A Novel Lightweight Algorithm for Secure Network Coding
|
|
|
- Lester Rose
- 10 years ago
- Views:
Transcription
1 A Novel Lghtweght Algothm fo Secue Netwok Codng A Novel Lghtweght Algothm fo Secue Netwok Codng State Key Laboatoy of Integated Sevce Netwoks, Xdan Unvesty, X an, Chna, E-mal: {wangxaoxao,wangmeguo}@mal.xdan.edu.cn Abstact In the pactcal netwok codng scenao, the advesay usually has full eavesdoppng abltes. Hence, lghtweght secue netwok codng s moe sutable than the nfomaton-theoetc appoach. We popose a novel codng scheme aganst a global eavesdoppe n ths pape. In ou scheme, we utlze mappng values to andomze ognal packets nstead of locked coeffcents. It means that only one encypted symbol s eued fo a packet, whch apdly educes space ovehead and encypton volume. Meanwhle, thee s no addtonal euement at ntemedate nodes. Compaed to the exstng schemes, ou scheme s moe effcent n space ovehead and encypton volume wth appopate computatonal complexty.. Intoducton Keywods: Netwok Codng, Lghtweght Secue, Eavesdoppng Attacks Netwok codng [] allows ntemedate nodes to mx the ncomng packets befoe sendng out, whch s dffeent fom the tadtonal stoe-fowad mechansm. Lnea netwok codng [2] showed that t could acheve the multcast capacty n a suffcent lage feld. Fo the opeaton convenence and smple algebac stuctue, much of the eseach focuses on the lnea netwok codng. Moeove, when the feld sze s lage than 2 8 o 2 6, andom lnea netwok codng (RLNC) [3] could also acheve the multcast capacty wth pobablty exponental appoachng wth code length. In RLNC, the ntemedate nodes ndependently select codng coeffcents andomly ove fnte feld, whch s a decentalzed mechansm, and easy to mplemented n pactce. Koette and Medad [4] poposed the algebac famewok fo netwok codng and gave an algebac chaactezaton of the multcast poblem. Netwok codng had many applcatons, such as weless mesh netwok [5-6] and coopeatve communcaton [7] etc. Secue netwok codng was fst consdeed n [8] to acheve pefect nfomaton-theoetc secuty, whch s aganst that advesaes could only wetap a lmted numbe of netwok lnks. Feldman et al. [9] showed that makng a secue lnea netwok code s euvalent to fndng a lnea code wth genealzed dstance popetes and ponted that f we gve up a small amount of oveall capacty, then a andom code acheves secuty by usng a much smalle feld. Rouayheb et al. [] pesented a constucton of secue netwok codes by usng secue codes fo wetap channel Ⅱ.Nga et al. [] extended the genealzed Hammng weght [2] fo lnea eo coecton codes to lnea netwok codes. Weakly secue netwok codng was poposed n [3] such that advesay s unable to get any meanngful nfomaton about the souce messages, ths s moe pactce than the pefect nfomaton-theoetc secuty. Stongly secue lnea netwok codng s poposed by Haada and Yamamoto [4], they showed that stong secuty n fact contans weak secuty as a specal case. Unvesal secue netwok codng was poposed n [5] based on ank-metc codes, and t has the unvesal popety that can be appled on top of any netwok wthout po knowledge o any modfcatons on the lnea netwok code. Jan [6] studed the elaton between secuty and netwok topology. A necessay and suffcent condton was deved unde whch souce messages can be tansmtted wth pefect secuty. In eal scenaos, the wetap capablty s unlmted and computatonally bounded. Moeove, netwok capacty and compute esouce ae pecous. To solve the poblem, the moe pactcal scheme was poposed n [7-9] that combnes cyptogaphc appoaches wth netwok codng to aganst global eavesdoppe and keeps andom netwok codng unchanged at ntemedate nodes. A mnmum ovehead scheme (MOS) was poposed n [7] to acheve pefect secuty, but wth hgh encypton volume because the whole message s encypted. The scheme n [8] (P-Codng) utlzed pemutaton encypton functon to aganst eavesdoppng attacks wthout ovehead, but t s also wth hgh Advances n nfomaton Scences and Sevce Scences(AISS) Volume4, Numbe2, Nov 22 do:.456/aiss.vol4.ssue
