ࡱ>  U@ Rbjbj2bQ"> SAUAUAUAUAUAUA$VRXfyA {  yABQ SA SA:P&-~ mF,~/3$XQ0Q,bY,Y-"-TbYLY$0(yAyAd:d  :Useful Expressions 1998 ~  ٳm (DongGook Park) Writing Likewise, your security (or lack thereof ) can cause serious harm to others, even if intruders do no direct harm to your organization. Similarly, machines that are not part of centralized computing facilities and that may be managed by novice or part-time system administrators or may be unmanaged, can be used by intruders to inflict harm on others, even if those systems have no strategic value to your organization. t| |X, X, t, t; thereof (= of that) Assumptions which appear intuitively necessary at the outset, but are not found to be required anywhere in the formal proofs, should be carefully reexamined. L; D̲ <\ ɔ All principals act in their own best interest (including to guard jointly derived secrets). tuD t \ D \ Note that only cryptographically protected messages, i.e. steps  and , will contribute directly to the logical beliefs that result. <\ 0, \ 0 Require of l\. - Marathons require incredible stamina of the runners. - Analogous assumptions are required of B. L  첬 The solution to the problem proved to be easier than first anticipated. Contrary to [far from] our expectations, we could not raise the necessary funds. ɉ ij New and promising technologies are introduced at a dizzying pace.  , ~| \ X & It presupposes that the Supplicant can reliably determine & Giving special attention to the weaker students presupposes that the others are willing to work without much support. Teachers sometimes presuppose (= to presume; to take for granted in advance; to assume beforehand) a fairly high level of knowledge by the students. X His argument presupposes (= to require as a condition) that it does not matter who is in power.  ET¤ The problems were compounded by severe food shortages. Her terror was compounded by the feeling that she was being watched. His financial problems were compounded when he unexpectedly lost his job. To compound matters, Severe drought has further compounded the food shortages in the region. Further financial reverses compounded his despair. 4, Ĭ t I make a conjecture that my pattern is genuine, that is, that it will continue no matter how far the table is extended. Regardless of whether an EAP packet is encapsulated or not, it is the Accept or Reject indication that signals to the Authenticator whether the Controlled Port is authorized or unauthorized. keep/stay/teer clear (of): to try to avoid sb or sth unpleasant or difficult,  . SET is a pragmatic approach to pave the way for easy and rapid enabling of secure electronic transactions over the Internet. 8D , \ To aid visibility, the PointSize is increased from its default value. Suffice it to say that & However, the basic ideas are not all that complicated, and one can get good use out of the system knowing just a few fundamental facts. But, just as importantly, a formal semantics is seen to be a valuable reasoning tool in its own right. The interpretation that they have of BANs work is fairly typical. The results were the same to within statistical error, so directC[] is certainly running faster than direct and the speedup cannot be attributed to an ordering effect. For larger expressions, compilation can speed up execution by a factor as large as 20. Here, and throughout, the notation {X}K indicates the string X encrypted using the key K. It is rather curious to discover that the security of this protocol is critically dependent on plaintext information which can be considered as incidental to the protocol. It may well be that in a non-robust protocol an attacker is able to use messages drawn from different protocols to successfully deceive a participant. In this light, we view our contribution as follows. First, we raise the implicit philosophy behind the use of a random oracle to . Second, we systematically apply the paradigm to . When a KA protocol involves more than 2 users, we refer to it as a multi-party key-agreement (MPKA) protocol. It is important to have as firm a handle on these functions as possible since a key to good, efficient programming in Mathematica is to use the built-in functions whenever possible. To see this more clearly, we can step through the computation. The DDN scheme is many orders of magnitude more expensive than any practical scheme, since it involves multiple signatures and zero-knowledge proofs, and thus is likely to be ruled out. Decryption in the CS scheme is about five times as costly as in OAEP. In some applications, this kind of increase may be tolerable; in others not. Big O takes care of upper bounds, i.e., if the running time is O[f[n]] this means that, up to a constant factor, the program is no slower than f[n]. We can pretty-print the result, but that's not much of an improvement. As always, one has to understand what one is trying to do. Man in the middle appears to be Web server to user, and Web user to server. In a man-in-the-middle attack, an attacker intercepts all of the communications between two parties, making each think that it is communicating with the other. The TMN protocol [12] is described by the following series of messages: These are, on the whole, less severe but do represent patterns of behaviour under which A and B are deceived by the intruder about some aspect of connections between them. and it also provides certain defenses against denial-of-service attacks by adopting the cookies technique of [17]. Aside from privacy concerns that already exist in credit card transactions, the primary disadvantage of stored-account transactions is that online verification is necessary. Aside from its use as a separator between elements in a statement that might otherwise be confused, white space is ignored by the complier (except, of course, in a string of characters between quotes). No one aside from A and B knows or could deduce K. ~| |ଔ, xX, йଔ, x No