A Certification Authority for Elliptic Curve X.509v3 Certificates

Size: px
Start display at page:

Download "A Certification Authority for Elliptic Curve X.509v3 Certificates"

Transcription

1 A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena (UPCT) Cartagena, Sain Abstract Wireless networks are more and more common in current communications networks Nevertheless, wireless communications entail a big concern: security The use of X509v3 certificates to carry out authentication tasks is an aroach to imrove security These certificates are usually emloyed with the RSA algorithm Ellitic Curve Crytograhy (ECC) is a crytograhic technique eminently suited for small devices, like those used in wireless communications, and is gaining momentum The main advantage of ECC versus RSA is that for the same level of security it requires a much sorter key length The urose of this work is to design and imlement a free oen-source Certification Authority able to issue X509v3 certificates using ECC This research is an imlementation study on free oen-source tools to issue digital certificates using ECC Moreover, it contributes to the develoment of free oen-source tools for network security based on ECC The result of this research may assist organizations to increase their security level in wireless devices and networks, in a costless way, by including authentication techniques based on ECC digital certificates Keywords- digital certificates; ellitic curve crytograhy; security; wireless communications I INTRODUCTION Wireless networks have suffered a dramatic increase in recent years Wireless technology is more and more resent in our society and millions of wireless equiment are sold every year However, one of the major concerns about wireless communications is security RSA is the most common method emloyed in ublic key crytograhy, for instance in X509 digital certificates These certificates are oriented to verify the identity of a erson or an entity However, new concerns are rising about the security of 1024-bit RSA [1] Ellitic Curve Crytograhy (ECC) is an innovative crytograhic technique Its security resides in the same roblem as RSA or Diffie-Hellman algorithms, but instead of using integers as symbols of the alhabet to be cihered, it uses oints in a mathematical object called ellitic curve The real ECC otential is that, with a much smaller key length, it achieves the same security level as other roosals Therefore, ECC resents some key attributes truly imortant in scenarios where the following resources are limited: rocessing ower, storage sace, bandwidth and ower consumtion [2] [3] There are even some organizations working towards ECC standardization (IEEE, IETF, ISO, etc), and leading enterrises develoing new ECC roducts Nevertheless, to favor the widesread use of ECC it is also essential romoting free oensource ECC tools In this aer we introduce a free oen-source Certification Authority (CA) for ECC X509v3 digital certificates The CA we roose is able to generate its own root certificate and to issue clients certificates We also develo the software a client requires to create a certificate request This certificate request is the one that the CA should sign after some verification stes The tool we roose is mainly oriented to environments with limited resources As it will be shown in next sections, its advantages are clearly noticeable The rest of this aer is organized as follows In section 2, we give a brief overview about Ellitic Curve Crytograhy, and the ECC mechanisms we use for the new X509v3 ECC digital certificates In section 3, we exlain the design of the certification tool In section 4, we describe the ECC CA working scenario Section 5 shows and discusses the exerimental imlementation The aer ends with the most imortant concluding remarks in section 6 II OVERVIEW OF ELLIPTIC CURVE CRYPTOGRAPHY Public key (asymmetric) crytograhy uses two keys (a rivate key and a ublic key), differing from rivate key (symmetric) crytograhy, where there must be a shared secret key Ellitic Curve Crytograhy was discovered in 1985 by V Miller [4] as an alternative method for ublic key crytograhy At that time, it was very difficult to erform the necessary calculations With time, imlementations were much more efficient, what allowed the erformance of ellitic curve mathematics to take the same amount of time as imlementations of integer factoring schemes for the same number of bits This, in its turn, imlies a reduction in cost, size, and rocessing time because ellitic curves require fewer bits for the same security level An ellitic curve is described by a cube equation, similar to those used to calculate an ellitic circumference Usually, the cube equation of an ellitic curve is indicated by (1), where a, b, c, d, and e are usually real numbers that comly with some condition Then, the ellitic curve is defined by the oints (x,y) that satisfy this equation The addition oeration can be defined for an ellitic curve, together with the element oint at infinity