2 A Novel Lghtweght Algothm fo Secue Netwok Codng encypton volume. Lghtweght secue scheme (SPOC) was pesented n [9], whch only encypts a much shote exta codng vecto nstead of the whole packet, so t educed encypton volume but nceased capacty ovehead. In ths pape, we popose a moe effcent scheme aganst global eavesdoppe that acheves secuty wth mnmum ovehead and encypton volume wthout changng the mplement at the ntemedate nodes o eung a lage feld. The key dea of ou novel scheme s to utlze some mappng values to geneate a souce pecodng matx nstead of exta codng vectos, whch educe the length of the andom keys. 2. Poblem Fomulaton We epesent a communcaton netwok by an acyclc dected gaph G V, E, whee V and E denote the set of nodes and edges, espectvely. Each edge n the netwok s able to tansmt a packet ove fnte feld wthout eo. Souce node S wshes to send a lage fle M to all the eceves n a geneaton and M s spltted nto data packets by S. Each data packet s denoted by n x ( x,, xn),, whee. Intemedate nodes andomly choose codng coeffcents ove fo ts nput packets and fowad a lnea combnaton of nput packets at each outgong edge. Snk nodes can ecove M wth Gaussan elmnaton afte ecevng at least lnea ndependent packets. Thee s a global eavesdoppe n the netwok. We assume the advesay s able to choose a subset of ndependent edges, whch means that the global codng vectos of wetap edges ae ndependent. 3. Poposed Scheme In ths secton, we popose a pecodng scheme fo lghtweght secue netwok codng wth gnoed space ovehead. 3. Pecodng at Souce As descbed n the pevous secton, a lage fle M was spltted nto packets, and we choose an n appopate mappng functon h( x): fo these packets, whch maps packets to dffeent values. Then, we constuct a pecodng matx P by mappng values h( x ),. h( x) h( x2) h( x ) h( x) h( x2) h( x ) P h( x) h( x2) h( x ) () Obvously, matx P s a Vandemonde matx and t s an nvetble matx that could be used to pe-encode ognal packets x, x. x x x2 x2 P x x n n (2) Then souce S concatenates packet x ( x,, xn, h( x)). x wth coespondng mappng value h( x ) to be a pe-encoded 676
3 A Novel Lghtweght Algothm fo Secue Netwok Codng Fo secuty, S must hde the last symbol h( x ) of x fom advesay, so that the advesay can not get nfomaton about ognal packet by wetappng attacks. We encypt h( x ) usng AES cyptosystem and obtan Ehx ( ( )). Then we get a new packet x ( x,, xn, E( h( x))). Afte that, S ceates an augmented packet as follow, new m (,,,,,,, x ) ( n),,,. At last, the augmented packets ae tansmtted nto the netwok and the ntemedate nodes employee RLNC. 3.2 Decodng at Snks When a snk node eceves at least ndependent message packets, t can begn to decode as follows. new new T Step : Usng Gaussan elmnaton to ecove the new message packets [ x,, x ]. new new T Step 2: We decypt the last column of [ x,, x ] wth AES to get [ x,, x ] T and h( x ). Step 3: Constuct the pecodng matx P by h( x ),,,. Compute the nvese matx P, and emove h( x ),, h( x ) T fom [ x,, x ] T to obtan [ x,, x ] T. T T Step 4: At last, we obtan the ogn data packets by [ x,, x ] P [ x,, x ]. 