AN INTEGRATED PLATFORM FOR SYSTEM TRADE USING THE CLOUD
Published In: INTERNATIONAL CONFERENCE ON FUTURE TRENDS IN COMPUTING AND COMMUNICATION FTCC
Author(s): HIROAKI TSUJIMOTO , TAKAHIRO KOITA
Abstract: Recently, algorithmic trading, which is an automatic trade by means of a computer and a trading rule, has become popular. To use the algorithmic trading effectively, its trading rule is quite important because the trading rule is an algorithm to determine the timing of using market parameters. Investors are eager to find a good trading rule, which can be a good indicator to trade stocks, from among enormous numbers of rules. However, the existing trading-rules evaluation systems for virtual dealing cannot be used for full search of trading rules. The causes of the problem are the compatibility of virtual dealing software and the computing resource available for trading-rules evaluation. In this research, we have designed and developed an integrated platform for trading rules search to cope with these two issues.
- Publication Date: 13-Jul-2013
- DOI: 10.15224/978-981-07-7021-1-25
- Views: 0
- Downloads: 0
A SECURE AND EFFICIENT MULTI-DEVICE AUTHENTICATION PROTOCOL BASED ON SECRET SHARING IN HETEROGENEOUS NETWORKS
Published In: INTERNATIONAL CONFERENCE ON FUTURE TRENDS IN COMPUTING AND COMMUNICATION FTCC
Author(s): HAEJUN JUNG , JOOSEOK SONG
Abstract: Current EAP-AKA provides mutual authentication and key agreement in heterogeneous networks. However, with mobile devices increasing explosively, this protocol seems to be inefficient as each device needs to communicate with its remote home network to authenticate. In this paper, we propose a secure and efficient authentication protocol for owner of multiple devices by implementing shared group temporary key and secretsharing method. The devices which belong to a user generate group temporary key with shared secret. A master device communicates with home network for authentication. The other devices can be authenticated by serving network locally instead of communicating with remote home network. We will prove that the proposed protocol provides secure authentication and it is more efficient than the conventional EAP-AKA in multi-device scenario.
- Publication Date: 13-Jul-2013
- DOI: 10.15224/978-981-07-7021-1-26
- Views: 0
- Downloads: 0