2 0 This addition oeration fulfills the associative and commutative roerties y + axy + by = x + cx + dx + e (1) Ellitic curves used in crytograhy are defined over two tyes of finite fields: fields of odd characteristics ( F, where is a large rime number), and fields of characteristics two ( F 2 ) For the sake of simlicity we focus on m F Observe that the field F only emloys the numbers from 0 to (-1), and all comutations end by taking the remainder on division by In articular, crytograhy is interested in ellitic curve grous over F If we chose two ositive integers, a and b, smaller than such that (2) is true, then E ( a, b) denotes the ellitic curve grou in F, whose elements (x,y) are airs of ositive integers smaller than that satisfy the ellitic curve equation (3) 3 2 4a + 27b (mod ) 0 (2) 2 3 y (mod ) = x + ax + b (mod ) (3) To create a cryto system using ellitic curves is necessary to find a difficult roblem such factorizing the roduct of two rime numbers or calculating a discrete logarithm Consider the equation P = k G, where P and G are oints belonging to E ( a, b), and k is smaller than It is quite easy to assess P given k and G, but it is very comlex to calculate k given P and G This is called the Ellitic Curve Discrete Logarithm Problem (ECDLP) In fact, the G oint is called the generator oint The criterion to select G is as follows: the smallest value of n such that n G = 0 must be a large rime number Most of the ellitic curve crytograhic methods are related to the discrete logarithm schemes, which were originally formulated for usual modular arithmetic In order to use ECC, all arties must agree on all the elements defining the ellitic curve, that is, all arties should know the domain arameters For the field F, the domain arameters are: the rime number, constants a and b, the generator oint G, and the integer n The generation of these domain arameters is not straightforward Several standards bodies ublish domain arameters of ellitic curves [5] [6] [7] Next, we briefly exlain the two ECC algorithms that we use in this work to generate the ECC X509v3 certificates: ECDSA to sign a digital certificate, and ECIES to generate the ublic key included in a digital certificate A ECIES The Ellitic Curve Integrated Encrytion Scheme (ECIES), also known as Ellitic Curve Augmented Encrytion Scheme or Ellitic Curve Encrytion Scheme, is an ECC ublic-key encrytion technique ECIES is based on the Diffie-Hellman method Let us exlain briefly how it works [6] [7] [8] First, one entity (eg A) should establish what key derivation function (KDF) to use (eg ANSI-X963-KDF with SHA-1 otion [7], IKEv2-KDF [10] or TLS-KDF [11]) A KDF is used to derive keying data from a shared secret octet string Entity A should also select: the MAC (Message Authentication Code) scheme (eg, HMAC-SHA with 160-bit keys, HMAC-SHA-1-80 with 160-bit keys, etc), the symmetric encrytion scheme (eg AES), and any otion involved in them A should decide on whether to use the standard ellitic curve Diffie-Hellman rimitive or the ellitic curve cofactor Diffie-Hellman In addition, A should establish the ellitic curve domain arameters (a, b, G, n, etc) at the desired security level Next, the other entity (eg B) should obtain in an authentic manner the selections made by A After that, A should set u an ellitic curve key air associated with the ellitic curve domain arameters determined during the setu rocedure Let s call K PA to the A s ublic key and K A to the A s rivate key K A is an integer chosen randomly in the range [1, n-1] K PA is calculated as indicated by exression (4): K PA = K A G (4) Then, entity B should obtain in an authentic way the ellitic curve ublic key selected by A, ie K PA From now on, B (A) should encryt (decryt) messages using the keys and arameters established reviously For instance, if B wants to send a cihered message to A, then B does the following actions: B generates a random number r [1, n-1] and assesses R = r G B obtains a shared secret K S = r K Note that R and PA K S are oints in the ellitic curve B uses the KDF to derive a symmetric encrytion and MAC keys, K E and K M resectively B cihers the message using K E and the symmetric encrytion scheme selected during the setu hase B comutes the tag of the cihered message using K M The decrytion rocess is straightforward knowing the Diffie-Hellman rocedure In this work, we use ECIES to generate the ublic key of an entity, which can be used for cihering in later services The legitimacy of this ublic key is guaranteed by the digital certificate ECC X509v3 that our roosed Certification Authority issues The ECIES arameters that we have selected in our imlementation are shown below in Table 1 B ECDSA Ellitic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) that oerates with ellitic curves Signature schemes are designed to be used

