S., Cryptographic Key Agreement for Mobile Radio,
|
|
- Primrose Washington
- 8 years ago
- Views:
Transcription
1 DIGITAL SIGNAL PROCESSING 6, (1996) ARTICLE NO Cryptgraphic Key Agreement fr Mbile Radi Amer A. Hassan,* Wayne E. Stark, Jhn E. Hershey, and Sandeep Chennakeshu* *Ericssn Mbile Cmmunicatins Inc., 1 Triangle Drive, Research Triangle Park, Nrth Carlina 27709; EECS Department, The University f Michigan, Ann Arbr, Michigan 48109; and GE Crprate R&D, 1 River Rad, Schenectady, New Yrk Hassan, A. A., Stark, W. E., Hershey, J. E., and Chennakeshu, S., Cryptgraphic Key Agreement fr Mbile Radi, Digital Signal Prcessing 6 (1996), The prblem f establishing a mutually held secret cryptgraphic key using a radi channel is addressed. The perfrmance f a particular key distributin system is evaluated fr a practical mbile radi cmmunicatins system. The perfrmance measure taken is prbabilistic, and different frm the Shannn measure f perfect secrecy. In particular, it is shwn that by using a channel decder, the prbability f tw users establishing a secret key is clse t ne, while the prbability f an adversary generating the same key is clse t zer. The number f pssible keys is large enugh that exhaustive search is impractical. I. INTRODUCTION r 1996 Academic Press, Inc. The need fr secure data cmmunicatins in mbile systems is apparent. A brker r a banker might need t relay sensitive data t a selected custmer thrugh the radi channel. In ne-key cryptgraphic techniques, such as DES [1], a cmmn secret key is needed between such tw users. Key distributin and prtectin is an extremely imprtant aspect f secure cmmunicatins systems. Hwever, it is nt unlikely that the tw users d nt share a cmmn secret key a priri, but need t use a secure channel. In the case where tw users d nt share a cmmn key it is pssible t use tw-key public key cryptgraphy (PKC) such as described in [2]. As an explratin f an alternative t PKC, a technique prpsed in [3] demnstrated that characteristics f the radi channel might be used t the same effect. These characteristics are the cnfirmed shrt term reciprcity f the channel and the rapid spatial decrrelatin f phase in the radi channel; that is, fr an incrementally shrt perid f time, the impulse respnse f a channel viewed frm the antenna frm A t the antenna fr B is the same as the impulse respnse f the channel viewed frm B t A, excluding thermal nise. In this paper the perfrmance f the key management technique that was prpsed in [3] is evaluated fr the purpse f practical implementatin. In additin t prviding anther paradigm fr establishing a mutually held secret variable ver a public channel, the methd addressed in this paper is further mtivated by the fllwing cnsideratin. The ppular PKC algrithms are unprvably secure. The cmplexity f cmputatin fr cnventinal PKC schemes and the amunt f infrmatin that must be exchanged can be quite severe. As new attacks against the PKC systems are uncvered, these systems have retreated t ever lnger exchange vectrs and ever mre cmplex cmputatins. The technique addressed in this paper is a practical alternate mechanism fr cryptvariable establishment and sharing. The mechanism fr secrecy in this scheme depends upn a physical prcess, and the cryptvariable can be established with cmputatins equivalent t a bunded distance decding algrithm. Thus, the decder we use t establish the cryptgraphic variable may als be used fr prcessing the subsequent data transmissin. Als a cnventinal PKC system requires a (pseud) randm quantity t be generated by each party. With the prpsed system there is n need t d this, as the randmness is prvided by the nn-time statinarity and nnspatial statinarity f the channel itself. Wyner [5] and Ozarw and Wyner [6] explit the channel fr secret cmmunicatins but in a cm /96 $18.00 Cpyright r 1996 by Academic Press, Inc. All rights f reprductin in any frm reserved. 207
2 as prbabilistic secrecy. Als, the number f pssible keys is large enugh that exhaustive search is impractical, this will be referred t as cmputatinal secrecy. The paper is rganized as fllws. The system mdel and the key distributin technique are addressed in Sectin II. The perfrmance f the prpsed technique is analyzed in Sectin III; there, numerical results using Glay cding are evaluated. In Sectin IV we draw cnclusins. II. SYSTEM MODEL FIG. 1. A blck diagram shwing the system cnsidered with tw different time varying channels; n i (t), i 5 1, 2, 3, represent thermal nise. The impulse respnse f channel AB is the same as the impulse respnse f channel BA, but it is different frm that f channel AE r BE. pletely