3C-Auth: A New Scheme for Enhancing Security

Size: px
Start display at page:

Download "3C-Auth: A New Scheme for Enhancing Security"

Transcription

1 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan Harn) Department of Computer Scence and Engneerng & Amrta Unversty Amrtanagar P.O., Ettmada, Combatore , Inda (Emal: [email protected]) (Receved Aug. 1, 2013; revsed and accepted May 20 & Nov. 3, 2014) Abstract A mult factor authentcaton scheme called 3C-Auth s proposed n ths paper. The scheme carres out a comprehensve authentcaton process usng the smart card, secret-pn, regstered fnger prnt, and regstered moble number of the user. The user s password s nether transmtted n plantext form nor revealed to the authentcaton server. The scheme s shone to be proof aganst phshng, password guessng, replay, or stolen-verfer attacks. Resstance to parallel sesson and denal of servce attacks and the use of QR-Code n preference to SMS for OTP transfer together, make the scheme attractve for operaton under peak loads. Integraton of the 3C-Auth nto Mult-Layered Flterng (MLF) scheme leads to secure handlng of peak loads on the server ensurng concurrency and avalablty as well. Ths clearly enhances the QoS n terms of makng rght admttance to rght resources. Authentcaton, peak load, QR-code, smart- Keywords: card 1 Introducton As Internet servces become more popular and pervasve, a serous problem that arses s managng the performance of servces under ntense load. One of the most challengng problems for publc Internet s the delvery of performance targets to users gven the randomness of Web accesses. Internet has become ndspensable for busness and more and more people rely on t for ther day to day actvtes; n turn t evolves contnuously and s subject to more and more cyber securty threats. Analyss of securty breaches and other cyber securty ssues wth partcular focus on personal prvacy and data securty have been actve research ssues over the past two decades. A multfactor authentcaton scheme named 3C-Auth s presented n ths paper that uses true authentcaton to protect resources wth hgh securty requrements; t expects the user to possess all the tokens (smart-card, secret-pn, regstered fnger prnt and regstered moble phone) to prove hs/her dentty. Rest of the paper s organzed as follows: Relevant research n lterature whch forms the motvaton for the present work s revewed n Secton 2. Sectons 3 and 4 detal the proposed scheme and analyze ts performance. Integraton of the scheme wth MLF ( Mult Layer Flterng) archtecture [2, 3] s presented n Secton 5 and conclusons are n Secton 6. 2 Related Work 2.1 Internet Archtecture The changeover from the academc Internet to a multfunctonal busness Internet puts much hgher requrements on the archtectural supports to control and balance the nterests of all stake holders (lke users, servce provders, data owners, etc.). Ther hopes and expectatons for new applcatons and servces demand new archtectures that overcome the fundamental lmtatons of Internet lke lack of data dentty, lack of methods for relable processng, real-tme dspensaton, scalng to deal wth flash crowds, and so on. Snce ts creaton, the Internet s drven by a small set of fundamental desgn prncples rather than beng based on a proper formal archtecture that s created on a whte board by a standardzaton or research group. The archtectural prncples and desgn model of the Internet are all about processng, storng, transmttng and controllng data. Ths trend s bound to escalate n the future, pontng to a clear need for extensons, enhancements, and re-engneerng n Internet archtecture. Whle mprovements are needed n each dmenson, these should be cohesve demandng a holstc approach. The archtecture can be generalzed to sut dfferent categores of applcatons by ntegratng the admttance control polces that provde metrc based dfferentaton and consecutvely maxmze the proft earned for havng servced a certan class of requests [16]. Research n ths area has dentfed some key approaches to face overload, such as admsson control (per request, per sesson), request schedulng, servce dfferentaton, servce degradaton, and resource management.