3 when an entity A wants to send a message M to an entity B in an authenticated way, and B wants to verify the authenticity of M ECDSA acts as follows [7] [8] [12] First, an entity A should select what hash function to use (eg SHA) Moreover, A should establish the curve domain arameters (a, b, G, n, etc) at the desire security level Entity B should get in an authentic manner the selections made by A Next, A and B should erform a key deloyment rocedure to be reared to use ECDSA A should set u an ellitic curve key air associated with the ellitic curve domain arameters agreed on the setu rocedure to use with ECDSA Let s call K PA to the A s ublic key, as shown in (4), and K A to the A s rivate key (randomly selected in [1, n-1]) B should obtain the ellitic curve ublic key selected by A, ie K PA To sign a message M, A should roceed according to the following stes: A alies the hash function to the message, and derives an integer e from the obtained hash A selects a random integer k in the range [1, n-1], and calculates K = k G = x A, y ) ( A A assesses r = x (mod n) A A calculates s = k 1 ( e + K r)(modn) The signature is the air (r, s) To verify the signature, the entity B should roceed as follows: B checks if r and s are integers, otherwise the signature is not valid B alies the hash function to the message, and derives an integer e from the obtained hash A B calculates u 1 1 = e s (mod n) and 1 u = r s (mod ) 2 n B comutes K = ( xa, y A) = u1 G + u2 K PA The signature is valid if x A = r(mod n) In this work, the Certification Authority uses ECDSA to sign an ECC X509v3 digital certificate containing an ECIES ublic key, thus verifying the authenticity of the ublic key and its owner III ECC CERTIFICATION AUTHORITY DESIGN We choose Java as rogramming language due to its latform indeendence After a searching hase, we leaned on the oen source library BouncyCastle [13] to write the code Next, we give details about the ECC CA design Our work can be divided into three blocks: classes to create the CA, classes to create the certificate request by the client, and classes so that the CA can sign the certificate request In addition, we define three classes (included in Fig 1) that are shared by all blocks: KeyGeneration is in charge of generating an ellitic curve key air It uses the ECIES scheme secified in ANSIX963 and IEEE P1363 takes the comonent of the client data, slits it into its minimum units, and comoses it again to eliminate ossible missellings CertificateUtils generates cer certificates (certificates signed by the CA, ie, the identity of the user has been verified), and der certificates (certificates that have not been signed yet, ie a client certificate request) In the first block, classes to make the CA, we define the class CAcertEC shown in Fig 2 Its main task is to generate the X509v3 root certificate and the PKCS#12 (Public Key Crytograhy Standard, PKCS) with the corresonding CA s rivate key A root certificate is a certificate that contains the ublic key of a CA Clients can trust a CA only if a coy of the CA root certificate is in its trusted root certificate store Moreover, the CA ublic key included in the CA root certificate is needed to verify the validity of any certificate that the CA issues PKCS is a set of standard rotocols to exchange secure information on the Internet using a ublic key infrastructure PKCS#12 is a standard that secifies a ortable format for storing a user s rivate key In the second block, classes to create the certificate request by the client, we characterize the classes illustrated in Fig 3 They involve the following tasks: GrahicClient launches an alet that the client uses to fill in the data necessary for the certificate request Manager catures the alet events KeyGeneration Static KeyGeneration(int): KeyPair TABLE I Parameter a b G n ELLIPTIC CURVE DOMAIN PARAMETERS Value 0x7fffffffffffffffffffffff7fffffffffff ffffffffffc 0x6b016c3bdcf18941d0d ca71a9db 2fb27d1d c2942c0a 0x020ffa963cdca8816ccc33b8642bedf905c3d d3f27fbbd3b3cb9aaaf Static decode(string) : string CertificateUtils Static X509Certificate gencert Static createcertmaster(publickey, PrivateKey, string, int, string): X509Certificate Static createcertder(publickey, PrivateKey, string, string): PKCS10CertificateRequest Figure 1 Shared classes

