Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185
|
|
- Russell Neal
- 5 years ago
- Views:
Transcription
1 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre an ndvdual to exhbt a pece of prvate,.e., secret, nformaton such as a computer access password, a telephone credt card number, a personal dentfcaton number (PIN), etc., to prove hs dentty. The logcal problem s that ths nformaton, once exhbted, s potentally compromsed and. could be used by anyone to undetectably mpersonate the legtmate owner. What s needed s a protocol that wll allow an ndvdual to "prove" that he knows the secret pece of nformaton, whose possesson s equated wth hs dentty, wthout revealng anythng about the nformaton tself whch could ad a would-be cheater to mpersonate hm. Several nvestgators have proposed dentfcaton schemes to accomplsh ths [1,2,3,4] that depend on nteractve-proof schemes, often referred to as zero-knowledge proofs or png-pong protocols, n whch the ndvdual responds to a seres of queres n a way that the legtmate user could, but whch an mpostor (probably) could not. We descrbe a smpler dentty verfcaton scheme whch uses a publc authentcaton channel to valdate a prvate authentcaton channel belongng to the ndvdual who wshes to prove hs dentty. The publc and the prvate channels can be completely ndependent and can even be based on dfferent authentcaton algorthms, or they can both be of the same type. Ths scheme also provdes certfed recepts for transactons whose legtmacy can later be verfed by mpartal arbters who were not nvolved n the transacton tself. The dentty verfcaton scheme descrbed here presupposes the exstence of a trusted ssuer of valdated (sgned) dentfcaton credentals. Ths could be a government agency, a credt card center or fnancal nsttuton, a mltary command center, a centralzed computer faclty, etc. The ssuer frst establshes a publc authentcaton channel to whch he retans the (secret) authentcatng functon. For smplcty, we wll use the well known authentcaton channel based on the RSA cryptoalgorthm for both the publc (ssuer) and the prvate (user) channels, although, as mentoned earler, authentcaton channels based on any other algorthm would work equally well. The ssuer chooses a par of prmes p and q by the same standards used to compute a good RSA modulus,.e., so that t s computatonally nfeasble for anyone to factor n, and then calculates a par of encrypton/decrypton exponents, e and d such that; ' * Ths work performed at Sanda Natonal Laboratores supported by the U. S. Department of Energy under contract no. DE-AC04-76DP C. Pomerance (Ed.): Advances n Cryptology - CRYPT0 '87, LNCS 293, pp , Spnnger-Verlag Berln Hedelberg 1988
2 21 2 ed = 1 (mod p(n)). n and d are made publc. The ssuer keeps e (and equvalently the factors p and 9) secret; n fact, the securty of the system aganst fraudulent clams of valdated dentty s no better than the qualty of protecton gven to e by the ssuer. The ssuer also chooses a polyrandom functon f that maps arbtrary strngs of symbols to the range [O,n). By polyrandom we mean that f cannot be dstngushed from a truly random functon by any polynomally bounded computaton. Many strong, snglekey, cryptographc functons, such as the DES, appear to adequately approxmate ths condton. f s also made publc by the ssuer. User 's dentty s assocated wth an dentfer, I, consstng of such nformaton as hs socal securty number, hs bank account or credt card number, hs mltary ID, etc., and whch could also nch& physcal descrptors such as dgtzed fngerprnts, voce prnts, retnal eye prnts, etc., or any other useful descrptve nformaton, as well as any lmtatons on the authorzaton conveyed n the sgned dentfer, such as credt lmts, expraton date, levels of access, etc. Most mportantly, I. must nclude the publc part of the user's personal authentcaton channel consstng of an RSA modulus n, n > n, and an assocated decrypton exponent d, plus, redundant nformaton, such as message format, fxed felds of symbols common to all dentfers, I, etc. The ssuer calculates and encrypts m usng hs secret key, e. to form the sgnature, s, for the dentfer, I, S, - my (mod n) The ssuer gves the credental (I,s ) to user. No part of the credental need be kept secret. However, the