AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

Size: px
Start display at page:

Download "AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS"

Transcription

1 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence Electrcal Engneerng, Unversty of Mssour-Kansas Cty, MO 64110, USA [email protected] 2 Key Laboratory of Network Securty and Cryptology, Fuan Normal Unversty, Fuan, 35007, P. R. Chna ABSTRACT [email protected] Group communcaton mples a many-to-many communcaton and t goes beyond both one-to-one communcaton (.e., uncast) and one-to-many communcaton (.e., multcast). Unlke most user authentcaton protocols that authentcate a sngle user each tme, we propose a new type of authentcaton, called group authentcaton, that authentcates all users n a group at once. The group authentcaton protocol s specally desgned to support group communcatons. There s a group manager who s responsble to manage the group communcaton. Durng regstraton, each user of a group obtans an unque token from the group manager. Users present ther tokens to determne whether they all belong to the same group or not. The group authentcaton protocol allows users to reuse ther tokens wthout compromsng the securty of tokens. In addton, the group authentcaton can protect the dentty of each user. KEYWORDS User authentcaton; Group communcaton; Secret sharng; Ad hoc network; Strong t -consstency 1. INTRODUCTION User authentcaton s one of the most mportant securty servces n computer and communcaton applcaton. Knowledge based authentcaton (e.g., password) [16,9] and key based authentcaton (e.g., publc/prvate key) [7,12] are the two most popular approaches. Knowledge based authentcaton has some securty flaws. Most users lke to use smple and short passwords. However, Internet hackers can easly crack smple passwords. Publc-key based authentcaton needs a certfcate authorty (CA) to provde the authentcty of publc keys. In addton, publc-key computatons nvolve large ntegers. Computatonal tme s one of the man concerns for publc-key based authentcaton. All user authentcaton protocols [10,6] are one-to-one type of authentcaton where the prover nteracts wth the verfer to prove the dentty of the prover. For example, the RSA dgtal sgnature [13] s used to authentcate the sgner of the sgnature. In ths approach, the verfer sends a random challenge to the prover. Then, the prover dgtally sgns the random challenge and returns the dgtal sgnature of the challenge to the verfer. After successfully verfyng the dgtal sgnature, the verfer s convnced that the prover s the one wth the dentty of the publc key used to verfy the dgtal sgnature. In wreless communcatons, when a moble subscrber wants to establsh a connecton wth the base staton, the subscrber and the base staton nteract to DOI : /nsa

2 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 establsh mutual authentcaton. Mutual authentcaton can prevent an llegtmate subscrber from usng the servce and prevent the fake base staton from harmng the subscrber. Network applcatons are no longer ust one-to-one communcaton; but nvolve multple users ( 2). Group communcaton [14,2] mples a many-to-many communcaton and t goes beyond both one-to-one communcaton (.e., uncast) and one-to-many communcaton (.e., multcast). In ths paper, we propose a new type of authentcaton, called group authentcaton, whch authentcates all users n a group at once. The group authentcaton protocol s specally desgned to support group communcatons. The group authentcaton s defned to nvolve multple users and users want to convnce each other that they all belong to the same group wthout revealng ther denttes. In the group authentcaton, each user acts as both the prover and the verfer. Group authentcaton s extremely mportant n an ad hoc network because ths network s temporarly establshed by multple users and these users want to use ths network to exchange secret nformaton. Devsng protocols to provde group authentcaton n ad hoc networks s extremely challengng due to hghly dynamc and unpredctable topologcal changes. As a result, there are two popular models to provde group authentcaton servces n an ad hoc network. The frst model nvolves a centralzed authentcaton server (AS) [11,3] and the second model has no AS [5,4]. In the frst model, AS manages the access rghts of the network. For example, Bhakt et al. [3] proposed to adopt Extensble Authentcaton Protocol (EAP) n the IEEE 802.1x standard for wreless ad hoc network. Ths approach requres to set up the AS and have moble users to access to the AS servce. In fact, n some stuatons, the second model s the only way to provde group authentcaton. For example, n an ad-hoc network communcaton, there has no AS servce avalable to moble users. In the second model, each user needs to take n charge of authentcatng other users. In a straghtforward approach, f there are n users n the group, each user can use the one-to-one authentcaton protocol for n 1 tmes to authentcate other users. Computatonal tme s one of the maor concerns n ths approach. In ths paper, we ntroduce a specal type of group authentcaton whch provdes an effcent way to authentcate multple users belongng to the same group wthout revealng dentty of each user. Our proposed protocol s no longer a one-to-one type of authentcaton. It s a many-to-many type of authentcaton. Unlke most user authentcaton protocols that authentcate a sngle user each tme, our proposed protocol authentcates all users of a group at once. In our proposal, each user needs to regster wth a group manager (GM) to become a group user. Lke the trusted dealer n Shamr's (, tn ) secret sharng scheme [15], the GM needs to select a secret polynomal and compute token for each user. Based on these tokens, our protocol can establsh group authentcaton for all users at once. The group authentcaton protocol allows users to reuse ther tokens wthout compromsng the securty of tokens. Our proposed protocol supports exstng wreless communcaton network ncludng wreless ad hoc network. The rest of ths paper s organzed as follows. In next secton, we nclude some prelmnares. In Secton 3, we ntroduce the model of our proposed group authentcaton. In Secton 4, we present basc one-tme group authentcaton protocol; n Secton 5, we present group authentcaton protocol wthout revealng tokens. We conclude n Secton 6. 10