2 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Current State of Internet Servces and Authentcaton Requrement The followng form the key features of the state of art of nternet servces: Generc nature; Accommodaton of technologcal nnovatons; Robustness at tmes of overload. As access to more and more servces s pushed onlne, the range of senstve nformaton that a user must protect wdens wth tme. It s also equally mportant to understand that complcated securty schemes wll not acheve wdespread adopton among Internet users. Today hackers have the opton of usng many technques to steal passwords such as shoulder surfng, snoopng, snffng, guessng, etc. Implyng that busnesses should use commensurate secure approach. The challenge here s to balance strong securty wth usablty. One Tme Passwords (OTPs) for sngle sesson/transacton usage have been dentfed as the best way of protectng onlne transactons. 2.3 Authentcaton Schemes In 1981, Lamport proposed a scheme to authentcate a remote user on a remote server over an nsecure network. The requrement for storng verfcaton tables used by the scheme was overcome by a scheme proposed n by [7]. Later [10] proposed a new remote authentcaton based on ElGamal crypto scheme explotng tamper resstance property of smart cards. Most of the remote dentty based remote authentcaton schemes proposed by researchers [7, 10, 13, 16] rely prmarly on passwords for securty. The schemes are vulnerable to dctonary attacks [6]. To overcome ths problem random cryptographc secret key could be used [14]. However, such large key values (are dffcult to be remembered and hence) requre to be stored somewhere. Further these strong passwords and secret keys fal to provde non repudaton. An authentcaton scheme of Khan et al and L et al uses bometrc keys wth advantages lke cannot be lost, dffcult to forge, cannot be guessed etc. [10] proposed an effcent bometrc based smart card authentcaton scheme. [7] showed that the scheme makes two assumptons to ensure ts correctness and securty that may restrct ts use for real tme applcatons. [8] proposes a generc framework for preservng securty n dstrbuted systems. The three factor authentcaton scheme n [7] s based on password, smart card and bometrc characterstcs. The authors clam two benefts n the usage of fuzzy extractor: Elmnaton of the assumpton of L-Hwangs scheme that stores the hash of bometrc template; Use of bometrc authentcaton that supports reasonable tolerance. In the analyss of ther scheme the authors have shown how ther protocol s secured aganst attackers of Type I (smart card and bometrc), Type II (password and Bometrc), and Type III (smart card and Password). Although the generc constructon proposed by Huang et al satsfes the securty requrements of three factor authentcaton the system may fal to secure resources that requre very hgh degree of securty the reason beng bometrc systems that are fast wth the false rejecton rate under 1% (together wth a reasonably low false acceptance rate) are rare even today. 2.4 Securty wth OTP Authentcaton of users n a dstrbuted envronment s an ncreasngly dffcult task. As network and software grow n sophstcaton so do means and methods of malcous attackers. Today computer crackers use enormous resources to obtan nformaton necessary to mpersonate other users. Authentcaton systems based on one tme passwords [5] provde more relablty than those based on remembered/stored ones. Hence, securty senstve ndustres (banks, government etc.) deploy one tme password systems to reduce the damage of phshng and spyware attacks SMS-OTP Most of the two factor authentcaton schemes authentcate users based on what they know and what they have, ncorporatng token-less second factor (e.g. moble). Each method has a reason to exst based on desgn crtera for the overall usage. Onlne bankng s a good example where strong remote authentcaton s guaranteed usng two-factors as de facto standard. In practce, the frst factor s usually n the form of PIN or password that the user types (for nstance) nto a web-based Internet applcaton. The second factor s usually n the form of moble phone that s known to be able to receve OTP as SMS drected to a partcular moble phone number. If the user successfully retypes ths OTP nto the web applcaton, the second authentcaton factor s regarded as successfully verfed (.e. the user has the moble phone). Securty of the aforesad scenaro reles on the practcal dffculty for an attacker to smultaneously compromse the operatng envronment of both the partcular phone and the web browser where the user part of the servng applcaton runs Problems wth SMS-OTP The man problems wth the SMS-OTP desgn are under overloaded stuatons. These are: Delay n delvery of SMS; Low Coverage Areas; Non-avalablty of Moble Phone;