user must keep secret hs prvate encrypton exponent, e, correspondng to d. protectng e, snce hs proof of dentty n the scheme s equated to knowng e. The publc nformaton s the ssuer's modulus n and decrypton exponent d, the polyrandom functon f and a knowledge of the redundant nformaton present n all of, - m for randomly chosen sgnatures s n the I, whch must be suffcent to prevent a forward search cryptanalytc attack [5] on the polyrandom functon f. In other words, someone wshng to fraudulently valdate an dentty could calculate s d the hopes of obtanng a ht wth f(1) for some usable I -- ths s the forward search attack. Hs securty aganst mpersonaton s dependent on hs By makng I contan suffcent redundant nformaton, the probabl- ty of success of ths sort of attack can be made as small as desred. When user wshes to prove hs dentty to a party A, say to gan access to a restrcted faclty or to log on to a computer or to wthdraw money from an ATM,
3 21 3 etc., he ntates the exchange by dentfyng hmself to A usng hs dentfcaton credental: u. s a strng of symbols that descrbes or dentfes the transacton s requestng; u could be the date, the amount of the wthdrawal, etc. A, who need not be a subscrber hmself,.e., he may not have an dentfcaton Credental ssued by the trusted ssuer, reples wth a strng of symbols, ua, that descrbe the transacton from hs standpont; termnal ID, transacton number, Confrmaton of wthdrawal mount, etc.. ua A Both user and A form the concatenaton of u and ua, u - u, ua, and calculate the polyrandom functon f(u) of the resultng strng; 2 - f(u). In addton, A calculates f(i) - m and s d whch wll n all probabflty equal m modulo n f aqd only f the ssung authorty sgned I wth s. Hence A accepts the credental (I,s) as vald f and only f d f(i) - s (mod n). At ths pont n the protocol, A s confdent that the user dentfed n I can authentcate messages usng the prvate authentcaton channel descrbed n I, n other words, that user knows e. In partcular, user can calculate - ze (mod d) t usng hs prvate exponent e, whch he communcates to A: tl A Note that z s beng used effectvely as a one-tme key, ndetermnate to both and A because of the polyrandom nature of f, to permt to gve A an encrypted functon of z n a form that wll permt A to satsfy hmself that had to know e wthout provdng any nformaton whatsoever about el. A knows the dentty clamed by from I, whch he accepts as vald f and only f the followng dentty s satsfed:
4 21 4 d t. * z (mod n) If the person seekng to be recognzed as user really s who he clams to be,.e., f he knows e, then (1) wll be satsfed. However, f he s not user, SO that he doesn't know e, then n order for hm to be able to mpersonate,.e.. to cause (1) to be satsfed, he must be able to fnd a number x such that d x = z (mod n) n or d are values sgned by the ssuer n I wth only the authorzed user knowng e or equvalently the factorzaton of n z s a pseudorandom number ontly ' determned by user and by A. Solvng (2) wthout knowng e s equvalent to breakng the RSA cryptoal orthm from cphertext alone. A keeps the 4-tuple (I,s.):u,t as hs certfed recept for the transac- 9 1 l ton. Anyone, usng only publcly avalable nformaton..e., n, d and f, can verfy that the &-tuple satsfes (1) whch valdates the transacton descrpton and verfes that t was sgned,.e., endorsed, by user. If both communcants requre a certfed recept the one-way protocol descrbed above can be easly mod- fed to be a two-way protocol between two partes, and, both of whom must possess dentfcaton credentals valdated by the ssuer. All actons are sp- metrc n ths case. The exchange s of the form (I,s.):u 1 + (I,s):u t where user would keep the 4-tuple [(I,s):u,t ] as hs certfed recept, etc. References 1. A. Fat and A. Shamr, "How to prove yourself: practcal solutons to dentfcaton and sgnature problems," Proceedngs of Crypto-86, Santa Barbara, August 1986, pp A. Shamr, "Identty-based cryptosystems and sgnature schemes," Proceedngs of Crypto'84, Santa Barbara, August 1984, pp Goldrech, S. Hcal and A. Wgderson, "Proofs that yeld nothng but the valdty of the asserton and the methodology of cryptographc protocol desgn," Submtted to 27th Symposum on Foundatons of Computer Scence, November 1986.