3.3 Secuty Analyss new We assume the advesay has full knowledge about the stuctual chaactestcs of P, and mappng functon h() s also known to t. Howeve, t s computatonally bounded, whch means that gven a ha mappng value b, t s computatonally nfeasble to fnd nput a such that b. The element of P s keep secet to advesay, snce we andomze the ognal packets x, by P. Euvalently, the ognal packets ae encypted by P. Theefoe, the advesay only gets the new lnea combnaton of x,. Futhemoe, the advesay s able to eavesdop at least ndependent edges to decode new new x,, x. The subset of wetap edges s denoted by W, and R {( h x ),,} denotes new new mappng value set. The advesay tes to obtan the ogn packets x,, x fom x,, x by the followng euaton system, h( x) xh( x2) x2 h( x) x x h( x) xj h( x2) x2j h( x) xj xj (4) h( x) xn h( x2) x2n h( x) xn xn thee ae ( n ) euatons wth ( n ) unknown vaables x,, xn and h( x),, h( x ) n (4). It s easly known that h( x ),, h( x ) has P possbltes, because h( x ), has possbltes. So the numbe of total possbltes s ( ) ( 2) ( ) P. Theefoe, the soluton to (4) s an affne subspace wth cadnalty as follow, That means, ( n) P ( n) P (3) 677
4 A Novel Lghtweght Algothm fo Secue Netwok Codng P x,, xyw (5) P whee Y W denotes the message packets whch ae caed n W. Hence, the advesay cannot ecove x,, x wthout h( x),, h( x ). That s, the ogn data packets ae secue. 3.4 Compason In ou scheme, thee ae ogn data packets n a geneaton whch ae n -length, and get n - length pe-encoded packets afte souce codng. That means the space ovehead of one packet s. The last symbol of the pe-encoded packet s used to constuct the locked coeffcent, so that only one symbol s needed to be encypted. As mentoned pevously, the space ovehead and encypton volume ae ndependent of the packets, whch ae sgnfcant educed by ou scheme. Howeve, SPOC encypts n -length ogn data packets wth -length global encodng vectos. These global encodng vectos ae encypted by shaed keys and placed n the heade of the coespondng peencoded packets, whch ae called locked coeffcents. 8 In ode to gve a smple compason, we consde a feld wth sze 2, and thee ae 2 packets n a geneaton. The maxmum packet sze s 5 bytes as [9] mentoned. Ou scheme esults n a space ovehead ato of.667%, because of only one symbol s placed n the heade of a packet. Howeve, thee s 2-length locked coeffcent placed n the heade by SPOC, so that the space ovehead ato s 3.3% fo SPOC. Futhemoe, ou scheme yelds encypton volume of 2 bytes n a geneaton and coespondng to 4 bytes by SPOC. Table. Compason wth othe schemes Schemes Encypton Volume Space Ovehead Computaton Cost Adel [7] n Zhang [8] Vlela [9] Ous n 3 ( ) 3 ( ) The compason between ou scheme and othe schemes s gven n Table. and Fgue, the ed cuve n Fgue s ou esult. And the blue cuve s ovelappng to the puple cuve, whch means the encypton volume geneated by Vlela scheme s almost same as tadtonal scheme. We can see fom Table. that ou scheme causes a tny space ovehead and Fgue shows that ou scheme sgnfcantly educes the encypton volume compaed to othes. In addton, the computatonal cost of ou scheme s 3 ( ), whch s the same as SPOC. The man computatonal cost conssts of the nvese of pecodng matx P and othe matx opeaton. The scheme poposed n ths pape s an effcent algothm whch has smalle space ovehead and lowe encypton volume wth appopate computaton cost. 678
5 A Novel Lghtweght Algothm fo Secue Netwok Codng Tadtonal Vlela Ou Zhang Adel Encypton volume Data sze Fgue. The compason of encypton volume 4. Concluson We poposed a novel lghtweght scheme aganst eavesdoppng attacks based on computatonal secuty n ths pape. The basc dea of ths scheme s to utlze keys, whch ae espectve to ogn data packets, to geneate a Vandemonde matx as pecodng matx. Snce encypted mappng value s embedded at the end of pe-encoded packets and then tansmtted ove the netwok, the space ovehead s mnmzed, and the encypton volume s educed as well. The secuty analyss shows that fo the same secuty euement, ou scheme s moe effcent. 