3 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Downtme wth SMS Gateway; Non-avalablty of servce for roamng user; Hgh Cost for roamng user; Complexty assocated wth sequence of operatons n obtanng OTP from SMS when moble phone s used for connectng to the Internet Authentcaton Usng QR Code In 2002, Clarke et al. suggested the usage of camera-based devces as an alternatve but more secured authentcaton method for crtcal transactons wth un-trusted computers. Wth the explosve growth n the amount of cameraequpped smart phones around us moble based authentcaton [11] may become a popular authentcaton method n the near future. QR-code (a two-dmensonal barcode) - as ntroduced by Japanese company Denso-Wave n 1994 s a more effectve alternatve. Its error correcton capablty facltates data restoraton even under condtons when substantal parts of the code are damaged. Modern cellular phones are natvely equpped wth the QR-code decodng software. Fortunately, for camera phones that are not equpped wth QR-code readers, Quck-Mark and -ngma are free tools that are avalable for many manufactured models and devces to decode QR-Codes free of cost. Dependng on the data recognzed and the nature of the applcaton Summary of Fndngs Internet has become the most mportant platform for busness relatons and socal nteractons. The rapd growth of Internet of Thngs and Servces clearly shows that the ever ncreasng amount of physcal tems of our daly lfe whch become addressable through a network could be made more easly manageable and usable through the use of Internet servces. Ths course of exposed resources along wth the level of prvacy and value of the nformaton they hold, together wth ncrease n ther usage, has led to the escalaton n the number of securty threats and volaton attempts that exstng systems do not appear robust enough to address. Internet archtecture of tomorrow must meet the changng requrements of the Internet, ISPs (Internet Servce Provders), Users etc. Perhaps one of the most compellng problems of the modern Internet s the lack of a comprehensve and unfyng approach to deal wth servce concurrency, securty, and avalablty partcularly at tmes of overloads. It s also mportant to understand that the nternet and ts users are under contnuous attacks.e., securty s the underlyng problem for many of the Internet servces. One has to clearly understand that the mpact of an attack can be major, and can nclude costly and embarrassng servce dsruptons, down-tme, lost productvty, stolen data, regulatory fnes, and rrtated customers. Strong authentcaton has no precse defnton; t s not a strctly mathematcal concept wth quanttatve measurements but rather a qualtatve measure that s evaluated usng a relatve scale. The present sophstcaton level of hackers, demands authentcaton schemes to be based on more than one factor. Evaluatng mult-factor authentcaton solutons calls for a look nto the followng measures: Securty and scalablty of the technology; Hurdles to user adopton; Cost; Deployablty. 3 Proposed Scheme The prmary goal here s to enhance the performance of Mult-layered Flterng (MLF) scheme and enable real world applcatons to take advantage of ths added functonalty. A scheme that performs admsson control wth enhanced mult factor authentcaton called 3CAuth, s proposed n ths paper and the same evaluated for effcency. The scheme provdes true authentcaton by expectng the user to possess all the relevant tokens (smart card, secret-pn, regstered fnger prnt, and regstered moble phone) to prove hs/her dentty. The benefts of the scheme nclude: NOT revealng users password to the server; NOT transmttng passwords n plantext over the Internet, and at the same tme; RESISTING the major possble attacks lke replay attack, password guessng attack, stolen-verfer attack, and phshng attack. The scheme operates n two phases namely regstraton and logn-authentcaton. Table 1 s the notatons used n the two phases. 3.1 Regstraton Phase Fgure 1 depcts the actvtes n the regstraton process. As shown n Fgure 1 t nvolves the steps/actvtes n Algorthm 1. The sequence of operatons for regsterng ONE user s llustrated n Fgure Logn Phase When U wshes to logn to server (S), he/she must nsert the smart card nto a card reader, provde bometrc data BF, capture the QR code dsplayed on the web page, decrypt t usng the software nstalled n the moble, and present the OTP for authentcaton purpose. The sequence s shown n block dagram form n Fgure 3.

