A Secure Password-Authenticated Key Agreement Using Smart Cards
|
|
|
- Gervais Parrish
- 10 years ago
- Views:
Transcription
1 A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan, R.O.C. 2 Department of Computer Scence and Informaton Engneerng, Natonal Yunln Unversty of Scence and Technology, Yunln 64002, Tawan, R.O.C. 3 Department of Computer Scence and Informaton Engneerng, Southern Tawan Unversty of Scence and Technology, Tanan 71005, Tawan, R.O.C. [email protected], [email protected], [email protected] Abstract Smart card based password for authentcaton has become a common trend. Although smart card brngs convenences, t also ncreases the rsk n the case of lost cards. In other words, when the smart card s possessed by an attacker, the attacker wll possbly attempt to analyze the secret nformaton wthn the smart card to deduce the authentcaton mechansm of the server and then forge user credentals or break the entre authentcaton system. In ths paper, we analyze the lost smart card attack from Juang, et al. s scheme [9] that proposes password authentcated key agreement and propose an mproved robust and effcent user authentcaton and key agreement scheme usng smart cards. In order to bolster the securty of the entre system, we mtgated some of ts weaknesses. Keywords: Key exchange, Ellptc curve cryptosystem, Smart card, Authentcaton 1. Introducton When a user wants to obtan server-related servces, the user wll use password authentcaton to verfy dentty to the server. Untl now, many dfferent authentcaton schemes have been proposed. In 2005, Fan et al. proposed a robust remote authentcaton scheme wth smart cards [3]. They clamed that ther proposed scheme can satsfy the followng eght crtera: 1. Lower computatonal workload for smart cards. 2. Does not requre the user passwords table. 3. Users can choose ther own passwords freely. 4. Clock synchronzaton s not requred and no delay-tme lmtatons. 5. Thwarts replay attack. 6. Provdes server authentcaton. 7. Offlne dctonary attacks are neffectve. 8. Lost cards can be revoked wthout changng user denttes. The major contrbuton of Fan, et al. s scheme (for short FCZ-scheme) [3] s provdng a method for resstng offlne dctonary attack so that the scheme s secure 75
2 even f the attackers acqure the nformaton stored on the smart card. In 2008, Juang, et al., (for short JCL-scheme) [9] pont out the major drawbacks are loss of anonymty for the user and hgh computaton and communcaton cost n Fan, et al. s scheme. Furthermore, JCL-scheme does not provde a functon for sesson key agreement and cannot prevent nsder attack [5]. To mprove upon these drawbacks, Juang, et al., proposed a scheme that not only can provde dentty protecton but also keep lower communcaton and computaton cost by usng ellptc curve cryptosystems. They also proposed a soluton for mnmzng the rsk of lost cards. In other words, n order to avod nformaton leakage when a card s lost, the card can be revoked. Ths approach seems vable on the surface, but actually has a desgn flaw. The use of a fxed server key allows an offlne attack to be mounted aganst the server key when an attacker possesses the user card. Therefore, we propose to mprove JCL-scheme and mtgate the exposure of the entre system when a smart card s compromsed. The paper s organzed as follows: In Secton 2, we revew JCL-scheme [9] and analyze ts weaknesses. In Secton 3, we propose our scheme. In Secton 4, the securty analyss of our proposed scheme and comparson wth JCL-scheme are dscussed. Fnally, n Secton 5, we conclude the paper. 2. Revew and Analyss of the JCL-scheme In 2008, Juang, et al., proposed a robust and effcent user authentcaton and key agreement scheme whch not only satsfes all the benefts of Fan-Zhang scheme but can also provde dentty protecton and sesson key agreement. It can wthstand nsder attack and has low communcaton and computaton requrements by utlzng ellptc curve cryptosystem. A revew and analyss of the JCL-scheme s gven n ths secton The JCL-scheme The JCL-scheme [9] conssts of fve phases: parameter generaton, regstraton, precomputaton, log-n, and the password-changng phase. Descrptons of these phases are gven below. Parameter Generaton Phase The related parameters n ths scheme are as follows: (1) The server selects three numbers: a larger prme number P and two feld elements (a, b). 3 2 Where a ZP and b ZP must satsfy 4a 27b (modp) 0, and the ellptc curve equaton s defned as: : y 2 x 3 ax b. E P (2) The server generates a pont G from order n, and satsfes n G O. (3) The server selects a random number x s to be the prvate key, and computes the publc key P ( x G). S s (4) The server publshes the parameters ( P, P, E, G, n) S P. Regstraton Phase The user wll use the smart card to regster and send dentfcaton nformaton to the server. The server wll then verfy the user. Descrptons of these steps are as follows: 76