5. Acknowledgements Ths wok s suppoted by the Natonal Natual Foundaton of Chna unde Gants No.6832 and The authos also would lke to thank all the evewes fo the had woks. 6. Refeences [] Rudolf Ahlswede, Nng Ca, Shuo-Yen Robet L, and Raymond W. Yeung, Netwok nfomaton flow, IEEE Tans. Inf. Theoy, Vol. 46, No.4, pp , July. 2. [2] Shuo-Yen Robet L, Raymond W. Yeung and Nng Ca, Lnea netwok codng, IEEE Tans. Inf. Theoy, Vol. 49, No. 2, pp , Feb. 23. [3] Tacey Ho, Muel Medad, Ralf Koette, Davd R. Kage, Mchelle Effos, Jun Sh and Ben Leong, A andom lnea netwok codng appoach to multcaost, IEEE Tans. Inf. Theoy, Vol. 52, No., pp , Oct. 26. [4] Ralf Koette and Muel Medad, An algebac appoach to netwok codng, IEEE/ACM Tansactons on Netwokng, Vol., No. 5, pp , Oct. 23. [5] Jn Q,, Shuny Zhang, Shujng L,, Lu Cao, "A Random Lnea Codng Algothm fo Cogntve Weless Mesh Netwoks", JCIT, Vol. 7, No. 6, pp. 2-2, 22. [6] Yafe Hu, Fangmn L, Xnhua Lu, "On Netwok Codng fo Qos Impovement n Weless Mesh Netwoks", AISS, Vol. 4, No. 7, pp. -3,
6 A Novel Lghtweght Algothm fo Secue Netwok Codng [7] Mngfeng Zhao, Yajan Zhou,, Yxan Yang, Wen Song, "An Impoved Analog Netwok Codng Scheme fo Coopeatve Communcaton Systems", JCIT, Vol. 6, No. 9, pp. 2-29, 2. [8] Nng Ca and Raymond W. Yeung, Secue netwok codng, n Poc. IEEE ISIT 2, Lausanne, Swtzeland, July 22, pp [9] Jon Feldman, Tal Malkn, Clff Sten, and Rocco A. Sevedo, On the capacty of secue netwok codng, n Poc. 42nd Annual Alleton Conf. Commun., Contol and Comput., Sep. 24. [] Salm El Rouayheb, Emna Soljann, and Alex Spntson, Secue netwok codng fo wetap netwoks of type Ⅱ, IEEE Tansactons on Infomaton Theoy, Vol. 58, No. 3, pp Ma. 22. [] Ch-Kn. Nga, Raymond W. Yeung and Zhxue Zhang, Netwok genealzed hammng weght, n Poc. Wokshop on Netwok Codng Theoy and Applcaton., Lausanne, Swtzeland, 29, pp [2] Vcto K. We, Genealzed hammng weght fo lnea codes, IEEE Tans. Inf. Theoy, Vol. 37, No. 5, pp , Sep. 99. [3] Kapl Bhattad and Kshna R. Naayanan, Weakly secue netwok codng, n Poc. NETCOD 5, Rva del Gada, Italy, Ap. 25. [4] Kunhko Haada and Hosuke Yamamoto, Stongly secue lnea netwok codng, IEICE Tans. Fund., Vol. E9-A, No., pp , Oct. 28. [5] Danlo Slva and Fank R. Kschschang, Unvesal secue netwok codng va ank-metc codes, IEEE Tans. Inf. Theoy, Vol. 57, No. 2, pp , Feb. 2. [6] Kamal Jan, Secuty based on netwok topology aganst the wetappng attack, IEEE Weless Commun., Vol., No., pp. 68-7, Feb. 24. [7] Majd Adel and Huapng Lu, Secue netwok codng wth mnmum ovehead based on hash functons, IEEE Commun. Lett., Vol. 3, No 2, pp , Dec. 29. [8] Peng Zhang, Ynxn Jang, Chuang Ln, Yanfe Fan and Xuemn Shen, P-Codng: secue netwok codng aganst eavesdoppng attacks, n Poc. IEEE INFOCOM 2, San Dego, CA, USA, Ma. 2, pp. -9. [9] Joao P. Vlela, Lusa Lma and Joao Baos, Lghtweght secuty fo netwok codng, n Poc. IEEE ICC8, Bejng, Chna, pp , May
Additional File 1 - A model-based circular binary segmentation algorithm for the analysis of array CGH data
1 Addtonal Fle 1 - A model-based ccula bnay segmentaton algothm fo the analyss of aay CGH data Fang-Han Hsu 1, Hung-I H Chen, Mong-Hsun Tsa, Lang-Chuan La 5, Ch-Cheng Huang 1,6, Shh-Hsn Tu 6, Ec Y Chuang*
An Algorithm For Factoring Integers
An Algothm Fo Factong Integes Yngpu Deng and Yanbn Pan Key Laboatoy of Mathematcs Mechanzaton, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng 100190, People s Republc of Chna
AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE
Radoengneeng Aea Coveage Smulatons fo Mllmete Pont-to-Multpont Systems Usng Buldng Blockage 43 Vol. 11, No. 4, Decembe AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL
Keywords: Transportation network, Hazardous materials, Risk index, Routing, Network optimization.