4 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Table 1: Table of notatons Notatons Descrpton U th User ID Unque Identfer of th User P W D Password of the th User d Prvate key n RSA e Publc key n RSA n Computed as product of chosen prme numbers (p and q) g Generator element prmtve to GF (p) and GF (q) SID Smart card Identfer of th User IMEI Internatonal Moble Staton Equpment Identty IMSI Internatonal moble subscrber dentty MID Unque Key for moble of th user R 1 and R 2 Random numbers chosen for verfcaton T s Tme at whch the request s generated BF Bometrc feature of th user Random Challenge (n ths context - One Tme Password) R c Fgure 1: Regstraton process Fgure 3: Logn phase Fgure 2: Regstraton process

5 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Algorthm 1 Steps n regstraton process 1: Begn 2: The user U chooses a password P W D and provdes hs/her bometrc feature BF. 3: The regstraton server sequences through the followng further steps: 4: whle More users to Regster do 5: Assgns an ID for the user and generates two large prme numbers p and q, and computes n = p q. For securty reasons, the lengths of p and q are recommended to be 512 bts at least. 6: Chooses ntegers e and d whch satsfy e d mod ((p 1) (q 1)) 1 Further t also fnds an nteger g whch s a prmtve element n both GF (p) and GF (q). 7: Generates a smart card dentfer SID for the user U. In addton t generates a moble phone dentfer: MID = (IMEI, IMSI) for the user U. 8: Calculates U s secret nformaton as S ID (SID d) mod n V g (d BF) mod n MS ID (MID d) mod n MV g (d P W D) mod n. 9: Stores (ID, SID, MID, S, V, MS, MV, n, e, g) n the smart card, nstalls an applcaton (for capturng and decodng QR code after obtanng secret pn from the user) n user s moble and ssues the smart card to the user U over a secure channel. 10: end whle 11: End Fgure 4: Authentcaton phase Algorthm 2 Verfcaton of possesson of bometrc characterstcs and smart card 1: Begn 2: Check f ID s a vald user dentty and SID s a legal smart card dentty; f not reject the logn request. 3: Check f T s s wthn the legal tme nterval lmt due to transmsson delay (may be ntalzed n SLAservce level agreement); f not reject the logn request. 4: Verfy f Y e? (ID (SID) X T s mod n); The above equaton holds ff BF = BF..e. the correct bometrc value s provded durng logn phase. That s because and Y e (R1 T s) (S V mod n) e ID (SID d e) g (d BF e R1) mod n. (Snce d e 1 mod n we have) ID (SID) 5: End ID (SID) g (BF R1) mod n (X T s ) ID (SID) g (BF R1) mod n; 3.3 Authentcaton Phase The authentcaton phase (Fgure 4) s executed by the remote host to determne whether U s allowed to logn or not. The steps n logn process are shown n Fgure 3. The authentcaton server upon recevng the logn request from the user verfes the possesson of smart card, bometrc feature, and moble phone as descrbed n Algorthms 2 and 3. 4 Strengths of 3C-Auth Resstance of the proposed method to dfferent possble securty attacks s explaned here. 4.1 Parallel Sesson Attack Here an attacker mpersonates a legtmate user by nterceptng the logn request (ID, SID, S, V, M, N, n, e, g, T s ) and attemptng to modfy t to succeed n authentcaton. However the attacker has no way of obtanng the Bometrc feature BF, P W D, and the random numbers R 1 and R 2 ; hence he/she cannot compute M, N, X, and Y whch are dependent on P W D and R 1 ; a vald request cannot be created and the attempt fals. Hence t follows that the proposed scheme s secured aganst ths type of attack. 4.2 Password Guessng Attack The attacker attempts to guess user s secret parameters here. Although, one can extract parameters (n, e, g, S, V, SM, V M ) from the user s smart card, obtanng BF or P W D from the smart card wthout the knowledge of d from g (d BF) and g (d BF), s not possble. Thus the dffculty of obtanng the dscrete logarthm secures the scheme from password guessng attack even under stolen smart card stuatons.