3 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May PRELIMINARIES 2.1. Revew of Shamr's secret sharng scheme [15] In Shamr's ( tn, ) secret sharng scheme based on the polynomal, there are n shareholders and a mutually trusted dealer. The scheme conssts of two algorthms: a) Share generaton algorthm: the dealer frst pcks a random polynomal of degree t 1, t 1 f( x) at 1x a1xa0 mod p, such that the secret s satsfes f (0) a0 s and all coeffcents, a 0,a 1,..a t-1 Z P, p s a prme wth p s. The dealer computes shares, f ( x ), for 1, 2,, n, and dstrbutes each share f ( x ) to shareholder U secretly. b) Secret reconstructon algorthm: t takes any t or more than t shares, for example, shares (.e., t n), ( x1, f( x1)),( x2, f( x2)),,( x, f( x)), as nputs, and outputs the secret s usng Lagrange nterpolatng formula as x s f( x ) mod p. r 1 r1, r x xr We note that the above algorthms satsfy the basc requrements of the secret sharng scheme, that are, (1) wth the knowledge of any t or more than t shares, shareholders can reconstruct the secret s ; and (2) wth the knowledge of any t 1 or fewer than t 1 shares, shareholders cannot obtan the secret s. Shamr's secret sharng scheme s uncondtonally secure snce the scheme satsfes these two requrements wthout makng any computatonal assumpton. For more nformaton on ths scheme, please refer to the orgnal paper [15] Harn and Ln's defnton on strong t -consstency [8] Benaloh [1] presented a noton of t -consstency to determne whether a set of shares s generated from a polynomal of degree t 1 at most. Recently, Harn and Ln [8] proposed a new defnton of strong t -consstency whch s the extenson of Benaloh's defnton. Defnton 1 (Strong t -consstency [8]). A set of n shares (.e., t n) s sad to be strong t - consstent f (a) any subset of t or more than t shares can reconstruct the secret, and (b) any subset of fewer than t shares cannot reconstruct the secret. It s obvous that f shares n Shamr's secret sharng scheme are generated by a polynomal wth degree t 1 exactly, then shares satsfy the securty requrements of a ( tn, ) secret sharng scheme and these shares are also strong t -consstent. Checkng strong t -consstency of n shares can be executed very effcently by usng Lagrange nterpolatng formula. In fact, to check whether n shares are strong t -consstent or not, t only needs to check whether the nterpolaton of n shares yelds a polynomal wth degree t 1 exactly. If ths condton s satsfed, we can conclude that all shares are strong t -consstent. However, f there are some llegtmate shares, the degree of the nterpolatng polynomal of these n shares s more than t 1 wth very hgh probablty. In other words, these n shares are most lkely to be not strong t -consstent. The property of strong t -consstency wll be used n Secton 5 of our protocol to check strong t -consstency of n shares wthout revealng tokens. 11