IUST Intenatonal Jounal of Engneeng Scence, Vol. 19, No.3, 2008, Page 57-65 Chemcal & Cvl Engneeng, Specal Issue A ROUTING METHODOLOGY FOR HAARDOUS MATIALS TRANSPORTATION TO REDUCE THE RISK OF ROAD NETWORK
Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments
IEEE ICC 2014 - Next-Geneaton Netwokng Symposum 1 Jont Vtual Machne and Bandwdth Allocaton n Softwae Defned Netwok (SDN) and Cloud Computng Envonments Jonathan Chase, Rakpong Kaewpuang, Wen Yonggang, and
TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS
TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS Hossen Jula α, Maged Dessouky β, and Petos Ioannou γ α School of Scence, Engneeng and Technology, Pennsylvana
Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction
Intenatonal Jounal of Machne Leanng and Computng, Vol. 2, No. 3, June 202 Effcent Evolutonay Data Mnng Algothms Appled to the Insuance Faud Pedcton Jenn-Long Lu, Chen-Lang Chen, and Hsng-Hu Yang Abstact
Perturbation Theory and Celestial Mechanics
Copyght 004 9 Petubaton Theoy and Celestal Mechancs In ths last chapte we shall sketch some aspects of petubaton theoy and descbe a few of ts applcatons to celestal mechancs. Petubaton theoy s a vey boad
PCA vs. Varimax rotation
PCA vs. Vamax otaton The goal of the otaton/tansfomaton n PCA s to maxmze the vaance of the new SNP (egensnp), whle mnmzng the vaance aound the egensnp. Theefoe the dffeence between the vaances captued
A New Estimation Model for Small Organic Software Project
8 03 ACADEMY PUBLISHER A New Estmaton Model o Small Oganc Sotwae Poject Wan-Jang Han, Tan-Bo Lu, and Xao-Yan Zhang School O Sotwae Engneeng, Bejng Unvesty o Posts and Telecommuncaton, Bejng, Chna Emal:
Mixed Task Scheduling and Resource Allocation Problems
Task schedulng and esouce allocaton 1 Mxed Task Schedulng and Resouce Allocaton Poblems Mae-José Huguet 1,2 and Pee Lopez 1 1 LAAS-CNRS, 7 av. du Colonel Roche F-31077 Toulouse cedex 4, Fance {huguet,lopez}@laas.f
Gravitation. Definition of Weight Revisited. Newton s Law of Universal Gravitation. Newton s Law of Universal Gravitation. Gravitational Field
Defnton of Weght evsted Gavtaton The weght of an object on o above the eath s the gavtatonal foce that the eath exets on the object. The weght always ponts towad the cente of mass of the eath. On o above
A Coverage Gap Filling Algorithm in Hybrid Sensor Network
A Coveage Ga Fllng Algothm n Hybd Senso Netwok Tan L, Yang Mnghua, Yu Chongchong, L Xuanya, Cheng Bn A Coveage Ga Fllng Algothm n Hybd Senso Netwok 1 Tan L, 2 Yang Mnghua, 3 Yu Chongchong, 4 L Xuanya,
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand
A ew eplenshment Polcy n a wo-echelon Inventoy System wth Stochastc Demand Rasoul Haj, Mohammadal Payesh eghab 2, Amand Babol 3,2 Industal Engneeng Dept, Shaf Unvesty of echnology, ehan, Ian ([email protected],
LINES ON BRIESKORN-PHAM SURFACES
LIN ON BRIKORN-PHAM URFAC GUANGFNG JIANG, MUTUO OKA, DUC TAI PHO, AND DIRK IRMA Abstact By usng toc modfcatons and a esult of Gonzalez-pnbeg and Lejeune- Jalabet, we answe the followng questons completely
(Semi)Parametric Models vs Nonparametric Models
buay, 2003 Pobablty Models (Sem)Paametc Models vs Nonpaametc Models I defne paametc, sempaametc, and nonpaametc models n the two sample settng My defnton of sempaametc models s a lttle stonge than some
On the Efficiency of Equilibria in Generalized Second Price Auctions