different setting. Their results are existence prfs; in particular, it was shwn that fr given nisy channels (ne fr the cmmunicatrs and ne fr an eavesdrpper) there exists a rate belw which perfect secrecy is pssible. This assumes the eavesdrpper has a nisier channel than the cmmunicatrs channel. In [7] the authr has an interesting verview f cryptgraphic key agreement schemes that use the channel in different ways. In mst f these schemes the tw parties initially share a shrt secret key; the wrk in [7], hwever, relaxes this assumptin and addresses the prblem f generating a shared secret key by tw users each knwing a randm variable and the tw randm variables being dependent. A prtcl is described t establish a cmmn secret key and which uses a nisy channel. Hwever, this prtcl is cmpletely impractical when the eavesdrpper s channel is much better than the cmmunicatrs. The scheme described in this paper is cmputatinally secure even when the eavesdrpper has a substantially better channel than the cmmunicatrs. Finally, the recent wrk in [8] evaluates infrmatin theretic mdels f secret sharing. The authrs were able t determine the largest achievable key rate called key capacity. The perfrmance measure taken in this paper is prbabilistic, and different frm the Shannn measure f perfect secrecy [4]. In particular, it is shwn that by using a channel decder, the prbability f tw users establishing a secret key is clse t ne, while the prbability f an adversary generating the same key is essentially zer; this will be referred t The prpsed system is shwn in Fig. 1, where E is an adversary. During the kth signaling interval (kt, (k 1 1)T], A transmits s(t) cnsisting f tw sinusids at frequencies f 1 and f 2 with equal phases and equal energy E; that is, s(t) 5Œ 2E T cs (2pf 1t 1f) 1Œ 2E T cs (2pf 2t 1f). (1) The signal is transmitted thrugh a time-varying faded channel, crrupted by additive white Gaussian nise n(t) with duble-sided pwer spectral density N /2. We assume that cs (2pf 1 t) and cs (2pf 2 t) are rthgnal and separated by at least the cherence bandwidth f the channel. Then the received signal r(t), fr t [ (kt, (k 1 1)T], is given by r(t) 5Œ 2L 1 2 (k)e T cs (2pf 1 t 1Q 1 (k)) 1Œ 2L 2 2 (k)e cs (2pf T 2 t 1Q 2 (k)) 1 n(t), where the randm variables L i (k), i 5 1, 2, are independent and identically distributed randm variables due t fading, with Rayleigh prbability density functins 5 l i p L (l i ) 5 s 1 exp 2 l 2 22 i 2 2s, fr l i $ 0, (2) 0 fr l i, 0 where s 2 5 E(L i2 (k)) is a characteristic f the channel (E dentes expectatin with respect t p L ). The randm variables Q 1 (k) and Q 2 (k) are mutually independent, each with a unifrm prbability density functin ver [2p, p]. 208
3 B differentially detects an estimate f D kb 5Q 1 (k)2 Q 2 (k) and quantizes the estimate int ne f M phase values, say Q ( ). Except in sequences, the time index k will be drpped with n ambiguity. The differential baseband signal can be shwn t be U B 52L 1 L 2 E exp 5 j(q 1 2Q 2 )61L 1 N 1 1L 2 N* 2 5X B 1jY B, (3) where N 1 and N 2 are cmplex valued Gaussian randm variables with zer mean and variance 2EN, and * dentes cnjugatin. The estimated phase difference is given by F B 5 tan 21 Y B /X B and the quantizer utput is Q (F B ). Repeating the abve transmissin at times k 5 1, 2,...,n,Bestablishes the sequence S B 5 (Q (F 1 B ) Q (F 2 B ) Q(F n B )). (4) Similarly, B transmits a sequence f tw sinusids at the frequencies f 1 and f 2 and with equal phases, after negligible delay amng transmissins; that is, A transmits, then B, then A, and s n in an interleaved rder t maintain the reciprcity assumptin. Fr instance, cnsider a mbile with speed f 100 km/h and using a carrier in the 900 MHz regin; with a delay f 10 µs, the distance mved by the mbile wuld be m, which is negligible cmpared t the wavelength 0.3 m. Thus A frms the baseband differential signal U A 52L 1 L 2 E exp 5 j(q 1 2Q 2 )61L 1 V 1 1L 2 V* 2 5X A 1jY A, (5) where V 1 and V 2 are independent f N 1 and N 2. The estimated phase difference is F A 5 tan 21 Y A /X A. Ntice that due t the reciprcity f the channel, the nly difference between U A and U B is the additive Gaussian nise. Therefre, A establishes the sequence S A 5 (Q (F 1 A ) Q (F 2 A ) Q(F N A )). (6) An adversary E will have the infrmatin U E 52L 3 L 4 E exp 5 j(q 3 2Q 4 )61L 3 N 3 1L 4 N* 4 5X E 1jY E, (7) where L i, i 5 1, 2, 3, 4 are mutually independent, and the estimated phase difference is F E 5 tan 21 Y E /X E ; als, Q i, i 5 1, 2, 3, 4 are mutually independent randm variables. The adversary E establishes the sequence S E 5 (Q (F 1 E ) Q (F 