4 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May MODEL 3.1. Enttes a) Group Manager (GM): A group manager s responsble to regster users to form a group. The responsblty of GM s to ssue a secret token to each user durng regstraton. Later, authentcaton s based on the secret tokens. Snce tokens are used n authentcaton, denttes of users are protected. In order to prevent malcous users to reveal ther tokens to attackers, each token s a unque nteger. The secret tokens are shares of the polynomal generated by the GM. b) Group Users: Jon a group and become a group user, each user needs to regster wth the GM. After beng successfully regstered, each user receves a secret token from the GM. Each user wth a unque token can prevent malcous users to gve ther tokens to mpersonators. c) Attackers: We consder two types of attackers, the nsde attackers and the outsde attackers. The nsde attackers are users who are legtmate users and own legtmate tokens from the GM. We consder that the nsder attackers may collude to forge tokens for non-users. The outsde attackers are mpersonators who do not own any tokens and try to mpersonate users to fal the authentcaton protocol. We also assume that the GM does not collude wth any user. If the GM colludes wth any user by revealng the secret of the GM to the user, the colluded user can do harm to the group. In addton, we assume all users act honestly n the authentcaton. If any use acts dshonestly by revealng a nvald value, the authentcaton s faled Authentcaton outcomes There are only two possble outcomes of a group authentcaton; that are, ether yes or no. If the outcome s yes, t means that all users belong to the same group; otherwse, there are mpersonators. 4. BASIC ONE-TIME GROUP AUTHENTICATION PROTOCOL In the followng dscusson, we assume that there are n users, M1, M2,, Mn, regstered at the GM to form a group System set up Durng regstraton, GM constructs a random ( t 1) -th (.e., t n) degree polynomal f ( x ) wth f (0) s, and computes secret tokens of users as y f( x), for 1, 2,, n, where x s the publc nformaton assocated wth user M. GM sends each token y to user M secretly. GM makes H() s publcly known, where H s a one-way functon. Remark 1. The threshold t s an mportant securty parameter that affects the securty of group authentcaton protocols. Usng a ( tn, ) secret sharng scheme to ssue tokens n the regstraton can prevent up to t 1 nsde attackers, who are legtmate users, colluded together to forge tokens. 12

5 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May Basc one-tme group authentcaton protocol From now on, we assume that there are users wth ther tokens f ( x1), f( x2),, f( x ) where t n, who want to execute the group authentcaton protocol. The basc dea of ths protocol s that each user releases the token obtaned from the GM durng regstraton. If all released tokens are vald, the nterpolaton of the released tokens can reconstruct the secret s. The publshed one-way hash of the secret s used to compare wth the one-way hash of the reconstructed secret. Theorem 1. Protocol 1 can detect any number of llegtmate users. Proof. If there s llegtmate user who does not own a vald token on the polynomal f ( x ), the reconstructed secret wll be dfferent from the secret s. Thus, Protocol 1 can detect any number of llegtmate users. Protocol 1: One-tme group authentcaton protocol Step 1. Each user M reveals hs token f ( x ), to all other users smultaneously. Step 2. After knowng all tokens, f ( x ), for 1, 2,,, followng Lagrange nterpolatng xr formula, each user computes s f( x ) mod p. If H ( s) H( s), all 1 r1, r x xr users have been authentcated successfully; otherwse, there are llegtmate users. Remark 2. Ths s a one-tme authentcaton protocol snce the secret and tokens are revealed to all users n ths protocol. The authentcaton s no longer a one-to-one authentcaton and t s a many-to-many authentcaton. The proposed protocol s very effcent to authentcate multple users belongng to the same group wthout revealng dentty of each user. 5. GROUP AUTHENTICATION PROTOCOL WITHOUT REVEALING TOKENS In Protocol 1, snce tokens are revealed to all users, each token can only be used for one-tme authentcaton. In addton, the secret s s also exposed to users n Protocol 1. In the followng dscusson, we propose a way to protect tokens. In addton, the secret does not need to be recovered n each authentcaton. Our authentcaton s based on the property of strong t - consstency n Secton Group authentcaton protocol wthout revealng tokens In the followng protocol, t can be acheved authentcaton wthout revealng tokens and the secret. The basc dea of our approach uses the property of strong t -consstency. Let each user select a random polynomal wth ( t 1) -th degree and generate shares for other users. Then, each user releases the addtve sum of hs own token obtaned from the GM durng the regstraton and sum of shares of polynomals generated by users. Due to the property of secret 13