On the Effcency of Equlba n Genealzed Second Pce Auctons Ioanns Caaganns Panagots Kanellopoulos Chstos Kaklamans Maa Kyopoulou Depatment of Compute Engneeng and Infomatcs Unvesty of Patas and RACTI, Geece
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
A Mathematical Model for Selecting Third-Party Reverse Logistics Providers
A Mathematcal Model fo Selectng Thd-Pat Revese Logstcs Povdes Reza Fazpoo Saen Depatment of Industal Management, Facult of Management and Accountng, Islamc Azad Unvest - Kaaj Banch, Kaaj, Ian, P. O. Box:
REAL INTERPOLATION OF SOBOLEV SPACES
REAL INTERPOLATION OF SOBOLEV SPACES NADINE BADR Abstact We pove that W p s a eal ntepolaton space between W p and W p 2 fo p > and p < p < p 2 on some classes of manfolds and geneal metc spaces, whee
A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION
C A N A L D E E X P E R I E N C I A S H I D R O D I N Á M I C A S, E L P A R D O Publcacón núm. 194 A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION POR D. MUÑOZ V. GONZÁLEZ M. BLAIN J.
Orbit dynamics and kinematics with full quaternions
bt dynamcs and knematcs wth full quatenons Davde Andes and Enco S. Canuto, Membe, IEEE Abstact Full quatenons consttute a compact notaton fo descbng the genec moton of a body n the space. ne of the most
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approaches
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, -xxx (2003) Chagng the Intenet Wthout Bandwdth Resevaton: An Ovevew and Bblogaphy of Mathematcal Appoaches IRISA-INRIA Campus Unvestae de Beauleu 35042
PREVENTIVE AND CORRECTIVE SECURITY MARKET MODEL
REVENTIVE AND CORRECTIVE SECURITY MARKET MODEL Al Ahmad-hat Rachd Cheaou and Omd Alzadeh Mousav Ecole olytechnque Fédéale de Lausanne Lausanne Swzeland [email protected] [email protected] [email protected]
A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM
A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM Pavalka Mudabona 1, Bhaluda Raveendanadh Sngh 2, Akuthota Mahesh 3 1 Pusung M.Tech (CSE), 2 Pncpal, 3 Assstant Pofesso(CSE), Vsvesvaaya
Electric Potential. otherwise to move the object from initial point i to final point f
PHY2061 Enched Physcs 2 Lectue Notes Electc Potental Electc Potental Dsclame: These lectue notes ae not meant to eplace the couse textbook. The content may be ncomplete. Some topcs may be unclea. These
AN EQUILIBRIUM ANALYSIS OF THE INSURANCE MARKET WITH VERTICAL DIFFERENTIATION
QUIIRIUM YI OF T IUR MRKT WIT VRTI IFFRTITIO Mahto Okua Faculty of conomcs, agasak Unvesty, 4-- Katafuch, agasak, 8508506, Japan [email protected] TRT ach nsuance poduct pe se s dentcal but the nsuance
The Detection of Obstacles Using Features by the Horizon View Camera
The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit [email protected]
Drag force acting on a bubble in a cloud of compressible spherical bubbles at large Reynolds numbers
Euopean Jounal of Mechancs B/Fluds 24 2005 468 477 Dag foce actng on a bubble n a cloud of compessble sphecal bubbles at lage Reynolds numbes S.L. Gavlyuk a,b,,v.m.teshukov c a Laboatoe de Modélsaton en
Statistical modelling of gambling probabilities
Ttle Statstcal modellng of gamblng pobabltes Autho(s) Lo, Su-yan, Vcto.; 老 瑞 欣 Ctaton Issued Date 992 URL http://hdl.handle.net/0722/3525 Rghts The autho etans all popetay ghts, (such as patent ghts) and
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
econstor zbw www.econstor.eu