5 E. Okamoto, 'Proposal for dentty-based key dstrbuton systems," nectroncs Letters, Vol. 22, No. 24 (Nov. 20, 1986), pp G. J. Smmons and D. B. Holdrdge, "Forward search as a cryptanalytc tool aganst a publc key prvacy channel," Proceedngs of the IEEE Computer Socety 1982 Symposum on Securty and Prvacy, Oakland, CA, Aprl 26-28, 1982, pp
DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School
DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements
More informationChinese Remainder. Discrete Mathematics Andrei Bulatov
Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators
More informationEMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.
student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationSecure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,
More informationAn Efficient and Flexible Decentralized Multicast Key Distribution Scheme
IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department
More informationFall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes
5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs
More informationRational Secret Sharing without Broadcast
Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept
More informationCryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationAccelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module
Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationImproving the Authentication Scheme and Access Control Protocol for VANETs
Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu
More informationGuidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014
Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,
More informationNETWORK 2001 Transportation Planning Under Multiple Objectives
NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)
More informationproblems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance
palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationEPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication
94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationAn Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng
More informationApplication Form. Welsh Government Learning Grant Further Education 2017/18. student finance wales cyllid myfyrwyr cymru
student fnance wales cylld myfyrwyr cymru Welsh Government Learnng Grant Further Educaton 2017/18 Applcaton Form www.studentfnancewales.co.uk/wglgfe sound advce on STUDENT FINANCE /A How to complete ths
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationPRO- CRIMPER* III Hand
PRO- CRIMPER* III Hand Instructon Sheet Crmpng Tool Assembly 58529-1 408-9999 wth De Assembly 58529-2 11 AUG 14 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationXiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationTile Values of Information in Some Nonzero Sum Games
lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper
More informationPRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2)
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58495-1 408-9819 Wth De Assembly 58495-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationonlinecomponents.com
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58535-1 wth 408-4021 De Assembly 58535-2 29 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationPRO- CRIMPER* III Hand Crimping
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58641-1 wth 408-4379 De Assembly 58641-2 18 JUN 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPRO-CRIMPER* III Hand Tool Assembly with Die Assembly
PRO-CRIMPER* III Hand Tool Assembly 2063778-1 wth De Assembly 2063778-2 Instructon Sheet 408-10290 02 FEB 12 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPRO- CRIMPER* III Hand
PRO- CRIMPER* III Hand Instructon Sheet Crmpng Tool Assembly 90759-1 408-9962 wth De Assembly 90759-2 03 MAY 11 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPRO-CRIMPER* III Hand Crimping Tool Assembly with Die AssemblY
PRO-CRIMPER* III Hand Crmpng Tool Assembly 90758-1 wth De AssemblY 90758-2 Instructon Sheet 408-9938 01 NOV 11 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPRO- CRIMPER III Hand Crimping Tool Assembly INSTALLATION AND REMOVAL OF DIE SET AND LOCATOR ASSEMBLY (Figure 2)
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 90547-1 wth 408-9884 De Assembly 90547-2 02 NOV 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationPassive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)
Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called
More informationApplication Form Academic year 2015/16
EDUCATION MAINTENANCE ALLOWANCE (EMA) Applcaton Form Academc year 2015/16 www.ndrect.gov.uk Apply Now! How to complete ths applcaton form Follow the nstructons, we ll tell you what questons you need to
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationNFC Communications-based Mutual Authentication Scheme for the Internet of Things
Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma
More informationPRO-CRIMPER* III Hand Crimping Tool Assembly with Die Assembly
PRO-CRIMPER* III Hand Crmpng Tool Assembly 90548-1 wth De Assembly 90548-2 Instructon Sheet 408-9885 02 NOV 12 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationInternational Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.
Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,
More informationEPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing
EPDA: Enhancng Prvacy-Preservng Data Authentcaton for Moble Crowd Sensng arxv:8.375v [cs.cr] 9 Nov 8 Jngwe Lu, Fanghu Ca, Longfe Wu, Rong Sun, Lehuang Zhu and Xaojang Du State Key Lab of ISN, Xdan Unversty,
More informationETSI TS V8.4.0 ( )
TS 100 959 V8.4.0 (2001-11) Techncal Specfcaton Dgtal cellular telecommuncatons system (Phase 2+); Modulaton (3GPP TS 05.04 verson 8.4.0 Release 1999) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS R 1 TS 100
More informationThe Byzantine Generals Problem
The Byzantne Generals Problem A paper by: Lesle Lamport, Robert Shostak, and Marshall Pease. Summary by: Roman Kaplan. Every computer system must cope wth computer malfunctons, whereas a malfuncton does
More informationPRO- CRIMPER* III Hand
PRO- CRIMPER* III Hand Instructon Sheet Crmpng Tool Assembly 90684-1 408-9934 wth De Assembly 90684-2 09 OCT 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationRC Filters TEP Related Topics Principle Equipment
RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1
Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,
More information4.3- Modeling the Diode Forward Characteristic
2/8/2012 3_3 Modelng the ode Forward Characterstcs 1/3 4.3- Modelng the ode Forward Characterstc Readng Assgnment: pp. 179-188 How do we analyze crcuts wth juncton dodes? 2 ways: Exact Solutons ffcult!