other parties know or can deduce K. x ~ ~`   ],  Ȱ,  D̸,  ̸̹ Everyone wishes the war would come to an end (=finish) soon. The vacation came to a close. The vacation is over (= has ended). The examinations will soon be over. When will you be through with your work. On completion of the guest authentication proces the server provides VLAN information to the AP. No matter how we restore the brackets, the resulting formula is determined uniquely up to equivalence. Ż X, Ż XT|ij Simple as this example seems, there are complications. In particular the rule of reductio ad absurdum is not nearly as natural as the other ones. t t4 X̹, l t4 X̹ Suppose that, to start with, we make no assumptions whatsoever about security. From this point on, application of the pigeonhole principle may be more subtle. As it turns out, the timing is perfect. It really helped us understand the issues and what the latest Earthling debates are all about. Ƭ/t ~hD XՌ . When & , then we may find ourselves examining it further in the following ways. Although it is quite straightforward to create images using MMAs built-in functions, we frequently find ourselves having to create a graphic image for which no MMA function exists. Is there perhaps a way to determine whether one algorithm is better than another? T @ )@ DL? The first coin that we input sets the machine in motion. ٳ¨ Although we usually don t care about what happens inside the machine (unless some kind of breakdown occurs and we suffer a loss), we should realize that somehow the machine is keeping track of the coins we insert, until the correct total has been inserted. Only then, and not before, does the vending machine output the desired soft drink. XX JŔ; t; L |̹, Ŕ \ H\ However, there will be differences in the extent to which their honesty has to be trusted. ijX (t & , while a quick revocation of user rights becomes harder to achieve. ~X0 T $ At first glance, it seems natural to ask that the beliefs formed by the verifier and by the responder are in agreement. On second thoughts, this definition does not capture authentication very well. Now just how do partitions come into play with equivalence relations? Ť Ĭ ǔ On the basis of this theorem and the examples we have examined, we state the next result. In fact, for a uniform distribution of the numbers 0-9, any sequence of one thousand digits is equally as likely to occur as any other sequence of one thousand digits. A sequence of 1000 numbers that contains exactly 100 occurrences of the digit 0 followed by 100 occurrences of the digit 1, followed by 100 occurrences of the digits 2, , is no more likely than the sequence that contains one thousand 7s, for example. Sum[i^2, {i, 1, 3}]: This command adds up the squares of i as i takes on the values from 1 to 3.  DՔ,  DՔ1 In this particular example, we will have no need for the remaining two-dimensional graphics primitives, Rectangle, Polygon, Disk, or Raster (see Table 10.1 at the end of this section for a complete listing). Conditions ("/;") are handy because they obviate the need to write a separate test function, e.g., the function & Chain rule seems to eliminate the need for the power rule, so we might try to UnSet the latter. Thankfully, the user does not need to worry about these details. 䲉Ո; ` DՔ , DՔ ( does not need to = needs not ) Documents could cross international boundaries with ease, without the need for onerous password systems. The need for these facilities in respect of data communications is viewed, in the main, as an Administration-imposed requirement. DՔ1; \,  The need for this will become more apparent when we come to deal with functions. DՔ1, T T Ut \ ̹|,  ̹|,  \,  as & as & This performs as many iterations as are necessary to find the fixed point of Function[x, (x+r/x)/2] and returns the last result. ~X0 t DՔ\ ̹| ιt This feature allows overall performance to be as high as the hardware will allow, with as little memory and CPU requirements as possible. You can place as many primitives as you like within the scope of each directive. XՔ ̹| ιt For now we consider two more examples. There will be times when it is easier to compute with a power series than with a polynomial. The important point to note here is that &  ,  ½,  e The coefficients are really what are of interest. й\ ǔ @& It is of interest to note that & Several & has been proposed for this applications, the one of interest having been proposed in 1989 by & Within the past few months it has become obvious that there is a great deal of interest and financial stake involved in the deployment of protocols for There s a growing interest in using the IEEE 802.11 networking protocol as an enterprise-deployable technology. p Interesting enough, this notion of relying on lower layer services is prevalent in many other forms of communication. If all we care about is whether orders match up, we are done and we might call these two groups the same. There might be other issues to consider, however. ½, , e, X; |X, , t, ٳ| If all we cared about was the computation, then it would be unfortunate to give a value to x which might interfere with later computations. ½ Ĕ , ǔ , ɔ\  concern When we use a road map, we are often concerned with seeing how to get from one town to another by means of the roads indicated on the map. D Ɍ , tǩt Also, our major concern in dealing with any algorithm is how the algorithm performs for large values of n. ~XՔ p Ǵ ƬX Ȕ ¬ In a large organization, security operations are a significant task. One of the concerns is the possible compromise of the organization s resources due to the dispersal of security measures through the system, resulting in a fragmented approach. Do not concern yourself with the Mathematica details. ~ ½ й|, ½ , The specifics of these standards do not concern us here. You only need concern yourself with a couple of these at this time, but it would be useful to explore the range of option available to