econsto www.econsto.eu De Open-Access-Publkatonsseve de ZBW Lebnz-Infomatonszentum Wtschaft The Open Access Publcaton Seve of the ZBW Lebnz Infomaton Cente fo Economcs Babazadeh, Reza; Razm, Jafa; Ghods,
An Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Secuty of Full-State Keyed Sponge and uplex: Applcatons to Authentcated Encypton Bat Mennnk 1 Reza Reyhantaba 2 aman Vzá 2 1 ept. Electcal Engneeng, ESAT/COSIC, KU Leuven, and Mnds, Belgum [email protected]
HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
UNIVERSIDAD DE LA REPÚBLICA Facultad de Ingeniería RESOURCE ALLOCATION IN NETWORKS FROM A CONNECTION-LEVEL PERSPECTIVE
UNIVERSIDAD DE LA REPÚBLICA Facultad de Ingeneía Tess paa opta al Título de Docto en Ingeneía Eléctca RESOURCE ALLOCATION IN NETWORKS FROM A CONNECTION-LEVEL PERSPECTIVE (ASIGNACIÓN DE RECURSOS EN REDES
Research on Cloud Computing Load Balancing Based on Virtual Machine Migration
Send Odes fo Repnts to [email protected] 334 The Open Cybenetcs & Systecs Jounal, 205, 9, 334-340 Open Access Reseach on Cloud Coputng Load Balancng Based on Vtual Machne Mgaton Lu Kun,*, Xu Gaochao
Discussion Papers. Thure Traber Claudia Kemfert
Dscusson Papes Thue Tabe Clauda Kemfet Impacts of the Geman Suppot fo Renewable Enegy on Electcty Pces, Emssons and Pofts: An Analyss Based on a Euopean Electcty Maket Model Beln, July 2007 Opnons expessed
Order-Degree Curves for Hypergeometric Creative Telescoping
Ode-Degee Cuves fo Hyegeometc Ceatve Telescong ABSTRACT Shaosh Chen Deatment of Mathematcs NCSU Ralegh, NC 7695, USA schen@ncsuedu Ceatve telescong aled to a bvaate oe hyegeometc tem oduces lnea ecuence
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
REAL TIME MONITORING OF DISTRIBUTION NETWORKS USING INTERNET BASED PMU. Akanksha Eknath Pachpinde
REAL TME MONTORNG OF DSTRBUTON NETWORKS USNG NTERNET BASED PMU by Akanksha Eknath Pachpnde A Thess submtted to the Faculty of the Gaduate School of the Unvesty at Buffalo, State Unvesty of New Yok n patal
High Availability Replication Strategy for Deduplication Storage System
Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, [email protected] [email protected] Abstact As the amount of digital data
The Can-Order Policy for One-Warehouse N-Retailer Inventory System: A Heuristic Approach
Atcle Te Can-Ode Polcy fo One-Waeouse N-Retale Inventoy ystem: A Heustc Appoac Vaapon Pukcanon, Paveena Caovaltongse, and Naagan Pumcus Depatment of Industal Engneeng, Faculty of Engneeng, Culalongkon
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
Effect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Determinants of Borrowing Limits on Credit Cards Shubhasis Dey and Gene Mumy
Bank of Canada Banque du Canada Wokng Pape 2005-7 / Document de taval 2005-7 Detemnants of Boowng mts on Cedt Cads by Shubhass Dey and Gene Mumy ISSN 1192-5434 Pnted n Canada on ecycled pape Bank of Canada
Research on Risk Assessment of the Transformer Based on Life Cycle Cost
ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
International Business Cycles and Exchange Rates
Revew of Intenatonal Economcs, 7(4), 682 698, 999 Intenatonal Busness Cycles and Exchange Rates Chstan Zmmemann* Abstact Models of ntenatonal eal busness cycles ae not able to account fo the hgh volatlty
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
Prejudice and the Economics of Discrimination
Pelmnay Pejudce and the Economcs of Dscmnaton Kewn Kof Chales Unvesty of Chcago and NB Jonathan Guyan Unvesty of Chcago GSB and NB Novembe 17, 2006 Abstact Ths pape e-examnes the ole of employe pejudce