More informationChapter 2 Basics of Efficient Secure Function Evaluation
Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.
More informationUNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT
UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word
More informationArticle Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge
Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,
More informationNetwork Reconfiguration in Distribution Systems Using a Modified TS Algorithm
Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty
More informationTest 2. ECON3161, Game Theory. Tuesday, November 6 th
Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationA Simple Satellite Exclusion Algorithm for Advanced RAIM
A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton
More informationPRO- CRIMPER* III Hand Crimping
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool 58448-2 408-9357 Wth De 58448-3 10 Mar 11 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually powered hand
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationPRO- CRIMPER* III Hand Crimping
PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 91338-1 408-8377 wth De Assembly 91338-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationPrivacy-Preserving Data Mining Shared analysis without shared data. 16 February 2011 Chris Clifton
Prvacy-Preservng Data Mnng Shared analyss wthout shared data 16 February 2011 Chrs Clfton Idea: Collaborate to learn (only) desred results Data owners and FDA partcpate n protocol Results same as f all
More informationIntroduction. (Received 08 January 2009; accepted 10 March 2009)
44. Creatng of the mathematcal model of a reslent support sprng type element and ts transfer functon from the nput and output mpulse responses V. Slvnskas, K. Slvnskas, A. Trumpa Vlnus Gedmnas Techncal
More informationOptimal Decentralized Kalman Filter
17th Medterranean Conference on Control & Automaton Makedona Palace, Thessalonk, Greece June 24-26, 2009 Optmal Decentralzed Kalman Flter S Oruç, J Sjs, PPJ van den Bosch Abstract The Kalman flter s a
More informationEE 508 Lecture 6. Degrees of Freedom The Approximation Problem
EE 508 Lecture 6 Degrees of Freedom The Approxmaton Problem Revew from Last Tme Desgn Strategy Theorem: A crcut wth transfer functon T(s) can be obtaned from a crcut wth normalzed transfer functon T n
More informationGraphical User-ID with Partial Match Scheme and Application for Mobile Web-Services
Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,
More informationReview: Our Approach 2. CSC310 Information Theory
CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,
More informationJoint Adaptive Modulation and Power Allocation in Cognitive Radio Networks
I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,
More informationYutaka Matsuo and Akihiko Yokoyama. Department of Electrical Engineering, University oftokyo , Hongo, Bunkyo-ku, Tokyo, Japan
Optmzaton of Installaton of FACTS Devce n Power System Plannng by both Tabu Search and Nonlnear Programmng Methods Yutaka Matsuo and Akhko Yokoyama Department of Electrcal Engneerng, Unversty oftokyo 7-3-,
More informationTABLE OF CONTENTS. Volume 3 Number 7 July Hybrid Authentication Cybersystem Based on Discrete Logarithm, Factorization and Array Entanglements
Int. J. Communcatons, Network and System Scences, 2010, 3, 579-637 Publshed Onlne July 2010 n ScRes (http://www.scrp.org/journal/jcns/) TABLE OF CONTENTS Volume 3 Number 7 July 2010 Hybrd Authentcaton
More informationEvaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator
Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research
More informationAdaptive Modulation for Multiple Antenna Channels
Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,
More informationUltimate X Bonus Streak Analysis
Ultmate X Bonus Streak Analyss Gary J. Koehler John B. Hgdon Emnent Scholar, Emertus Department of Informaton Systems and Operatons Management, 35 BUS, The Warrngton College of Busness, Unversty of Florda,
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationarxiv: v2 [cs.dc] 31 Jul 2017
Usng Blockchan for Peer-to-Peer Proof-of-Locaton Gacomo Bramblla, Mchele Amorett, and Francesco Zanchell Dept. of Engneerng and Archtecture, Unversty of Parma, Italy Contact: mchele.amorett@unpr.t arxv:1607.00174v2
More informationNetwork-Hiding Communication and Applications to Multi-Party Protocols
Network-Hdng Communcaton and Applcatons to Mult-Party Protocols Martn Hrt 1, Uel Maurer 1, Danel Tschud 1, and Vassls Zkas 2 1 ETH Zurch {hrt, maurer, tschudd}@nf.ethz.ch 2 RPI vzkas@cs.rp.edu Abstract.
More informationMULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM
XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw
More informationThe Security Correction of Large Consumers Long-Term Direct Power Trading Based on DC Power Transfer Distribution Factor
Energy and Power Engneerng, 07, 9, 365-375 http://www.scrp.org/ournal/epe ISSN Onlne: 947-388 ISSN Prnt: 949-43X The Securty Correcton of Large Consumers Long-Term Drect Power Tradng Based on DC Power
More informationPRO-CRIMPER* III Hand. with Die Assembly OCT 11 Rev C. Pivot Pin. Die Assembly Moving Jaw CONTACT FAMILY SIZE (AWG)
PRO-CRIMPER* III Hand Instructon Sheet Crmpng Tool Assembly 58514-1 408-9973 wth De Assembly 58514-2 12 OCT 11 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually
More informationOptimizing a System of Threshold-based Sensors with Application to Biosurveillance
Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationLow Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages
Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng
More informationFuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images
Obad Ur-Rehman, Natasa Zvc Fuzzy Authentcaton Algorthm wth Applcatons to Error Localzaton and Correcton of Images OBAID UR-REHMAN and NATASA ZIVIC Char for Data Communcatons Systems Unversty of Segen Hoelderlnstrasse
More informationJointly optimal transmission and probing strategies for multichannel wireless systems
Jontly optmal transmsson and probng strateges for multchannel wreless systems (Invted Paper) Sudpto Guha, Kamesh Munagala, and Saswat Sarkar Dept. of Computer and Informaton Scences, UPenn, Phladelpha,
More informationUNCLASSIFIED AD NUMBER LIMITATION CHANGES
TO UNCLASSFED AD NUMBER AD865534 LMTATON CHANGES Approved for publc release; dstrbuton s unlmted. FROM Dstrbuton authorzed to U.S. Gov't. agences and ther contractors; Crtcal Technology; JAN 1970. Other
More informationN( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )
Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and
More informationDynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint
Dynamc Lghtpath Protecton n WDM Mesh etworks under Wavelength Contnuty Constrant Shengl Yuan* and Jason P. Jue *Department of Computer and Mathematcal Scences, Unversty of Houston Downtown One Man Street,
More informationDesign of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network
Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve
More informationMultiband Jamming Strategies with Minimum Rate Constraints
Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army
More informationReflections on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator Into a Skew Quad Rotator
JLAB-TN-4-23 4 August 24 Reflectons on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator nto a Skew Quad Rotator D. Douglas ntroducton A prevous note [] descrbes a smple skew quad system that
More informationDistributed Resource Allocation and Scheduling in OFDMA Wireless Networks
Southern Illnos Unversty Carbondale OpenSIUC Conference Proceedngs Department of Electrcal and Computer Engneerng 11-2006 Dstrbuted Resource Allocaton and Schedulng n OFDMA Wreless Networks Xangpng Qn
More informationDistributed Topology Control of Dynamic Networks
Dstrbuted Topology Control of Dynamc Networks Mchael M. Zavlanos, Alreza Tahbaz-Saleh, Al Jadbabae and George J. Pappas Abstract In ths paper, we present a dstrbuted control framework for controllng the
More information29. Network Functions for Circuits Containing Op Amps
9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationSTATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size
STATISTICS ImPORTANT TERmS, DEFINITIONS AND RESULTS l The mean x of n values x 1, x 2, x 3,... x n s gven by x1+ x2 + x3 +... + xn x = n l mean of grouped data (wthout class-ntervals) () Drect method :
More informationControl Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart
Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More information