you. , ½, @ However, when it concerns any VASP, users may not have confidence that long term keys are sufficiently secure. However, when security is a concern, the NIU must be trusted. We should be quite concerned about the vulnerability of the center to such hazards as equipment breakdown or enemy attack. $X JD  , ½, q This is what we mean by saying that Eval commutes with List. Actually, another concern is raised here because Should we be concerned about denial-of-service attack? These days, many programmers seem to feel the same way. Instead of trying, most programmers simply dont bother. As far as marketing is concerned, Provide new features that address security weakness in GSM which are known to cause concern. A natural question to ask concerns the generators of this cyclic group. ~ \ t, (, Aside from privacy concerns that already exist in credit card transactions, the primary disadvantage of stored-account transactions is that online verification is necessary. Management issues concern the admission of entities into the domain administered by an authentication server, and their expulsion, as well as the auditing of security-relevant events. When we use a road map, we are often concerned with seeing how to get from one town to another by means of the roads indicated on the map. D Ɍ , tǩt If your thoughts, activities etc centre around something or are centred around it, it is the main thing that you are concerned with or interested in: Some privacy concerns arise from the client s point of view: the client has no simple mechanism to disable cookies. Concerning authentication servers, there is the question whether this trusted machine has to participate actively in an authentication or whether its contribution to the service is decoupled from the actual response to an authentication request. ~ t ~t| `, DȲt ~t|` x| 8 . t It is for this reason that & t\ t \/L8 The symbol Xi is simply a device for locating the coefficient , and for this reason, the formal power series is called an ordinary generating function for the sequence . Being able to positively identify business partners is of paramount importance in E-commerce. For this reason, establishing CAs is critical. For the reasons mentioned above, it would be desirable to realise an on-line access to a certificate server in the second demonstrator. 0 t \,  \ L<\ For reasons of trust as well as for reasons of reliability and availability, efforts are made to design services that decreases dependence on a single authentication server. ~X t \ For various reasons, we consider this to be the most useful definition of authentication: it insists that the two agents agree on all the essential features of the protocol run, while avoiding specifying features that are hard to achieve and less likely to be required. t \, ~XՔ \ո, ļ\ ~`  J, 1 One reason is to distinguish the use of asymmetric key pairs for signatures, encryption, and key agreement, & .. A second reason is to separate the notion of binding a public key to a principal from the notion of the goodness of that key. p, , t ; lļ/l The state object is called a cookie, for no compelling reason. ļ\ t t, 7\ t t & you don t need to know much about what s in these files. However, in case you re curious, let s do a quick run-through of what the more interesting ones are for. ִ0 You will see though, that the process really is very straightforward. This is to advise you of what AppWizard is about to do and provides you with an opportunity to abort the whole thing if it doesn t seem to be what you want. We won t worry about what all these signify(we ll get to them eventually. ½ The principal advantage of having a program broken up into functions is that & There is a further advantage in that & , t, Ȕ ,  x  This will be of manifold advantage. First, & t . The analysis technique offers several advantages over existing ones, even for monotonic protocols. DP , t This can save you a great deal of work. |p| 䴴. The comment using // only covers the portion of the line following the two successive slashes, whereas the /*....*/ form defines whatever is enclosed as a comment and can span several lines. Note that the second statement runs over two lines. The successive lines are combined into a single statement until the compiler finds the semicolon that defines the end of the statement. point I see little point in discussing this further. , , t , X What s the point of complaining now? There is no point in going There is not much point in doing that. While there is usually little point for clients to send requests that the server does not list acceptable, sending such requests is not an error, and the server should simply reject requests that it does not recognize. ļ X ̹, ļ t ̹& The point here is that calling this number simply 98.6 is fine for most applications. We will say more about this issue later.  4X & would be completely nonsensical. Their methods of assessment produce nonsensical results. A 1-bit subnet field would provide only one subnet , and so it also does not make sense. The whole idea's a complete nonsense. (= stupid, untrue) Computer programs look like complete nonsense to me. (= without meaning) In a certain sense, Formatter is the inverse to FullForm. Ť X & but we will defer discussion of this until later in this chapter when we discuss something called variable scope. \ We will discuss the order of execution more fully later in this chapter.  