2 E ) Q(F N E )). (8) The sequences S A, S B, and S E are the input t an errr crrectin decder. The utputs f the decders are the keys K A, K B, and K E. Ntice that there is n encding perfrmed at the transmitter end. The decder essentially limits the number f pssible keys t increase the reliability fr key agreement. III. PERFORMANCE ANALYSIS AND RESULTS The fllwing events will be used t assess the perfrmance f a key distributin system: G i 5 5F A [ R i, F B [ R i 6, B i 5 5F A [ R i, F E [ R i 6; here R i is the regin in phase space that is mapped t symbl i. The prbability f a symbl match amng A, B is p g 5 Pr 5 M < i51 Pr(G i )6 M 5 i51 (Pr(F A [ R i )) 2. (9) The prbability f a symbl match amng A, E is p b 5 Pr 5 M < i51 (B i )6 5 1 M. (10) The prbability f an estimated phase in a decisin regin is derived in the Appendix. Nw cnsider the use f a linear blck cde with minimum Hamming distance d, dimensin k, and a blck length n equal t the length f the secret key needed. Then t 5 c(d 2 1)/2d is the number f errrs that can be crrected by the decder. The prbability f agreement being in success is the prbability f the tw received vectrs being in the same decding regin f a cdewrd. This can be shwn t be Pr(K A 5 K B ) 5 l l A l j50 n2l k50 l2j m 150 j m 250 k m 350 n2l2k m n b2 (1 2 p g) b p g n2b, (11) 209
4 FIG. 2. The perfrmance f (23,12) Glay cde t establish a key f length 64 bits by cncatenating three cdewrds. where A l is the weight enumeratr functin f the cde, and b5m 1 1m 2 1m 3 1m 4 0#j1k#t 0#m 1 1j12m 2 1k2m 3 1m 4 #t. The prbability f adversary success P B is given by a similar equatin substituting p b fr p g. Fr small k, mre redundancy is available and a cde with better errr crrectin capability can be btained; hwever, the number f pssible keys becmes smaller and fr small enugh k exhaustive search by an adversary becmes feasible. Therefre, the chice f the cde parameters are crucial, since the cde restricts the key space, but the reductin shuld nt yield an insecure system. Withut the use f a decder, Pr(K A 5 K B ) 5 Pr(S A 5 S B ) 5 p gn and Pr(K A 5 K E ) 5 Pr(S A 5 S E ) 5 1/M n. It is f interest t discuss mre tradeffs invlved in the key distributin system. Sme tradeffs were pinted ut earlier: small k yields a cde with gd errr crrecting capability, but exhaustive search becmes faster expnentially with decrease k. Fr large M, a larger cde can be used thus increasing the cmputatinal secrecy f the system; als, p b decreases, which results in a gd prbabilistic secrecy. Hwever, this is nt sufficient t btain a gd cryptgraphic system; with increasing M, thermal nise effects becme dminant and an increase in E b /N is required t achieve a key agreement with certain prbabilistic secrecy. Therefre, a tradeff exists between cmputatinal secrecy, prbabilistic secrecy, and transmitted energy. T demnstrate with an example, cnsider the use f a (23,12) Glay cde t establish a key f length 64 bits. This key is the cncatenatin f three subkeys each f length 23 (the last 4 bits can be drpped). The Glay cde is a perfect cde, and, therefre, the decder will always utput a cdewrd. The prbability f key establishment is then given by Pr(K A 5 K B ) 3, where Pr(K A 5 K B ) is given in (11). Figure 2 shws the perfrmance f the system in terms f 1 2 Pr(K A 5 K B ) as a functin f average E/N. The use f a decder is necessary fr A and B t establish a cryptgraphic key. Hwever, a decder des nt help E. The chice f a cde and the crrespnding decder is imprtant. One wuld be tempted t use a Reed Slmn cde with large M, since exhaustive search by an adversary fr such cdes is essentially impssible, and the perfrmance f such cdes is attractive in errr cntrl cding. The prblem with using Reed Slmn cdes is the fact that the cde is sparse. With very high prbability the analyzed prtcl will fail t establish the cryptgraphic key. This is true when using any sparse cdes. 210
5 IV. CONCLUSION prbability density functin f F is given by We have evaluated the perfrmance f an uncnventinal cryptgraphic key agreement technique based n the reversibility f a radi channel. This technique results in superir cmputatinal secrecy as well as prbabilistic secrecy. Using this scheme, arbitrary lng keys can be shared, and a key can change during a sessin. An equivalent system wuld be the transmissin f 2M rthgnal tnes by each user. This system will have the same perfrmance; hwever, it requires a much larger bandwidth, as required by rthgnal signaling. APPENDIX where and p F (f0g) 5 1 exp 52G6 2p 1 1 Œ2p (ŒG cs f) exp 52G sin2 f6 3 [1 2 Q(Œ2G cs f)], G5 L 1 2 L 2 2 L 1 2 1L 2 2 E N In this