6 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 Protocol 2: Group authentcaton protocol wthout revealng tokens Step 1. Each user M selects a random polynomal, f ( x ), wth ( t 1) -th degree. For the polynomal f ( x ), user M computes shares as f( x r), for r 1, 2,,, r, for other users. User M sends each share, f( x r) to user M r secretly. Step 2. After recevng fr( x ) for r 1, 2,,, each user uses hs token f ( x ) to compute y f( x ) f ( x ) mod p. Each user releases hs value y. r r1 Step 3. After knowng y, for 1, 2,,, each user checks whether they are strong t - consstent. If they are not strong t -consstent, there are llegtmate users; else, all users have been successfully authentcated belongng to the same group. sharng homomorphsm n Secton 2.2, the released sums are shares of the secret polynomal f ( x ) of tokens and sum of polynomals generated by users. If all users act honestly and own vald tokens, the released sums should be strong t -consstent; otherwse, the released sums are not strong t -consstent. Snce users do not need to reconstruct the secret n the protocol and the tokens have not been revealed drectly, the dealer does not need to publsh the one-way of the secret s durng system set up and the tokens can be reused. Theorem 2. Protocol 2 can detect any number of llegtmate users. Proof. Due to the property of secret sharng homomorphsm, each released value, y n Step 2 s f ( x) f ( x) mod p, wth ( t 1) -th degree. the share of addtve sum of polynomals, Thus, n Step 3, all released values, r1 llegtmate user who does not own a vald token, f ( x ) 1, 2,, r y, for 1, 2,,, are strong t -consstent. If there s any, the released values, y, for, are not strong t -consstent wth very hgh probablty. Remark 3. In Step 2, the token f ( x ) cannot be computed from the revealed value y f( x ) f ( x ) mod p. Therefore, the tokens are protected uncondtonally and can r r1 be reused for multple authentcatons Computatonal complexty The most tme-consumng operaton for each user s to check the strong t -consstency of released values y for 1, 2,,, n Step 3 of Protocol 2. Followng our dscusson presented n Secton 2.2, checkng strong t -consstency needs to compute the nterpolatng polynomal of values y. The polynomal nterpolaton becomes the man computatonal task n our proposed protocol. However, the modulus p n our polynomal nterpolaton s much smaller than the 14

7 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 modulus n most publc-key cryptosystems, such as RSA cryptosystem [13]. In addton, not lke conventonal user authentcaton protocol that authentcates one user at a tme, ths proposed authentcaton protocol authentcates all users at once. Thus, the proposed authentcaton protocol s very effcent n comparng wth all exstng authentcaton protocols. 6. CONCLUSIONS We propose a specal type of group authentcaton whch s specally desgned for group communcatons such as the ad hoc wreless communcaton network. The proposed group authentcaton protocol s no longer a one-to-one type of user authentcaton and t s a many-tomany type of authentcaton that authentcates multple users at once. We frst propose an basc one-tme group authentcaton protocol and then propose a general group authentcaton protocol wthout revealng tokens. Our proposed group authentcaton s very effcent snce the computaton s based on the computaton of lnear polynomal. ACKNOWLEDGEMENTS Ths research s supported by the Natonal Natural Scence Foundatons of Chna under Grant No and the Natural Scence Foundaton of Fuan Provnce under Grant No. 2011J REFERENCES [1] Benaloh J. C., (1987) Secret sharng homomorphsms: keepng shares of a secret, n: Proceedngs of CRYPTO '86, LNCS 263, pp [2] Bruhadeshwar B. and Kulkarn S.S., (2011) Balancng revocaton and storage trade-offs n secure group communcaton, IEEE Transactons on Dependable and Secure Computng, 8 (1): [3] Catur Bhakt M. A., Abdullah A., and Jung L. T., (2007) EAP-based authentcaton for ad hoc network, n: Proc Semnar Nasonal Aplkas Teknolog Informas SNATI 07, pp. C-133-C [4] Caballero-Gl P. and Hernndez-Goya C., (2009) Self-organzed authentcaton n Moble ad-hoc networks, Journal of Communcatons and Networks, 11(5): [5] Capkun S., Buttyn, L. and Hubaux J. P., (2003) Self-organzed publc-key management for moble ad hoc networks, IEEE Transactons on moble computng, 2(1): [6] Das M. L., (2009) Two-factor user authentcaton n wreless sensor networks, IEEE Transactons on Wreless Communcatons, 8 (3): [7] Downnard I., (2002) Publc-key cryptography extensons nto Kerberos, IEEE Potentals, 21(5): [8] Harn L. and Ln C., (2010) Strong verfable secret sharng scheme, Informaton Scences, 180(16): [9] Ku W. C., (2005) Weaknesses and drawbacks of a password authentcaton scheme usng neural networks for multserver archtecture, IEEE Transactons on Neural Networks, 16(4), [10] Opplger R., Hauser R., and Basn D., (2008) SSL/TLS sesson-aware user authentcaton, Computer, 41(3): [11] Przada A. A. and McDonald C., (2004) Kerberos asssted authentcaton n moble ad-hoc networks, n: Proceedngs of the 27th Australasan Computer Scence Conference ACSC 04, 26(1), pp [12] Ren K., Yu S., Lou W., and Zhang Y., (2009) Mult-user broadcast authentcaton n wreless sensor networks, IEEE Transactons on Vehcular Technology, 58(8): [13] Rvest R., Shamr A., and Adleman L., (1978) A method for obtanng dgtal sgnatures and publckey cryptosystems, Communcatons of the ACM, 21 (2): [14] Sakarndr P. and Ansar N., (2010) Survey of securty servces on group communcatons, IET Informaton. Securty., 4(4): [15] Shamr A., (1979) How to share a secret, Communcatons of the ACM, 22(11):