3 (1) The user wll select a random number b, and { ID, h( PW b)} wll be passed to the server. (2) After the server receves the message, t wll calculate b =E s ( h(pw b) ID CI h(id CI h(pw b)) ) and V h ID, s, CI ) where ID s the user s dentty and CI s ( { ID, CI the card number. The server wll store } n the nternal regstry. Fnally, ID, CI, b, V ) s returned to the user. ( Pre-computaton Phase The smart card chooses a random number r and calculates e ( r G) and c ( r PS ) r x G. Then (e, c) stored n card s memory. In the log-n phase, (e, c) wll also be used. Log-n Phase If the user wants to log-n to the server, he wll cooperatvely perform the followng steps: Step 1: The smart card calculates EV (e) and sends EV (e) and b to the server. The server uses the secret key s to decrypt b, n other word, Ds ( b ) ( ID CI h( PW b)), and calculates V h ID, s, CI ) to D ( E ( e)) e. Then, the server wll verfy the followng thngs: ( V V Is CI stored n the regstraton table? Is ID n the regstraton? Step 2: If any of the above checks are false, the server revokes the agreement. If the above verfcatons are true, the server chooses a random number u and calculates c ( r PS ) r x G and M S h( c u V ). Then, the server sends (c, M s ) to the smart card. Step 3: The smart card calculates and checks M S. If M s h( c u V ), the smart card calculates M U = h(h(pw b) V c u) and a sesson key S k = h(v,c,u) and then sends M U to the server. Step 4: The server checks M U. If M U = h(h(pw b) V c u), the server calculates a sesson key S k = h(v,c,u). Password-Changng Phase If the user wants to change hs password, the smart card can encrypt the password changng message usng the sesson key that s produced n the log-n phase. To do so, the smart card selects a random number b* and produces another new password PW and sends * E sk (ID,h(PW * b*)) to the server. After the server receves the message, t recalculates b =E s (h(pw* b*) ID CI h(id CI h(pw * b*))) and sends E Sk (b *) to the smart card. The smart card wll decrypt b * usng a sesson key and store t n ts memory Securty analyss of the JCL-scheme Juang, et al., proposed many nsghtful securty analyses to ther scheme. They also proposed a soluton for the ssue of lost cards and mnmzed system nformaton dsclosure by usng card revocaton. As mentoned before, the system may be compromsed by extractng nformaton from the smart card n order to falsfy server authentcaton. * 77
4 Specfcally, n the case of known ID and CI (these messages are stored on the smart card), the attacker wll attempt to solve V h( ID, s, CI ). The attacker can seek out the secret server key s usng offlne attack. After the secret value s s known, the attacker can freely tamper wth the nternal value of b, compromsng the securty of the entre system. 3. The Proposed Scheme We mprove on JCL-scheme and propose an enhanced password-authentcaton key agreement. Ths scheme not only mantans all the benefts of the JCL-scheme but also can enhance the securty of the server when the smart card contents are dsclosed. Our proposed scheme also conssts of the same fve phases: parameter generaton, regstraton, precomputaton, log-n, and password-changng. Parameter Generaton Phase In ths phase, the proposed methods modeled after JCL-scheme. (1) The server selects three numbers: a larger prme number P and two feld elements (a, b). Where a ZP and ZP equaton s defned as: 3 2 b must satsfy 4a 27b (modp) 0, and the ellptc curve E P 2 3 : y x ax b. (2) The server generates a pont G from order n, and satsfes n G O. (3) The server selects a random number x s to take the prvate key, and computes the publc key P ( x G). S s (4) The server publshes the parameters ( P, P, E, G, n) Regstraton Phase S P. The user can use the smart card to send dentfcaton nformaton for the server to authentcate. Descrptons of these steps (as depcted n Fgure 1) are as follows: Step 1: The smart card chooses a random number b and calculates Eq.(1). T 1 = h(pw b -1 ). (1) Then the smart card sends {ID,h(PW b), T 1 } to the server. Step 2: The server chooses another random number S 2 and calculates Eqs.(2-4). T 2 = T 1 S 2-1 b = E S 1 (h(pw b) T 2 ID CI h(id CI h(pw b))) (3) V h ID, T, CI ) (4) ( 1 Then, the server ssues credentals to user that contans parameters (ID,CI,b,V ). Step 3: The user receves (ID,CI,b,V ) and then stores these parameters and b nto the smart card. (2) 78