Appendix, the prbability density functin f F is evaluated. Initially, assume D5Q 1 2Q 2 is given and equal t 0. Cnsider U 5 2L 1 L 2 E 1L 1 N 1 1L 2 N* 2 5X1jY X 5 2L 1 L 2 E 1 Re(L 1 N 1 1L 2 N* 2 ) Y5Im(L 1 N 1 1L 2 N* 2 ), where, cnditined n L 1 and L 2,E(X)52L 1 L 2 E0µ, E(Y) 5 0, and variance (X) 5 variance (Y) 5 2EN 0 (L 12 1 L 22 ) 0 s 2. The cnditinal jint prbability density functin f X and Y is P(x, y0l 1, L 2 ) 5 1 with the change f variables 2ps 2 exp 52[(x 2 µ)2 1 y 2 ]/2s 2 6 R 5 ŒX 2 1 Y 2, and F5tan 21 Y X the cnditinal jint density functin f Q and R is given by p(r, F0L 1, L 2 ) 5 R 2ps 2 exp 52(R 2 1 µ 2 2 2µR cs F)/2s 2 6. Integrating ver R [ [0,`), it can be shwn that the Q(x) 5 1 Œ2p e x ` exp 52u 2 /26 du. The prbability density functin P G (g) can be shwn t be 1 g 1 P G (g) 5 e 0 g x 2 (1 2 x) exp 5 2 g 1 2 g x(1 2 x)6 dx, where g52s 2 E/N is the average signal-t-nise rati. The prbability density functin f F cnditined n Dfi0 is then given by p F (f2d). Finally, nte that Q 1 and Q 2 are identically distributed unifrm randm variables ver [2p, p). The sum D5Q 1 2Q 2 can take values in [22p, 2p) accrding t a triangular functin (the cnvlutin f tw unifrm distributins). Thus t reslve the ambiguities f 2p, define the randm variable D8 5 5 D22p, p#d#2p D, 2p#D#p D12p, 22p#D#2p. It can be shwn that D8 is unifrmly distributed ver [2p, p]. With regins given by R i 5 [2(i 2 1)2p/M, i2p/m), fr i 5 1,...,M, the desired prbability is given by Pr(F [ R i ) 5 1 e ` p e 2p 0 2p e p F (f2d0g)p(g)dfdddg. Ri 211
6 ACKNOWLEDGMENTS The authrs thank a reviewer fr pinting ut a fault in using sparse cdes. They als thank Prfessr J. Massey fr his valuable cmments. REFERENCES 1. Data Encryptin Standard. Federal Infrmatin Prcessing Standards, Publicatin Number 46, Natinal Bureau f Standards, Rivest, R. L., Shamir, A., and Adelman, L. A methd fr btaining digital signatures and public key crypt-systems. Cmmun. ACM 21, n. 2 (1978), Hershey, J. E., Hassan, A. A., and Yarlagadda, R. Uncnventinal cryptgraphic keying variable management. IEEE Trans. Cmmun., in press. 4. Shannn, C. E. Cmmunicatin thery f secrecy systems. Bell Syst. Tech. J. 28 (1949), Wyner, A. D. The wire-tap channel, Bell Syst. Tech. J. 54 (1975), Ozarw, L. H., and Wyner, A. D. Wire tap channel, II. Bell Syst. Tech. J. 63 (1984), Maurer, U. M. Secret key agreement by public discussin frm cmmn infrmatin. IEEE Trans. Infrm. Thery 39 (1993), Ahlswede, R., and Csizár, I. Cmmn randmness in infrmatin thery and cryptgraphy. I. Secret sharing. IEEE Trans. Infrm. Thery 39,
1.3. The Mean Temperature Difference
1.3. The Mean Temperature Difference 1.3.1. The Lgarithmic Mean Temperature Difference 1. Basic Assumptins. In the previus sectin, we bserved that the design equatin culd be slved much easier if we culd
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New Yrk University Cmputer Science Department Curant Institute f Mathematical Sciences Curse Title: Data Cmmunicatin & Netwrks Curse Number:CSCI-GA.2662-00 Instructr: Jean-Claude Franchitti Sessin: 2 Assignment
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationELEC 204 Digital System Design LABORATORY MANUAL
ELEC 204 Digital System Design LABORATORY MANUAL : Design and Implementatin f a 3-bit Up/Dwn Jhnsn Cunter Cllege f Engineering Kç University Imprtant Nte: In rder t effectively utilize the labratry sessins,
More informationRetirement Planning Options Annuities
Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With
More informationUNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationSinusoidal Steady State Response of Linear Circuits. The circuit shown on Figure 1 is driven by a sinusoidal voltage source v s (t) of the form
Sinusidal Steady State espnse f inear Circuits The circuit shwn n Figure 1 is driven by a sinusidal ltage surce v s (t) f the frm v () t = v cs( ωt) (1.1) s i(t) + v (t) - + v (t) s v c (t) - C Figure
More informationWelcome to CNIPS Training: CACFP Claim Entry
Welcme t CNIPS Training: CACFP Claim Entry General Cmments frm SCN CACFP claiming begins with submissin f the Octber claim due by Nvember 15, 2012. Timelines/Due Dates With CNIPS, SCN will cntinue t enfrce
More informationStandards and Procedures for Approved Master's Seminar Paper or Educational Project University of Wisconsin-Platteville Requirements
Standards and Prcedures fr Apprved Master's Seminar Paper r Educatinal Prject University f Wiscnsin-Platteville Requirements Guidelines Apprved by the Graduate Cuncil University f Wiscnsin-Platteville
More informationHow do I evaluate the quality of my wireless connection?