4 CAcertEC nameca string deartmentca string organizationca string cityca string countryca string ostalcodeca string asswdca string ca string caissuer string sizeclave int monthdurationcacertificate int signalgorithm string keypairca KeyPair caprivkey PrivateKey capubkey PublicKey fxpath string cerpath string Public CAcertEC( ) Figure 2 Classes to create the CA CertificateUtilss KeyGeneration UserCertEC_DER generates a der certificate (a certificate request) This is a certificate without a signature, hence, not valid yet The der certificate should be sent to the CA for signing This class also generates a PKCS#12 to store the rivate key MinimumClient takes the client der certificate and sends it to the CA In the last block, classes so that the CA signs the certificate request, we create the classes included in Fig 4 The goals of these classes are: MinimumServer, the CA is listening, waiting for a client request When a client connects to the CA, the CA checks if the client is authorized to demand the service If the client is authorized then the CA signs the client certificate request using the DER2CER class Afterwards, the CA returns the signed certificate (cer), IV ready for use, back to the client The CA kees waiting for new client requests DER2CER, this class firstly edits the client certificate request (PKCS#10), and adds new data such as key length, certificate serial number, eriod of validity (valid from-to), and signature algorithm In our case, the CA uses the ECDSAwithSHA-1 (Ellitic Curve Digital Signature Algorithm with Secure Hash Algorithm 1) to sign certificates DER2CER needs to know the key (usually known as suerkey) to access the CA secret key, which is located in the file serverfx It is necessary to know the CA secret key otherwise the CA would not be able to sign the client certificate Afterwards, the client certificate (cer) is created with CertificateUtils ECC CERTIFICATION AUTHORITY PROTOCOL APPROACH In this section we exlain the general rocedure to obtain an ECC X509v3 certificate (see Fig 5) First of all, the client asks the CA to issue a certificate (ste 1) In further services, the client could be authenticated with this certificate, or the ublic key included in the certificate could be used for cihering Then, the CA sends its root certificate (servercacer) and the software needed by the client to generate the certificate request (ste 2) The client installs the CA root certificate in its trusted store Although not imlemented, the software could also be signed so that the client can trust in it The client executes the software to generate a key air and a certificate request (clientder) (ste 3) The client sends its certificate request to the CA (ste 4) The CA receives the certificate request and some information from the user to validate him/her Different aroaches can be taken to decide if a user is authorized or not to ask for an ECC X509v3 certificate and verify his/her identity For instance, if this system were used in a re-aid hotsot (eg airort, hotel, etc), the user could send a code number to be validated This code could be obtained when a re-aid card is bought In other environments, like a small comany, the user validation could be done in erson UserCertEC_DER String name String organization String city String country String asswd String X509Certificate UserCert KeyPair Keys PrivateKey PrivKey PublicKey PubKey int keysize int monthdurationusercertificate String signalgorithm String fxpath String cerpath init( ): void Manager TextField text1, text2, text3, text4, text5, text6, text8, text9 Jassw String Name String Det String Organization String City String Country String PC String wd String String athcert Public Manager(TextField, TextField, TextField, TextField, TextField, TextField, JPassword Field, TextField, TextField) PublicactionPerformed(ActionEvent): void Figure 3 Classes to generate a certificate request GrahicClient init( ): void CertificateUtils

5 DER2CER String cerpath String derpath String fxcapath String keypfxca String userparam String caparam String caissue KeyPair keypairca PrivateKey caprivkey PublicKey capubkey X509Certificate cacer String nameca String organizationca String cityca String countryca String ostalcodeca String asswdca String ca String name String deartment String organization String city String country String ostalcode String String asswd int keysize long nserie int monthdurationusercertificate String signalgorithm Public MinimumClient( ) Figure 4 Classes to sign the client certificate request Figure 5 General rocedure If the user is authorized to demand this service, and his/her identity has been confirmed, the CA rocesses the certificate request, signing it with its rivate key and sending the final X509v3 certificate (clientcer) to the client Using this certificate, the client can be authenticated for later network services Note that the entire rocess is transarent from the user side V ECC CERTIFICATION AUTHORITY IMPLEMENTATION In this section we resent the imlementation of our free oen-source ECC Certification Authority The imlementation can be downloaded from [14] For simlicity, we follow the 2 5 MinimumServer Static Main(args[]) : void CertificateUtils same nomenclature (ste 1, ste 2, etc) than we used in the revious section At first, the server is waiting for client requests In our imlementation, we assume that the client already has the software to generate the certification request (stes 1 and 2 in Fig 5) To make the rest of the rocess easier, we have included a web age where the user can introduce some of the data needed for his/her certificate (eg: name, affiliation, etc) Therefore, in the third ste the client loads the web age (Fig 6) When the form is filled in, the client clicks the send button At that time, the client software creates a key store PKCS#12, where the rivate ECC key is stored and the certificate request clientder is generated The client automatically sends the clientder certificate to the Certification Authority (ste 4 in Fig5) The CA receives the certificate request clientder, the name of the client host, and its IP address Received data belonging to clientder is shown in the screen We assume that the client has roer access to the service, so the CA should only issue the final client certificate Once the clientcer certificate is ready, the CA sends it back to the client At this moment, the client has three files: clientcer, clientder, and clientfx The file clientcer is the X509v3 ECC certificate The file clientder is the certificate request that can be deleted The file clientfx is the key store, where the client s rivate key is ket These three files are located in the directory reviously indicated in the form, in the box ath to store the certificate (Fig 6) In Fig 7 and Fig 8, we observe the details of the certificate (clientcer) The certificate is issued to Paco by the Certification Authority CA4ec and is valid from 10/12/2005 (following the date format dd/mm/yy) to 09/05/2006 We see in Fig 8 that the signature algorithm corresonds to the OID (Object Identifier) This OID matches the ECDSAwithSHA1 algorithm From Fig 8, we observe that the ublic key algorithm is ECIES, identified by the OID OIDs can be checked in [15] Regarding the certification ath, we note from Fig 7 and Fig 9 that the certificate aears as not valid (red cross in Fig 9) This is due to the fact that Windows XP oerating system does not include yet any library (or module) to use ECDSA That is, it does not understand yet the algorithms ECIES or ECDSA Consequently, it is not able to verify the integrity of the certificate VI CONCLUSIONS In this aer, we roose, design, and imlement a free oen-source Certification Authority that generates X509v3 certificates by using ellitic curve crytograhy We exlain the classes needed to create the Certification Authority, the classes needed to create a client certificate request, and the classes to sign and generate the final validated client certificate We also show a real imlementation With the use of this tye of alication, we aim to hel to sread the use of ellitic curve crytograhy Our imlementation is notably useful for small wireless devices with rocessing ower, storage sace, or ower consumtion restrictions