Bending Stresses for Simple Shapes
-6 Bendng Stesses fo Smple Sapes In bendng, te maxmum stess and amount of deflecton can be calculated n eac of te followng stuatons. Addtonal examples ae avalable n an engneeng andbook. Secton Modulus
Adaptive Queue Management with Restraint on Non-Responsive Flows
Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,
Statistical Discrimination or Prejudice? A Large Sample Field Experiment. Michael Ewens, Bryan Tomlin, and Liang Choon Wang.
Statstcal Dscmnaton o Pejudce? A Lage Sample Feld Expement Mchael Ewens, yan Tomln, and Lang Choon ang Abstact A model of acal dscmnaton povdes testable mplcatons fo two featues of statstcal dscmnatos:
Simultaneous Detection and Estimation, False Alarm Prediction for a Continuous Family of Signals in Gaussian Noise
Sultaneous Detecton and Estaton, False Ala Pedcton fo a Contnuous Faly of Sgnals n Gaussan Nose D Mchael Mlde, Robet G Lndgen, and Mos M Bean Abstact New pobles ase when the standad theoy of jont detecton
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
Ilona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
v a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with
Software Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
Green's function integral equation methods for plasmonic nanostructures
Geens functon ntegal equaton methods fo plasmonc nanostuctues (Ph Couse: Optcal at the Nanoscale) Thomas Søndegaad epatment of Phscs and Nanotechnolog, Aalbog Unvest, Senve 4A, K-9 Aalbog Øst, enma. Intoducton
YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH
nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav
Over-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità
Imperial College London
F. Fang 1, C.C. Pan 1, I.M. Navon 2, M.D. Pggott 1, G.J. Gorman 1, P.A. Allson 1 and A.J.H. Goddard 1 1 Appled Modellng and Computaton Group Department of Earth Scence and Engneerng Imperal College London,
8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
The transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
Impact on inventory costs with consolidation of distribution centers
IIE Tansactons (2) 33, 99± Imact on nventoy costs wth consoldaton of dstbuton centes CHUNG PIAW TEO, JIHONG OU and MARK GOH Deatment of Decson Scences, Faculty of Busness Admnstaton, Natonal Unvesty of
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
Strength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
I = Prt. = P(1+i) n. A = Pe rt
11 Chapte 6 Matheatcs of Fnance We wll look at the atheatcs of fnance. 6.1 Sple and Copound Inteest We wll look at two ways nteest calculated on oney. If pncpal pesent value) aount P nvested at nteest
Molecular Dynamics. r F. r dt. What is molecular dynamics?
What s molecula dynamcs? Molecula Dynamcs Molecula dynamcs (MD) s a compute smulaton technque that allows one to pedct the tme evoluton of a system of nteactng patcles (atoms, molecules, ganules, etc.).
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
Cloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
4. SHAFT SENSORLESS FORCED DYNAMICS CONTROL OF RELUCTANCE SYNCHRONOUS MOTOR DRIVES
4. SHAFT SENSORLESS FORCED DYNAMICS CONTROL OF RELUCTANCE SYNCHRONOUS MOTOR DRIVES 4.. VECTOR CONTROLLED RELUCTANCE SYNCHRONOUS MOTOR DRIVES WITH PRESCRIBED CLOSED-LOOP SPEED DYNAMICS Abstact: A new spee