Hw d I evaluate the quality f my wireless cnnectin? Enterprise Cmputing & Service Management A number f factrs can affect the quality f wireless cnnectins at UCB. These include signal strength, pssible
More informationEconomic Justification: Measuring Return on Investment (ROI) and Cost Benefit Analysis (CBA)
Advancing Statewide Spatial Data Infrastructures in Supprt f the Natinal Spatial Data Infrastructure (NSDI) Ecnmic Justificatin: Measuring Return n Investment (ROI) and Cst Benefit Analysis (CBA) Intrductin
More informationBudget Planning. Accessing Budget Planning Section. Select Click Here for Budget Planning button located close to the bottom of Program Review screen.
Budget Planning Accessing Budget Planning Sectin Select Click Here fr Budget Planning buttn lcated clse t the bttm f Prgram Review screen. Depending n what types f budgets yur prgram has, yu may r may
More informationOUR DISCIPLINARY POLICY
OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it
More informationThe ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories.
11 This chapter includes infrmatin regarding custmized reprts that users can create using data entered int the CA prgram, including: Explanatin f Accessing List Screen Creating a New Ad Hc Reprt Running
More informationGetting Started Guide
AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationInformation paper Reference Data Management Service
This infrmatin paper describes the EU Reference Data Management Service. This Service prvides a central database, web service web applicatin fr maintaining RIS reference data, which is used by varius RIS-systems
More informationComparisons between CRM and CCM PFC *
Energy and Pwer Engineering, 13, 5, 864-868 di:1.436/epe.13.54b165 Published Online July 13 (http://www.scirp.rg/jurnal/epe Cmparisns between CRM and CCM PFC * Weiping Zhang,Wei Zhang,Jianb Yang 1,Faris
More informationOperational Amplifier Circuits Comparators and Positive Feedback
Operatinal Amplifier Circuits Cmparatrs and Psitive Feedback Cmparatrs: Open Lp Cnfiguratin The basic cmparatr circuit is an p-amp arranged in the pen-lp cnfiguratin as shwn n the circuit f Figure. The
More informationTHE UNEARNED NO CLAIM BONUS. C. P. WELTEN Amsterdam
THE UNEARNED NO CLAIM BONUS C. P. WELTEN Amsterdam I. The claims experience f a mtrcar insurance is assumed t give sme indicatin abut the risk (basic claim frequency) f that insurance. The experience rating
More informationTrends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
More informationWriting a Compare/Contrast Essay
Writing a Cmpare/Cntrast Essay As always, the instructr and the assignment sheet prvide the definitive expectatins and requirements fr any essay. Here is sme general infrmatin abut the rganizatin fr this
More informationCSE 231 Fall 2015 Computer Project #4
CSE 231 Fall 2015 Cmputer Prject #4 Assignment Overview This assignment fcuses n the design, implementatin and testing f a Pythn prgram that uses character strings fr data decmpressin. It is wrth 45 pints
More informationBRILL s Editorial Manager (EM) Manual for Authors Table of Contents
BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1
More informationContact: Monique Goyens directorsoffice@beuc.eu
Cmparisn Websites Cntact: Mnique Gyens directrsffice@beuc.eu Ref.: X/2012/065-28/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL DER EUROPÄISCHE VERBRAUCHERVERBAND Rue d Arln 80, B-1040 Brussels
More informationSQL Perform Tools 5.10 Release Note
SQL Perfrm Tls 5.10 Release Nte Lndn, UK, February 26 2015 SQL Perfrm Tls versin 5.10 release Tday we are prudly annuncing the latest release f ur prducts' family SQL Perfrm Tls. Fr clarity, the prduct
More informationSimple and Efficient Contract Signing Protocol
Simple and Efficient Cntract Signing Prtcl Abdullah M. Alaraj Infrmatin Technlgy Department Cllege f Cmputer, Qassim University Saudi Arabia Abstract In this paper, a new cntract signing is prpsed based
More informationexpertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
More informationPatient Participation Report
Patient Participatin Reprt In 2011, Westngrve Partnership decided t establish a PPG (Patient Participatin Grup) that wuld allw us t engage with ur patients, receive feedback frm them and ensure that they
More informationChapter 6: Continuous Probability Distributions GBS221, Class 20640 March 25, 2013 Notes Compiled by Nicolas C. Rouse, Instructor, Phoenix College
Chapter Objectives 1. Understand the difference between hw prbabilities are cmputed fr discrete and cntinuus randm variables. 2. Knw hw t cmpute prbability values fr a cntinuus unifrm prbability distributin
More informationLecture 2: Supervised vs. unsupervised learning, bias-variance tradeoff
Lecture 2: Supervised vs. unsupervised learning, bias-variance tradeff Reading: Chapter 2 Stats 202: Data Mining and Analysis Lester Mackey September 23, 2015 (Slide credits: Sergi Bacallad) 1 / 24 Annuncements
More informationWe will record and prepare documents based off the information presented
Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we
More informationADMINISTRATION AND FINANCE POLICIES AND PROCEDURES TABLE OF CONTENTS
CONTROL Revisin Date: 1/21/03 TABLE OF CONTENTS 10.01 OVERVIEW OF ACCOUNTING FOR INVESTMENT IN PLANT... 2 10.01.1 CURRENT POLICY... 2 10.02 INVENTORY MAINTENANCE AND CONTROL... 3 10.02.1 PROCEDURES FOR
More informationSymantec User Authentication Service Level Agreement
Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed
More informationStudent Academic Learning Services Page 1 of 7. Statistics: The Null and Alternate Hypotheses. A Student Academic Learning Services Guide