6 Figure 6 Client web age The user can fill in: name, surname, deartment, organization, city, country code, ostal code, secret key to access his/her rivate key, address, and the ath to store the certificate Figure 7 Certificate information Figure 8 Details of the certificate Figure 9 Certificate ath REFERENCES [1] S Vanstone, Next generation security for wireless: ellitic curve crytograhy, Comuters & Security, Vol 22, No 5, , 2003 [2] N R Potlaally, S Ravi, A Raghunathan, N K Jha, A study of the energy consumtion characteristics of crytograhic algorithms and security rotocols, IEEE Transactions on Mobile Comuting, Vol 5, No 2, , 2005 [3] W Rao, Q Gan, The erformance analysis of two digital signatures schemes based on secure charging rotocol, Proc International Conference on Wireless Communications, Networking, and Mobile Comuting, Vol 2, , Setember 2005 [4] V S Miller, Use of Ellitic Curves in Crytograhy, Proc CRYPTO 85, Sringer-Verlag, New York, , 1986 [5] National Institute of Standards FIPS-PUB Recommended Ellitic Curves for Federal Government Use, 1999 Available online <htt://csrcnistgov/crytotoolkit/dss/ecdsa/nistrecurdf> Last accessed 3 rd March 3 rd, 2006 [6] Certicom, Standards for efficient crytograhy Sec2:Recommended Ellitic Curve Domain Parameters, Released Standard Version 10, 2000 Available online <htt://wwwsecgorg> Last accessed March 3 rd, 2006 [7] ANSI X963, Public-Key Crytograhy for the Financial Services Industry, Key Agreement and Key Transort Using Ellitic Curve Crytograhy, 2001 [8] D R Brown, Standards for efficient crytograhy Sec1: Ellitic Curve Crytograhy, Released Standard Version 10 and Working Draft v15, 2005 Available online <htt://wwwsecgorg> Last accessed March 3 rd, 2006 [9] IEEE1363 Working Grou IEEE Std P1363a-2004 (Amendment to IEEE Std P ) IEEE Standard Secifications for Public-Key Crytograhy Amendment 1: Additional Techniques, 2004 [10] C Kaufman, Internet Key Exchange (IKEv2) Protocol, Internet Draft, 2005 [11] V Guta, S Blake-Wilson, B Möller, C Hawk, N Bolyard, ECC Ciher suites for TLS, Internet Draft, 2004 [12] ANSI X962 (2005) Public-Key Crytograhy for the Financial Services Industry, the Ellitic curve Digital Signature Algorithm (ECDSA) [13] The Legion of the BouncyCastle Available online <htt://wwwbouncycastleorg> Last accesed March 3 rd, 2006 [14] M D Cano, R Toledo Valera, F Cerdan corresonding author for code donwload [15] ASN1 Information Site OID Reository, 2006 Available online <htt://asn1elibeltmfr/oid/indexhtm> Last accesed March 3 rd, 2006