6 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Algorthm 3 Verfcaton of possesson of secret-pn and moble phone 1: Begn 2: Confrm f ID s a vald user dentty and MID s a legal moble phone dentty; f not reject the logn request. 3: Confrm f T s s wthn the legal tme nterval lmt due to transmsson delay (may be ntalzed n SLAservce level agreement), f not, reject the logn request. 4: Check whether the followng equaton holds: N e = M (Rc T s) mod n The equaton here holds ff R 2 = Rc.e the correct OTP s provded by the user durng logn phase. The correct OTP can be obtaned only n the moble on whch the applcaton software s nstalled durng regstraton phase and only f the password provded to t s correct. Ths s because ID (MID) (R2 T s) ID (MID d e) ID (MID) N e (MS MV and ID (MID) ) e mod n g (d P W D e R2 T s) mod n g (P W D R2 T s) mod n M (Rc T s) mod n ID (MID) g (P W D Rc T s) mod n; If the logn request s rejected three tmes the user account s locked. He/She has to contact regstraton server to unlock the account. 5: End 4.3 Resstance to Replay Attack Interceptng the logn request message (ID, SID, S, V, M, N, n, e, T s ) of a user U and replayng the same message to the server becomes useless because the card reader puts a new tmestamp n each new logn request. The equatons Y e ID (CID X) mod n and N e ID (MID) M r1 mod n wll fal durng the authentcaton phase. 4.4 Denal of Servce Attack In the proposed scheme an adversary can use nvald ID, PWD and BFs and overload the server by contnuously keepng t busy. Even though an ntal flterng for ths type of attacks takes place n Stage I of MLF archtecture non-legtmate requests that pass Stage I of MLF are blocked by the proposed scheme. Ths s obvous from the fact that a vald logn request cannot be created (as dscussed n Secton 4.1). Further after three unsuccessful attempts the scheme automatcally locks the user s account; the same can be unlocked only wth the help of regstraton server. 4.5 Resstance to Phshng Attacks The am of phshng s manly to collect prvate nformaton that can be used to mpersonate vctms. A possble readng of the QR code (and extractng the OTP) by a hacker yelds only the encrypted value of R 1 ; even f he manages to access the data typed by user, the prvate key remans naccessble thanks to the strength of the RSA scheme. Thus the phshng attempt fals. 5 Integraton of 3C-Auth wth MLF MLF s a practcal (secured-concurrent-avalable) end-toend framework based on admsson control polces - a strategy that acheves robust performance on a wde range of Internet servces subject to huge varaton n load. MPAC (Mult Phase Admsson Control) [3] enhances MLF to maxmze the reward earned for havng servced a partcular class of requests. 3C-Auth scheme descrbed here can be ntegrated wth ths enhanced MLF framework to make t more comprehensve by addng securty assurance. The ntegraton nvolves two steps namely: 1) Enhancng SLA to nclude new features specfc to authentcaton; 2) Modfyng admsson control polcy to support 3C- Auth. The 3C-Auth process s to be nserted at Stage II of the MLF framework at the Access Node component. Request processng n Stage II of the comprehensve MLF scheme s llustrated n Fgure Servce Level Agreement The SLA that spells out the scope of servce provders allotment to the e-commerce n terms of resource capacty and tme commtment used n MPAC s shown as follows: Contract: Ecommerce System Servce : Classfcaton of Customers Customer Class = Premum, Ordnary, New Inter-sesson States = Home, Browse, Item, Addcart, BuyReq, BuyConfrm Servce : Processng Requests (Peakload) Avalablty >$mnavalablty; TmeBound <$maxdelay; Throughput >$mnthroughput; Utlzaton <$maxutlzaton; WeghtAdjustment(Forward) = $weght(postve)