Student Academic Learning Services Page 1 f 7 Statistics: The Null and Alternate Hyptheses A Student Academic Learning Services Guide www.durhamcllege.ca/sals Student Services Building (SSB), Rm 204 This
More informationINTERMEDIATE CAD FILE MANAGEMENT
INTERMEDIATE CAD FILE MANAGEMENT Intrductin File mismanagement is the dwnfall f many brilliant individuals. If yu are wise, yu wn't be ne f the peple wh meet disaster due t pr file management. Cmputers
More informationApplied Spatial Statistics: Lecture 6 Multivariate Normal
Applied Spatial Statistics: Lecture 6 Multivariate Nrmal Duglas Nychka, Natinal Center fr Atmspheric Research Supprted by the Natinal Science Fundatin Bulder, Spring 2013 Outline additive mdel Multivariate
More informationWINDOW REPLACEMENT Survey
WINDOW REPLACEMENT Prperty wners and develpers undertaking rehabilitatin prjects fr bth Tax Act Certificatin and Sectin 106 Cmpliance are encuraged t repair and retain existing histric windws. Hwever,
More informationCopyrights and Trademarks
Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and
More informationImportance and Contribution of Software Engineering to the Education of Informatics Professionals
Imprtance and Cntributin f Sftware Engineering t the Educatin f Infrmatics Prfessinals Dr. Tick, József Budapest Plytechnic, Hungary, tick@bmf.hu Abstract: As a result f the Blgna prcess a new frm f higher
More informationWire Transfer Request
Wire Transfer Request Requirements and Instructins OFFICE OF DISBURSEMENTS Categry: Dcument Name: Payment Prcessing Wire Transfer Request - Requirements and Instructins Respnsible Department: Office f
More informationPayment Options Check Payable to Account Holder* Electronic Funds Transfer (ACH) $5.00 Maintain IRA with The Bancorp (contact us for options)
Dear Custmer: Thank yu fr cntacting Custmer Care regarding the clsure f yur Individual Retirement Accunt (IRA). In rder t prcess yur request, please cmplete the enclsed Request fr Distributin frm. Yu may
More informationNHPCO Guidelines for Using CAHPS Hospice Survey Results
Intrductin NHPCO Guidelines fr Using CAHPS Hspice Survey Results The Centers fr Medicare and Medicaid Services (CMS) has develped the Cnsumer Assessment f Healthcare Prviders and Systems (CAHPS ) Hspice
More informationChris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation
TO: FROM: HR Officers & Human Resurces Representatives Chris Chirn, Interim Senir Directr, Emplyee & Management Relatins Jessica Mre, Senir Directr, Classificatin & Cmpensatin DATE: May 26, 2015 RE: Annual
More informationSoftware and Hardware Change Management Policy for CDes Computer Labs
Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces
More informationChapter 3: Cluster Analysis
Chapter 3: Cluster Analysis 3.1 Basic Cncepts f Clustering 3.1.1 Cluster Analysis 3.1. Clustering Categries 3. Partitining Methds 3..1 The principle 3.. K-Means Methd 3..3 K-Medids Methd 3..4 CLARA 3..5
More informationHow to put together a Workforce Development Fund (WDF) claim 2015/16
Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF
More informationCHECKING ACCOUNTS AND ATM TRANSACTIONS
1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches
More informationConnecticut State Department of Education 2014-15 School Health Services Information Survey
Cnnecticut State Department f Educatin 2014-15 Schl Health Services Infrmatin Survey General Directins fr Cmpletin by Schl Nurse Crdinatr/Supervisr This Schl Health Services Infrmatin Survey was designed
More informationStatistical Analysis (1-way ANOVA)
Statistical Analysis (1-way ANOVA) Cntents at a glance I. Definitin and Applicatins...2 II. Befre Perfrming 1-way ANOVA - A Checklist...2 III. Overview f the Statistical Analysis (1-way tests) windw...3
More informationHeythrop College Disciplinary Procedure for Support Staff
Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and
More informationCDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these
More informationWhy Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar
Class Ntes: February 2, 2006 Tpic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can t Jhnny Encrypt? A Usability Evaluatin f PGP 5.0 Alma Whitten and J.D. Tygar This article has three
More informationConnecting to Email: Live@edu
Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationAccess Control Algorithm for RPR MAC
Access Cntrl Algrithm fr RPR MAC Kanaiya Vasani Anp Ghanwani Lantern Cmmunicatins IEEE 802.17 Interim Meeting Orland, FL January 2002 kv_acc_02.pdf 1 Outline Overview MAC architecture Cmpnents f the bandwidth
More informationA CONSISTENCY IMPROVING METHOD IN BINARY AHP
Jurnal f the Operatins Research Sciety f Japan Vl. 38, N., March 995 995 The Operatins Research Sciety f Japan A CONSISTENCY IMPROVING METHOD IN BINARY AHP Kazutm Nishizawa Nihn UniVfTsity (Received March
More informationBest Practice - Pentaho BA for High Availability
Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationOffice Use Only Account # Approved By:
Office Use Only Accunt # Apprved By: Dealer Applicatin Please cmplete and submit this applicatin alng with a cpy f yur (EIN) Federal Tax Id Number certificate befre placing yur 1 st rder. We will review
More informationRECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
More informationWatlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011
Watlingtn and Chalgrve GP - Patient Satisfactin Survey 2011 Backgrund During ne week in Nvember last year patients attending either the Chalgrve r the Watlingtn surgeries were asked t cmplete a survey
More informationIn connection with the SEC's Money Market Reform proposal, DST Systems, Inc. respectfully submits our comments for your consideration.