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Free Software Development. 2. Chemical Database Management

Free Software Development. 2. Chemical Database Management Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN

More information

Enhanced Security Key Management Scheme for MANETS

Enhanced Security Key Management Scheme for MANETS Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

Implementation of Elliptic Curve Digital Signature Algorithm

Implementation of Elliptic Curve Digital Signature Algorithm Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

A Survey of the Elliptic Curve Integrated Encryption Scheme

A Survey of the Elliptic Curve Integrated Encryption Scheme JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract

More information

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

2. Cryptography 2.4 Digital Signatures

2. Cryptography 2.4 Digital Signatures DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2010-2011 2. Cryptography 2.4 Digital Signatures 2010, Henrique J. Domingos, DI/FCT/UNL 2.4 Digital Signatures

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Predicate Encrytion Suorting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz Amit Sahai Brent Waters Abstract Predicate encrytion is a new aradigm for ublic-key encrytion that generalizes

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

SEC 2: Recommended Elliptic Curve Domain Parameters

SEC 2: Recommended Elliptic Curve Domain Parameters STANDARDS FOR EFFICIENT CRYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: secg-talk@lists.certicom.com September 20, 2000 Version 1.0 c 2000 Certicom Corp. License

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters Proceedings of the th World Congress in Mechanism and Machine Science ril ~4, 4, ianin, China China Machinery Press, edited by ian Huang. 86-8 Stability Imrovements of Robot Control by Periodic Variation

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

An Efficient NURBS Path Generator for a Open Source CNC

An Efficient NURBS Path Generator for a Open Source CNC An Efficient NURBS Path Generator for a Oen Source CNC ERNESTO LO VALVO, STEFANO DRAGO Diartimento di Ingegneria Chimica, Gestionale, Informatica e Meccanica Università degli Studi di Palermo Viale delle

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

A Java implementation of the Elliptic Curve Integrated Encryption Scheme

A Java implementation of the Elliptic Curve Integrated Encryption Scheme A Java implementation of the Elliptic Curve Integrated Encryption Scheme V. Gayoso Martínez 1, L. Hernández Encinas 1, and C. Sánchez Ávila 2 1 Department of Information Processing and Coding Institute

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Analysis of Effectiveness of Web based E- Learning Through Information Technology

Analysis of Effectiveness of Web based E- Learning Through Information Technology International Journal of Soft Comuting and Engineering (IJSCE) Analysis of Effectiveness of Web based E- Learning Through Information Technology Anand Tamrakar, Kamal K. Mehta Abstract-Advancements of

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Conjunctive, Subset, and Range Queries on Encrypted Data

Conjunctive, Subset, and Range Queries on Encrypted Data Conjunctive, Subset, and ange Queries on Encryted Data Dan Boneh dabo@cs.stanford.edu Brent Waters bwaters@csl.sri.com Abstract We construct ublic-key systems that suort comarison queries (x a) on encryted

More information

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

SMALL BUSINESS GRANTS PROGRAM GUIDELINES

SMALL BUSINESS GRANTS PROGRAM GUIDELINES SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina

More information

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS- SIMULATION USING NS2

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS- SIMULATION USING NS2 American Journal of Applied Sciences 11 (2): 171-179, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.171.179 Published Online 11 (2) 2014 (http://www.thescipub.com/ajas.toc) CERTIFICATE

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A New Efficient Digital Signature Scheme Algorithm based on Block cipher IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1

More information

Conjunctive, Subset, and Range Queries on Encrypted Data

Conjunctive, Subset, and Range Queries on Encrypted Data Conjunctive, Subset, and ange Queries on Encryted Data Dan Boneh dabo@cs.stanford.edu Brent Waters bwaters@csl.sri.com Abstract We construct ublic-key systems that suort comarison queries (x a) on encryted

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

Review of methods for secret sharing in cloud computing

Review of methods for secret sharing in cloud computing Review of methods for secret sharing in cloud computing Dnyaneshwar Supe Amit Srivastav Dr. Rajesh S. Prasad Abstract:- Cloud computing provides various IT services. Many companies especially those who

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information