implementation Planning and Management PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Magic Message Maker Amaze your customers with this Gift of Caring communication piece

Magic Message Maker Amaze your customers with this Gift of Caring communication piece Magic Mssag Makr maz your customrs with this Gift of aring communication pic Girls larn th powr and impact of crativ markting with this attntion grabbing communication pic that will hlp thm o a World of

More information

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind Dfining Rtirmnt Succss for Dfind Contribution Plan Sponsors: Bgin with th End in Mind David Blanchtt, CFA, CFP, AIFA Had of Rtirmnt Rsarch Morningstar Invstmnt Managmnt david.blanchtt@morningstar.com Nathan

More information

An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem

An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem Informton urnc n Scurt Lttr (00) 09-034 n ID-B Puc K rptotm on Intgr Fctorng n Dou Dcrt Logrthm Prom hnrhkhr Mhrm Shm Sunr grw Dprtmnt of pp Mthmtc Shr Shnkrchr Engnrng og Junwn Bh (G) In Em: c_mhrm@rffmcom

More information

Control of Perceived Quality of Service in Multimedia Retrieval Services: Prediction-based mechanism vs. compensation buffers

Control of Perceived Quality of Service in Multimedia Retrieval Services: Prediction-based mechanism vs. compensation buffers 1 Control of Prcvd Qualty of Srvc n ultmda Rtrval Srvcs: Prdcton-basd mchansm vs. compnsaton buffrs Aurlo La Cort, Alfo Lombardo, Srgo Palazzo, Govann Schmbra Isttuto d Informatca Tlcomuncazon, Unvrsty

More information

AP Calculus AB 2008 Scoring Guidelines

AP Calculus AB 2008 Scoring Guidelines AP Calculus AB 8 Scoring Guidlins Th Collg Board: Conncting Studnts to Collg Succss Th Collg Board is a not-for-profit mmbrship association whos mission is to connct studnts to collg succss and opportunity.

More information

Lecture 20: Emitter Follower and Differential Amplifiers

Lecture 20: Emitter Follower and Differential Amplifiers Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.

More information

Free ACA SOLUTION (IRS 1094&1095 Reporting)

Free ACA SOLUTION (IRS 1094&1095 Reporting) Fr ACA SOLUTION (IRS 1094&1095 Rporting) Th Insuranc Exchang (301) 279-1062 ACA Srvics Transmit IRS Form 1094 -C for mployrs Print & mail IRS Form 1095-C to mploys HR Assist 360 will gnrat th 1095 s for

More information

Application form notes

Application form notes 24+ Advancd Larnng Loan Applcaton form nots Rmmbr you can apply onln. It s quck and asy. Go to www.gov.uk/advancdlarnngloans About 24+ Advancd Larnng Loans Ths loans ar avalabl for larnrs who ar: studyng

More information

IBM Healthcare Home Care Monitoring

IBM Healthcare Home Care Monitoring IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv scausi@ca.ibm.com IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis

More information

Taiwan Stock Forecasting with the Genetic Programming

Taiwan Stock Forecasting with the Genetic Programming Procings of th 2011 Confrnc on Tchnologis an Applications of Artificial Intllignc (TAAI 2011) Taiwan Stock Forcasting with th Gntic Programming Siao-Ming Jhou, Chang-Biau Yang an Hung-Hsin Chn Dpartmnt

More information

Continuity Cloud Virtual Firewall Guide

Continuity Cloud Virtual Firewall Guide Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY

More information

Derivation of Humidty and NOx Humidty Correction Factors

Derivation of Humidty and NOx Humidty Correction Factors (Ths document follows the presentatons n "Vapor Pressure Equaton for Water n the Range 0 to 00 C", by Arnold Wexler and Lews Greenspan, February 9, 97 JOURNAL OF RESEARCH of the Natonal Bureau of Standards

More information

How To Write A Recipe Card

How To Write A Recipe Card Employng Rlvanc Fdback to mbd Contnt and Srvc Importanc nto th Slcton Procss of Compost Cloud Srvcs Dmosthns Kyrazs, Nkolaos Doulams, Gorg Kousours, Andras nychtas, arnos Thmstoclous, Vasslos C. Vscouks

More information

The international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole

The international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole Th intrnational Intrnt sit of th goviticultur MCC systm L sit Intrnt intrnational du systèm CCM géoviticol Flávio BELLO FIALHO 1 and Jorg TONIETTO 1 1 Rsarchr, Embrapa Uva Vinho, Caixa Postal 130, 95700-000