DST September 18, 2013 Ms. Elizabeth M. Murphy Secretary Securities and Exchange Cmmissin 100 F. Street, NE Washingtn, DC 20549-1090 Subject: Mney Market Fund Refrm, File# 57-03-13 Dear Ms. Murphy: In
More informationPART 6. Chapter 12. How to collect and use feedback from readers. Should you do audio or video recording of your sessions?
TOOLKIT fr Making Written Material Clear and Effective SECTION 3: Methds fr testing written material with readers PART 6 Hw t cllect and use feedback frm readers Chapter 12 Shuld yu d audi r vide recrding
More informationCredit Report Reissue Recommendation TABLE OF CONTENTS
T: Credit Reprting Wrkgrup Frm: Mike Bixby (305) 829-5549 MBixby@LandAm.cm Paul Wills (770) 740-7353 Paul.Wills@Equifax.cm Date: February 13, 2007 Re: Credit Reprt Reissue Recmmendatin The MISMO Credit
More information9 ITS Standards Specification Catalog and Testing Framework
New Yrk State ITS Standards Specificatin Develpment Guide 9 ITS Standards Specificatin Catalg and Testing Framewrk This chapter cvers cncepts related t develpment f an ITS Standards Specificatin Catalg
More informationHSBC Online Home Loan Application Process
HSBC Online Hme Lan Applicatin Prcess Versin 1.0 Nvember 2005 Cpyright. HSBC Bank Australia Limited 2005 ALL RIGHTS RESERVED N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted,
More informationChicago Department of Finance. Tax Audit Process
Chicag Department f Finance Tax Audit Prcess Audit Overview There are varius ways a business gets selected fr audit. The mst cmmn are referrals frm anther divisin f the Department f Finance, referral frm
More informationJ A M S. Enterprise Resource Planning (ERP) System Selection Using a Novel Integrated Weight Decision Making Method. R. V. Rao 1* and B. K.
Internatinal Jurnal f Advanced Manufacturing Systems Vlume 2 G Number 1 G January-June 2011 G pp. 21-28 Internatinal Science Press I J A M S Enterprise Resurce Planning (ERP) System Selectin Using a Nvel
More informationMarketing Consultancy Division (MCD) Export Consultancy Unit (ECU) Export in Focus. Export Market Expansion Strategies. Rabi-I, 1427 (April, 2006)
Marketing Cnsultancy Divisin (MCD) Exprt Cnsultancy Unit (ECU) Exprt in Fcus Exprt Market Expansin Strategies Rabi-I, 1427 (April, 2006) 1 Exprt Market Expansin Strategies Intrductin It is clear that glbalizatin
More informationProject Startup Report Presented to the IT Committee June 26, 2012
Prject Name: SOS File 2.0 Agency: Secretary f State Business Unit/Prgram Area: Secretary f State Prject Spnsr: Al Jaeger Prject Manager: Beverly Maitland Prject Startup Reprt Presented t the IT Cmmittee
More informationUNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS. (by: Kiriakoula Hatzikiriakos, McMillan Binch Mendelsohn)
UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS (by: Kiriakula Hatzikiriaks, McMillan Binch Mendelshn) The purpse f this paper is t highlight sme issues and recmmendatins t be cnsidered during
More informationData Analytics for Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015
Data Analytics fr Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015 These are sample questins frm a hiring exam that was develped fr OFA 2012 Analytics team. Plan n spending n mre than 4 hurs
More informationOverview of the CMS Modification to Meaningful Use 2015 through 2017
Overview f the CMS Mdificatin t Meaningful Use 2015 thrugh 2017 On April 10, 2015, the Centers fr Medicare & Medicaid Services (CMS) issued a new prpsed rule fr the Medicare and Medicaid EHR Incentive
More informationIX- On Some Clustering Techniques for Information Retrieval. J. D. Broffitt, H. L. Morgan, and J. V. Soden
IX-1 IX- On Sme Clustering Techniques fr Infrmatin Retrieval J. D. Brffitt, H. L. Mrgan, and J. V. Sden Abstract Dcument clustering methds which have been prpsed by R. E. Bnner and J. J. Rcchi are cmpared.