7 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Fgure 5: Request processng n Stage II of enhanced MLF (MLF+MPAC) WeghtAdjsutment(Backward) = $weght(zero,negatve) The template can be modfed to support 3C- Auth by ncludng the followng specfcatons: Securty: Authservce Servce : Servcename /* Generc */ Resource Class = Unclassfed, secret,topsecret Factors Class = Password/PIN, Hardwaretoken, Bo- Hard, Softtoken Protocol Class None, 2CAuth,3C-Auth Servce : News /* nstance*/ Resource Class Unclassfed Regstraton Factors Class Protocol Class None Servce : Internet Bankng /* Announcements regardng new schemes for loans Resources Class Unclassfed Regstraton Factors Class Protocol Class // Onlne bankng Resources Class topsecret Regstraton REQUIRED Factors Class PIN, Hardwaretoken (Smart card), Softtoken Protocol Class 2CAuth[3] 5.2 Admsson Control Polcy MPAC uses a reward functon defned by the applcaton/servce provder to mprove the QoS usng servce dfferentaton. It computes the Expected Reward and the Cost Incurred n servcng the request and uses them as basc parameters to prortze customers for E-commerce applcatons. The scheme can be made more comprehensve by re-computng prortes wth authentcaton factors as well, for better securty assurances. Ths s acheved n the comprehensve MLF framework (MLF + MPAC + 3C-Auth) as follows: Resources added to the pool are tagged wth weghts (based on SLA) that specfy the number of factors requred to access t; Incomng requests from Stage I are drected to the Access nodes by the publc server for authentcaton; The access nodes proceed to authentcate users by assgnng an ntal weght of 0 to each request and updatng t as per the credentals (number of factors) valdated; Possessed weghts are compared wth the tagged weghts assocated wth resources and n case of match n ther weghts access to the resource s permtted. 5.3 Results of Integraton The performance analyss demonstrated that the presented scheme performs a comprehensve authentcaton process satsfyng the mportant requrements ncludng frendlness, resstance to varous knds of sophstcated attacks, and stolen credentals. Further resstance offered by the scheme to parallel sesson attack and denal of servce attack made the scheme more sutable for operaton under peak loads. QR-Code based OTP has been found to show mproved performance at peak load tmes compared to SMS-OTP method. Wth nstantaneous SMS delvery the performance was on par wth that of SMS-OTP scheme. The vulnerablty assocated wth the n-absenta verfcaton of the user s effectvely handled by the scheme. Moreover, the scheme was found to be more user-frendly wthout sacrfcng securty assurances. Wth all these benefts contrbuton of the scheme towards mprovement n QoS n terms of grantng rght access to resources can be consdered sgnfcant.