5 Pre-computaton Phase The smart card chooses a random number r and calculates: e ( r G) (5) c ( r PS ) r x G (6) Then (e, c) s stored n card memory for use n the log-n phase. Fgure 1. Regstraton and Pre-computaton Phase of the Proposed Scheme Log-n Phase The user wants to logn to the server and must use hs own smart card and password. Descrptons of these steps (as depcted n Fgure 2) are as follows: Step 1: After calculatng EV (e), the smart card sends EV (e) and b to the server. Step 2: The server decrypts b usng the secret key S 1 and obtans D (T 2 ID CI h(pw b)) = b, and calculates Eq.(7) and Eq.(8), respectvely. T 1 T2 S2 (7) V h ID, T, CI ) (8) ( 1 Then, the server wll verfy the followng: Is CI stored n the regstraton table? Is ID n the regstraton? If any of the above verfcatons are false, the server revokes the agreement. If the above verfcatons are true, the server chooses a random number u and calculates: Then, the server sends (c, c =(e x)=( r x G) (9) M S = h(c u V ) (10) M S ) to the smart card. S 1 79
6 Step 3: The smart card calculates and checks M S. If Ms s true, the smart card calculates: M U = h(h(pw b) T 1 c u) (11) S k = h(v,c,u) (12) And then the smart card sends M U to the server. Step 4: The server checks M U. If M U s true, the server calculates a sesson key S k = h(v,c,u) and accepts the log-n request. Password-Changng Phase When user wants to change hs password, the smart card can encrypt the password changng message usng the sesson key that s produced n the log-n phase. Then, the smart * card selects a random number b* and produces another new password PW and sends (ID,h(PW * b*), T 1 ) to the server. After the server receves the message, t recalculates E S k b * = E S 1 (h(pw* b*) T 2 ID CI h(id CI h(pw * b*))) and sends E S k (b *) to the smart card. The smart card wll decrypt b * usng a sesson key and store b * and b* n ts memory (as depcted n Fgure 3). Fgure 2. Log-n Phase of the Proposed Scheme Fgure 3. Password Changng Phase of the Proposed Scheme 80
7 4. Securty Analyss and Comparson In ths secton, we wll analyze the securty of our proposed scheme and make some comparsons wth related schemes Securty Analyss In ths paper, our proposed scheme provdes the same benefts as JCL-scheme [9] but also mproves upon ther scheme. Though the approaches are smlar, dsclosng the nformaton on a smart card s catastrophc to JCL-scheme leads to total compromse. We dscuss two dfferent aspects of our approach: Lost smart card Assume the attacker accesses the smart card and wants ascertan nternal value b. Value b cannot be decrypted wthout possessng the secret server key S 1. In the case of known ID and CI, f the attacker tres to calculate V h( ID, T1, CI ), the value T 1 s requred. In order to obtan T 1, the attacker needs to know the user password PW n h(pw b -1 ). Dsclosure of the nformaton on the smartcard stll requres addtonal nformaton n order to be of any value. Mutual authentcaton In the log-n phase of our proposed scheme, the server sends M s to the smart card. After recevng M s, the smart card verfes t s true or false. The server can check f h(pw b) n M U s equal to h(pw b) n b. If t s not, the server sends a wrong password message back to the user. Preventng the Replay Attack What s replay attack? That s when an attacker tres to mtate the user to log n to the server by resendng the messages transmtted between the user and the server. In our proposed scheme, we use random numbers to prevent ths knd of attack. The smart card chooses a random number r and calculates e ( r G) and c ( r PS ) r x G n the precomputaton phase and then sends t to the server n the log-n phase. The second random number u s chosen by the server. Securty of secret keys In our proposed scheme, we use two secret