More informationSpecial Tax Notice Regarding 403(b) (TSA) Distributions
Special Tax Ntice Regarding 403(b) (TSA) Distributins P.O. Bx 7893 Madisn, WI 53707-7893 1-800-279-4030 Fax: (608) 237-2529 The IRS requires us t prvide yu with a cpy f the Explanatin f Direct Rllver,
More informationGOLDBLUM & HESS Attorneys at Law
GOLDBLUM & HESS Attrneys at Law PRACTICE LIMITED TO IMMIGRATION, NATIONALITY, AND CONSULAR LAW Jane W. Gldblum* Wendy Castr Hess** 101 GREENWOOD AVENUE PHONE: (215) 885-3600 JENKINTOWN PLAZA, SUITE 380
More informationSoftware Quality Assurance Plan
Sftware Quality Assurance Plan fr AnthrpdEST pipeline System Versin 1.0 Submitted in partial fulfillment f the requirements f the degree f Master f Sftware Engineering Prepared by Luis Fernand Carranc
More informationConfiguring an Email Client for your Hosting Support POP/IMAP mailbox
Cnfiguring an Email Client fr yur Hsting Supprt POP/IMAP mailbx This article lists the email settings and prt numbers fr pp and imap cnfiguratins, as well as fr SSL. It cntains instructins fr setting up
More informationFORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS
APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre
More informationQuantifying CDM Audit Results
By: Rsemary Hlliday, MHA Principal, Hlliday & Assciates March 13, 2012 Quantifying CDM Audit Results D yu have a strategy fr the day yu re asked t estimate the impact f a Charge Master audit? As a savvy
More informationTELE9753 Advanced Wireless Communications
TELE9753 Advanced Wireless Cmmunicatins COURSE INTRODUCTION Sessin 1, 2013 Curse Staff Curse Crdinatr: Curse Lecturers: Prf. Jinhng Yuan, Rm EE324B J.Yuan@unsw.edu.au Prf. Jinhng Yuan, Rm EE324B J.Yuan@unsw.edu.au
More informationFor both options: Please consult the Unisa website for admission requirements
The Department f Industrial and Organisatinal Psychlgy ffers prspective master s students tw ptins twards btaining a master s degree in Industrial and Organisatinal Psychlgy, namely, a cursewrk ptin and
More informationLeadStreet Broker Guide
RE/MAX f Western Canada LeadStreet Brker Guide Ver. 2.0 Revisin Histry Name Date Versin Descriptin Tamika Anglin 09/04/13 1.0 Initial Creatin Tamika Anglin 11/05/13 2.0 Inclusin f instructins n reprting
More informationKnowledge Base Article
Knwledge Base Article Crystal Matrix Interface Cmparisn TCP/IP vs. SDK Cpyright 2008-2012, ISONAS Security Systems All rights reserved Table f Cntents 1: INTRODUCTION... 3 1.1: TCP/IP INTERFACE OVERVIEW:...
More informationDec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals
Dec. 2012 Transprtatin Management System An Alternative Traffic Slutin fr the Lgistics Prfessinals What is a TMS-Lite system? What are the features and capabilities f a TMS-Lite system? Why chse a TMS-Lite
More informationTipsheet: Sending Out Mass Emails in ApplyYourself
GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins
More informationONGOING FEEDBACK AND PERFORMANCE MANAGEMENT. A. Principles and Benefits of Ongoing Feedback
ONGOING FEEDBACK AND PERFORMANCE MANAGEMENT A. Principles and Benefits f Onging Feedback While it may seem like an added respnsibility t managers already "full plate," managers that prvide nging feedback
More informationLogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide
LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument
More informationMSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationAstm Bulletin 12 (1981) 22-26 RECURSIVE EVALUATION OF A FAMILY OF COMPOUNI) DISTRIBUTIONS* HARRY H. PANJER of Waterloo, Ontario, Canada
Astm Bulletin 12 (1981) 22-26 RECURSIVE EVALUATION OF A FAMILY OF COMPOUNI) DISTRIBUTIONS* Umvelmty HARRY H. PANJER f Waterl, Ontari, Canada 1 INTRODUCTION Cmpund dlstributmns such as the cmpund Pmssn
More informationJune 29, 2009 Incident Review Dallas Fort Worth Data Center Review Dated: July 8, 2009
The purpse f this dcument is t capture the events and subsequent respnse t the incident that tk place in the DFW datacenter n 29 June, 2009. I. Executive Summary On 29 June, an area f the Rackspace DFW
More informationAnnuities and Senior Citizens
Illinis Insurance Facts Illinis Department f Insurance January 2010 Annuities and Senir Citizens Nte: This infrmatin was develped t prvide cnsumers with general infrmatin and guidance abut insurance cverages
More informationPrinciples of Engagement with Universities providing accredited Actuarial Science programmes
The Actuarial Prfessin Principles f Engagement with Universities prviding accredited Actuarial Science prgrammes 1. What is an accredited actuarial science prgramme? Accreditatin f university prgrammes
More informationTemplate on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution
COORDINATION AND COOPERATION ARRANGEMENTS EBA/RTS/2014/16 EBA/ITS/2014/07 Annex II Template n written crdinatin and cperatin arrangements f the supervisry cllege established fr the Grup/ Institutin
More informationPOLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES
POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska
More informationThis report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
More information