More information

Gold versus stock investment: An econometric analysis

Gold versus stock investment: An econometric analysis Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin

More information

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W Cllo Tchnology LG has introducd th NON 2, with nwly dvlopd Cllo Tchnology which improvs prformanc and rliability. Up to 320W 300W Cllo Tchnology Cll Connction Elctrically Low Loss Low Strss Optical Absorption

More information

RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs

RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs RSA Cryptography usng Desgne Processor an McroBlaze Soft Processor n FPGAs M. Nazrul Islam Monal Dept. of CSE, Rajshah Unversty of Engneerng an Technology, Rajshah-6204, Banglaesh M. Al Mamun Dept. of

More information

Electronic Commerce. and. Competitive First-Degree Price Discrimination

Electronic Commerce. and. Competitive First-Degree Price Discrimination Elctronic Commrc and Comptitiv First-Dgr Pric Discrimination David Ulph* and Nir Vulkan ** Fbruary 000 * ESRC Cntr for Economic arning and Social Evolution (ESE), Dpartmnt of Economics, Univrsity Collg

More information

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly

More information

Architecture of the proposed standard

Architecture of the proposed standard Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th

More information

Cryptanalysis of and improvement on the Hwang Chen multi-proxy multi-signature schemes

Cryptanalysis of and improvement on the Hwang Chen multi-proxy multi-signature schemes Applied Mathematics and Computation 167 (2005) 729 739 www.elsevier.com/locate/amc Cryptanalysis of and improvement on the Hwang Chen multi-proxy multi-signature schemes Yuh-Dauh Lyuu a,b,1, Ming-Luen

More information

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng

More information

Operation Transform Formulae for the Generalized. Half Canonical Sine Transform

Operation Transform Formulae for the Generalized. Half Canonical Sine Transform Appl Mhmcl Scnc Vol 7 3 no 33-4 HIKARI L wwwm-hrcom Opron rnorm ormul or h nrl Hl Cnoncl Sn rnorm A S uh # n A V Joh * # ov Vrh Inu o Scnc n Humn Amrv M S In * Shnrll Khnlwl Coll Aol - 444 M S In luh@mlcom

More information

Section 3: Logistic Regression

Section 3: Logistic Regression Scton 3: Logstc Rgrsson As our motvaton for logstc rgrsson, w wll consdr th Challngr dsastr, th sx of turtls, collg math placmnt, crdt card scorng, and markt sgmntaton. Th Challngr Dsastr On January 28,

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND

ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND 8 th Intrnatonal Confrnc of Modlng and Smulaton - MOSIM - May -2, 2 - Hammamt - Tunsa Evaluaton and optmzaton of nnovatv producton systms of goods and srvcs ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Advantageous Selection versus Adverse Selection in Life Insurance Market

Advantageous Selection versus Adverse Selection in Life Insurance Market Covr Pag Advantagous Slcton vrsus Advrs Slcton n f Insuranc Markt Ghadr Mahdav mahdav@conomcs.mbo.mda.kyoto-u.ac.j Post Doctoral Rsarch Assocat: Jaan Socty for th Promoton of Scnc JSPS, Graduat School

More information

Problem Set 6 Solutions

Problem Set 6 Solutions 6.04/18.06J Mathmatics for Computr Scic March 15, 005 Srii Dvadas ad Eric Lhma Problm St 6 Solutios Du: Moday, March 8 at 9 PM Problm 1. Sammy th Shar is a fiacial srvic providr who offrs loas o th followig

More information

REVIEW ON COMPARATIVE STUDY OF SOFTWARE PROCESS MODEL

REVIEW ON COMPARATIVE STUDY OF SOFTWARE PROCESS MODEL REVIEW ON COMPARATIVE STUDY OF SOFTWARE PROCESS MODEL Asmita 1, Kamlsh 2, Usha 3 1, 2, 3 Computr Scinc & Enginring Dpartmnt, M.D.U, (Inia) ABSTRACT This papr prsnts th stuy of various softwar procss mols..

More information

Initial inventory levels for a book publishing firm

Initial inventory levels for a book publishing firm Mőhlytaulmáy Vállalatgazdaságta Itézt 93 Budapst, Fıvám tér 8. (+36 ) 482-5566, Fax: 482-5567 www.u-crvus.hu/vallgazd Ital vtry lvls fr a b publshg frm Imr Dbs Ágs Wmmr 23. sz. Mőhlytaulmáy HU ISSN 786-33

More information

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives. Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud

More information