keys (S 1, S 2 ). The server decrypts b usng the secret key S 1, and calculates T 1 from secret key S 2 and T 2. In our scheme, assumng the attacker holds the user s card and uses offlne attack to obtan the server key, t wll not result n ncreased rsk to the entre system. For revocaton, we use Juang et al. s mechansm to revoke the card to ensure the prvacy of the user Comparson The followng table compares the propertes of the proposed scheme and prevous schemes [3, 4, 5, 6, 9, 10]: C1: low communcaton and computaton cost C2: no password table C3: users can choose the passwords C4: no tme-synchronzaton problem C5: mutual authentcaton C6: revokng a lost card wthout changng the user s dentty 81
8 C7: dentty protecton C8: sesson key agreement C9: preventng offlne dctonary attack aganst the smart card nformaton Table 1. Propertes of the Proposed Scheme versus Prevous Schemes 5. Concluson In ths paper, we revew JCL-scheme [9] and dscuss the major drawbacks of ther scheme. Then we proposed an mprovement scheme that not only mantans all the benefts of the JCL-scheme but also enhances the securty of the server when the server key s dsclosed. In our scheme, even f the attacker holds the user s card, and mounts an offlne attack to obtan the server key, t wll not result n rsk to the entre system. We use Juang, et al. s mechansm to revoke cards and ensure the prvacy of the user. Possesson of a smart card does not allow knowledge of the second secret key n the server, so the attacker cannot break the securty of the system. Acknowledgements Ths work was supported by NSC E References [1] A. Jursc and A. Menezes, Ellptc Curves and Cryptography, (1997), pp [2] D. Nguyen, S. Oh and B. You, A framework for Internet-based nteracton of humans, robots, and responsve envronments usng agent technology, IEEE Trans. Ind. Electron., vol. 52, (2005), pp [3] Fan, Y. Chan and Z. Zhang, Robust remote authentcaton scheme wth smart cards, Computer Securty, vol. 24, (2005), pp [4] H. Chen, J. Jan and Y. Tseng, An effcent and practcal soluton to remote authentcaton: Smart card, Computer Securty, vol. 21, (2002), pp [5] H. Sun, An effcent remote use authentcaton scheme usng smart cards, IEEE Trans. Consum. Electron., vol. 46, (2000), pp [6] H. Hwang and L. L, A new remote user authentcaton scheme usng smart cards, IEEE Trans. Consum. Electron., vol. 46, (2000), pp
9 [7] K. Saeed and M. Nammous, A speech-and-speaker dentfcaton system: Feature extracton, descrpton, and classfcaton of speech-sgnal Image, IEEE Trans. Ind. Electron., vol. 54, (2007), pp [8] N. Kobltz, A. Menezes and S. Vanstone, The state of ellptc curve cryptography, Desgns, Codes Cryptography, vol. 19, (2000), pp [9] W. S. Juang, S. T. Chen and H. T. Law, Robust and Effcent Password-Authentcated Key Agreement Usng Smart Cards, IEEE Transactons on Industral Electroncs, vol. 55, (2008), pp [10] W. Juang, Effcent password authentcated key agreement usng smart cards, Computer Securty, vol. 23, (2004), pp [11] W. Ku and S. Chen, Weaknesses and mprovements of an effcent password based remote user authentcaton scheme usng smart cards, IEEE Trans. Consum. Electron., vol. 50, (2004), pp [12] W. Yang and S. Sheh, Password authentcaton schemes wth smart cards, Computer Securty, vol. 18, (1999), pp Authors Ka Chan He was born n Kaohsung, Tawan, on March 13, He receved the M.S. degree n Electrcal Engneerng from Natonal Tawan Unversty n He s a lecturer n the Department of Computer and Informaton Scence at the Republc of Chna Mltary Academy. He s currently pursung hs Ph.D. degree n Cryptography from the Insttute of Computer Scence and Communcaton Engneerng at Natonal Cheng Kung Unversty under Profs. Ch-Sung Lah and Jar-Ferr Yang. Hs research nterests nclude Network and Informaton Securty, wth a concentraton on appled Cryptography. Wen-Chung Kuo He receved the B.S. degree n Electrcal Engneerng from Natonal Cheng Kung Unversty and M.S. degree n Electrcal Engneerng from Natonal Sun Yat-Sen Unversty n 1990 and 1992, respectvely. Then, He receved the Ph.D. degree from Natonal Cheng Kung Unversty n Now, he s an assocate professor n the Department of Computer Scence and Informaton Engneerng at Natonal Yunln Unversty of Scence & Technology. Hs research nterests nclude steganography, cryptography, network securty and sgnal processng. Jn-Chou Cheng He was born n He receved hs M.S. degree n Communcaton Engneerng from Natonal Chao Tung Unversty, Tawan, R.O.C. n 1985 and Ph.D. degree n Electrcal Engneerng form Natonal Cheng Kung Unversty n He s an assocate professor n the Department of Computer Scence and Informaton Engneerng at Southern Tawan Unversty from He s engaged n the research of applcaton of Ellptc Curve Cryptography. Hs research nterests also nclude network securty and Stegography. 83