8 Internatonal Journal of Network Securty, Vol.18, No.1, PP , Jan Dscussons and Conclusons The proposed protocol s smple, fast and effcent f the user provdes vald credentals for authentcaton. A detaled analyss of the proposed scheme has clearly brought out ts advantages over authorzaton methods that use SMS to thwart attacks. Moreover, the scheme aptly fts at the access nodes n the enhanced MLF archtecture makng t more user-frendly wthout sacrfcng securty assurances. Improvng n computatonal effcency of the scheme s an nterestng area of work; t can add substantally to ts effectveness. References [1] T. H. Feng, C. H. Lng, and M. S. Hwang, Cryptanalyss of Tan s mprovement on a password authentcaton scheme for mult-server envronments, Internatonal Journal of Network Securty, vol. 16, no. 4, pp , [2] N. Harn and T. R. Padmanabhan, A securedconcurrent-avalable archtecture for mprovng performance of web servers, n Proceedngs of 6th Internatonal Conference on Informaton Processng (ICIP 2012), pp , Bangalore, Inda, Aug , [3] N. Harn and T. R. Padmanabhan, Admsson control and request schedulng for secured-concurrentavalable Archtecture, Internatonal Journal of Computer Applcatons, vol. 63, no. 6, pp , [4] N. Harn and T. R. Padmanabhan, 2CAuth: A new two factor authentcaton scheme usng QR-code, Internatonal Journal of Engneerng and Technology (IJET), vol. 5, no. 2, pp , [5] N. Harn, T. R. Padmanabhan and C. K. Shyamala, Cryptography and Securty, Wley Inda, Frst Edton, [6] D. He, W. Zhao, and S. Wu, Securty analyss of a dynamc ID-based authentcaton scheme for multserver envronment usng smart cards, Internatonal Journal of Network Securty, vol. 15, no. 5, pp , [7] C. H. Huang, J. S. Chou, Y. Chen, Improved multserver authentcaton protocol, Internatonal journal of Securty and Communcaton Networks, vol. 5, no. 3, pp , [8] X. Huang, Y. Xang, A. Chonka, J. Zhou, and R. H. Deng, A generc framework for three-factor authentcaton: Preservng securty and prvacy n dstrbuted systems, IEEE Transactons on Parallel and Dstrbuted Systems, vol. 22, no. 8, pp , [9] Q Jang, J. Ma, G. L, and L Yang, Robust twofactor authentcaton and key agreement preservng user prvacy, Internatonal Journal of Network Securty, vol. 16, no. 3, pp , [10] C. T. L and M. S. Hwang, An effcent bometrcsbased remote user authentcaton scheme usng smart cards, Journal of Network and Computer Applcatons, vol. 33, no. 1, pp. 1 5, [11] K. C. Lao and W. H. Lee, A novel user authentcaton scheme based on QR-code, Journal of Networks, vol. 5, no. 8, pp , [12] J. J. Shen and P. W. Hsu, A fragle assocatve watermarkng on 2D barcode for data authentcaton, Internatonal Journal of Network Securty, vol. 7, no. 3, pp , [13] J. J. Shen, C. W. Ln and M. S. Hwang, Securty enhancement for the tmestamp-based password authentcaton, Computers and Securty, vol. 22, no. 7, pp , [14] H. Tang, X. Lu, L. Jang, A robust and effcent tmestamp-based remote user authentcaton scheme wth smart card lost attack resstance, Internatonal Journal of Network Securty, vol. 15, no. 6, pp , [15] A. Totok, V. Karamchet, RDRP: Reward-drven request prortzaton for e-commerce Web stes, Electronc Commerce Research and Applcatons, vol. 9, pp , [16] L Yang, J. F. Ma, and Q Jang, Mutual authentcaton scheme wth smart cards and password under trusted computng, Internatonal Journal of Network Securty, vol. 14, no. 3, pp , [17] X. Zhuang, C. C. Chang, Z. H. Wang, Y. Zhu, A smple password authentcaton scheme based on geometrc hashng functon, Internatonal Journal of Network Securty, vol. 16, no. 4, pp , N. Harn s an Assstant Professor n the department of Computer Scence and Engneerng, Amrta Vshwa Vdyapeetham. She has 3 years of ndustral and 15 years of teachng and research experence. She s currently pursung her Ph D n Securty. Her research nterests nclude cryptography, securty. She has currently co-authored a book on Cryptography and Securty. T. R. Padmanabhan wth MTech and PhD at the IIT Kharagpur, was n the faculty there from 1964 to Wth 20 years of development experence n the ndustry and an equal perod n academc nsttutons, he s currently a Professor Emertus at the Amrta School of Engneerng. Hs research nterests are securty, dgtal communcaton, and VLSI desgn. He has (co)authored fve books.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Determination of Integrated Risk Degrees in Product Development Project

Determination of Integrated Risk Degrees in Product Development Project Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

CONTENTS Introduction... 3

CONTENTS Introduction... 3 Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna [email protected], [email protected]

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 1 2011 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

One Click.. Ȯne Location.. Ȯne Portal...

One Click.. Ȯne Location.. Ȯne Portal... New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

CLOUD COMPUTING AUDIT

CLOUD COMPUTING AUDIT U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 3, 2015 ISSN 2286-3540 CLOUD COMPUTING AUDIT Georgana MATEESCU 1, Valentn SGÂRCIU 2 Ths paper presents a personal approach of conductng the audt process n cloud

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information