8 Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 [16] Yan J., Blackwell A., Anderson R., and Grant A., (2004) Password memorablty and securty: Emprcal results, IEEE Securty & Prvacy Magazne, 2(5): Authors Len Harn receved the B.S. degree n electrcal engneerng from the Natonal Tawan Unversty n 1977, the M.S. degree n electrcal engneerng from the State Unversty of New York-Stony Brook n 1980, and the Ph.D. degree n electrcal engneerng from the Unversty of Mnnesota n In 1984, he oned the Department of Electrcal and Computer Engneerng, Unversty of Mssour- Columba as an assstant professor, and n 1986, he moved to Computer Scence and Telecommuncaton Program (CSTP), Unversty of Mssour, Kansas Cty (UMKC). Whle at UMKC, he went on development leave to work n Racal Data Group, Florda for a year. Hs research nterests nclude cryptography, network securty, and wreless communcaton securty. He has publshed a number of papers on dgtal sgnature desgn and applcatons and wreless and network securty. He has wrtten two books on securty. He s currently nvestgatng new ways of usng secret sharng n varous applcatons. Changlu Ln receved the BS degree and MS degree n mathematcs from the Fuan Normal Unversty, P.R. Chna, n 2002 and n 2005, respectvely, and receved the Ph.D degree n nformaton securty from the state key laboratory of nformaton securty, Graduate Unversty of Chnese Academy of Scences, P.R. Chna, n He works currently for the School of Mathematcs and Computer Scence, and the Key Laboratory of Network Securty and Cryptology, Fuan Normal Unversty. He s nterested n cryptography and network securty, and has conducted research n dverse areas, ncludng secret sharng, publc key cryptography and ther applcatons. 16

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh [email protected] Hovav Shacham [email protected] Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n

More information

Inter-domain Alliance Authentication Protocol Based on Blind Signature

Inter-domain Alliance Authentication Protocol Based on Blind Signature Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Practical PIR for Electronic Commerce

Practical PIR for Electronic Commerce Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna [email protected], [email protected]

More information

Mathematical Framework for A Novel Database Replication Algorithm

Mathematical Framework for A Novel Database Replication Algorithm I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono [email protected] Shouhua Xu Department of Computer Scence Unversty of Texas

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

A Generalized Temporal and Spatial Role-Based Access Control Model

A Generalized Temporal and Spatial Role-Based Access Control Model 92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: [email protected]

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing 1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

Certificate Revocation using Fine Grained Certificate Space Partitioning

Certificate Revocation using Fine Grained Certificate Space Partitioning Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles [email protected] Abstract A new certfcate revocaton system s presented.

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Fully Homomorphic Encryption Scheme with Symmetric Keys

Fully Homomorphic Encryption Scheme with Symmetric Keys Fully Homomorphc Encrypton Scheme wth Symmetrc Keys A Dssertaton submtted n partal fulfllment for the award of the Degree of Master of Technology n Department of Computer Scence & Engneerng (wth specalzaton

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

An Optimally Robust Hybrid Mix Network (Extended Abstract)

An Optimally Robust Hybrid Mix Network (Extended Abstract) An Optmally Robust Hybrd Mx Network (Extended Abstract) Markus Jakobsson and Ar Juels RSA Laboratores Bedford, MA, USA {mjakobsson,ajuels}@rsasecurty.com Abstract We present a mx network that acheves effcent

More information