10 84
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
Trivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
sscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
Security Architecture for Sensitive Information Systems
Securty Archtecture for Senstve Informaton Systems by Xanpng Wu BCS, MBA, MNC A Thess Submtted n Fulfllment of the Requrements for the Degree of Doctor of Phlosophy Faculty of Informaton Technology Monash
A role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
Inter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
Ad-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
Optimal Distributed Password Verification
Optmal Dstrbuted Password Verfcaton Jan Camensch IBM Research Zurch [email protected] Anja Lehmann IBM Research Zurch [email protected] Gregory Neven IBM Research Zurch [email protected] ABSTRACT We present
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Tracker: Security and Privacy for RFID-based Supply Chains
Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
Damage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks
PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu
Resource Management and Organization in CROWN Grid
Resource Management and Organzaton n CROWN Grd Jnpeng Hua, Tanyu Wo, Yunhao Lu Dept. of Computer Scence and Technology, Behang Unversty Dept. of Computer Scence, Hong Kong Unversty of Scence & Technology
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
Assessment of the legal framework
46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
Oservce Vs. Sannet - Which One is Better?
o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 [email protected] Shh-Wen Chu nsttute of nformaton Management Natonal
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
Secure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
How To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
Trust Formation in a C2C Market: Effect of Reputation Management System
Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons [email protected] Kazunar Ishda Tokyo Unversty of Agrculture [email protected] Toshzum
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI
ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng
MULTIVAC Customer Portal Your access to the MULTIVAC World
MULTIVAC Customer Portal Your access to the MULTIVAC World 2 Contents MULTIVAC Customer Portal Introducton 24/7 Accessblty Your ndvdual nformaton Smple and ntutve Helpful and up to date Your benefts at
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
DP5: A Private Presence Service
DP5: A Prvate Presence Servce Nkta Borsov Unversty of Illnos at Urbana-Champagn, Unted States [email protected] George Danezs Unversty College London, Unted Kngdom [email protected] Ian Goldberg Unversty
LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS
Proceedngs of the Postgraduate Annual Research Semnar 2005 238 LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS Cahyo Crysdan and Abdul Hanan Abdullah The Faculty of Computer Scence and Informaton System
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
ThresPassport A Distributed Single Sign-On Service
ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna [email protected], [email protected]
SEVERAL trends are opening up the era of Cloud
1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],
A heuristic task deployment approach for load balancing
Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
Secure SIP-based Mobility Management Scheme for Cost-Optimized NEMO Environments
Secure SIP-based Moblty Management Scheme for Cost-Optmzed NEMO Envronments Chulhee Cho 1 Jae-Young Cho 1 Jun-Dong Cho 2 and Jongpl Jeong 2* 1 College of Informaton and Communcaton Engneerng Sungkyunkwan
SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME
August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000
Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