end up, XՌ  come to be in a particular situation or state, especially when you did not plan it; turn out to be; to become something eventually;  m ȹɹŔ (& t) . & then they will end up in possession of one or more shared secrets & You can use both type specifier within the same program for declaring different variables that will end up (as) having the same type. He ended up (as) head of the company. An unknown key-share (UKS) attack on an AK or AKC protocol is an attack whereby an entity A ends up believing she shares a key with B, and although this is in fact the case, B mistakenly believes the key is instead shared with an entity E ( A. ǻ L , $t\ We were going to go out, but ended up watching videos. You can, therefore, include as much white space as you like to make your program more readable. It s not that it s difficult ( quite the opposite in fact ( but & The basic arithmetic operators we have at our disposal are addition, subtraction, These operate generally as you would expect, with the exception of division which has a slight aberration when working with integer variables or constants, as well see. One thing needs to be clear at the outset. A couple of general points worth noting are about the layout of the program. Firstly, and, secondly, The last paragraph reads a bit like The Auctioneers Song. 䴰. ȴ X. The overall design of your program may well be at fault. ǻ |  . Entity B responds with a message containing F(x,), a suitable function of  and further data fields x. If A can attribute this message to B, then B has been authenticated. T8Y May A can deduce that B thought he was running the protocol with A as opposed to some third party, C? ~t D̲ In order to reason and argue about authentication protocols, we must first of all define what we mean by  authentication . ~t 4 ;x|, 4D ;XՔ | The use of CSP has two advantages: & Most of the possible meanings of authentication refer to the recent state of an agent B when another agent A completes a run of the protocol, apparently with B. It turns out that the recentness is the hardest part of the specification to formalize in CSP. It is sensible to begin by looking for attacks on these weaker specifications, since these tests are faster than in the cases including recentness. t qt because of limitations on space; due to space restrictions; due to spaced limitations Because of limitations on space, we omit all proofs from this paper; the interested reader is referred to [12]. Due to spaced limitations, we omit the detailed description of protocols and give a high level view of the system. For more details, we refer to [2]. As explained in the introduction, we begin by considering the cases without recentness, and then extend the definitions to include recentness. The following is what we consider to be the weakest reasonable definition of authentication. Many protocols fail to achieve even this weak form of authentication. In several cases, this is due to an intruder launching a mirror attack, simply reflecting an agents messages back at himself; examples appear in [2]. Closely related to the notion of aliveness is the case where, when A completes a run of the protocol, apparently with B, then B has previously been present, but not necessarily running the protocol in question(it may be that B has been running a completely different protocol. This raises the question of interaction between protocols, where an intruder can learn information in one protocol that he can use in an attack on another protocol. Several protocols achieve a guarantee of liveness, but fail to guarantee weak agreement. The normal scenario is that the intruder imitates an agent B to attack A, by using B as an oracle in a parallel run in which the intruder adopts his own identity; thus A believes he has been running the protocol with A ( B thinks he has been running the protocol with the intruder. Examples include my attack on the Needham-Schroeder Public Key protocol [16] in [10]. The following definition adds the condition that the two agents agree as to which roles each was taking, and that they agree upon some of the data items used in the exchange. We say that a protocol guarantees to an initiator A non-injective agreement with a responder B on a set of data items ds. This protocol gives B a guarantee of non-injective agreement on K. We will use the term full agreements to refer to agreement on all the atomic data items used in the protocol runs. ƴ X/ij/ We will use the term  injective agreement , or simply  agreement , when we want to insist that there is a one-one relationship between the two agent s runs. ƴ X/ij/ An agent A is tricked into thinking that B is trying to establish two sessions with him, whereas B was only trying to establish a single run. The agents do not check that & . The meanings of  recent will depend on the circumstances: sometimes we will take it to mean within the duration of As run; sometimes we will take it to mean at most t time units before A completed his run. For example, consider the following one-step protocol, where  is a key shared between A and B. The protocol can be strengthened to achieve recent non-injective agreement by adding a timestamp to the message. Also, in a setting where key compromise is possible, there is a well known attack on the Needham-Schroeder Secret Key Protocol [16], presented in [4]: once a key has been compromised, the intruder may replay messages from an earlier run so as to imitate the initiator; thus the protocol guarantees non-injective agreement, but not recent non-injective agreement. , i, tǤ If Y were revealed, there would be no justification to attribute message X to principal Q. We have offered a choice of possible translations, all based on interpreting identity as cryptographic key.  Ux,  U,  U, U,  H In what follows, we will first insure (= ensure) that we know where our files reside, then discuss how to create and alter their contents, and finally show an example of good programming practice ( checking to see whether a given file is one with which we wish to work. |8   ɉ $, Ux, U Both A and B are assured of key freshness, since the session key depends on both random exponents aU and aV. U Security administrators can rest assured that when a user account is revoked, resumed or deleted on one platform, that action will be carried out on all other platforms on which that user has an account. HX t  . If these keys are destroyed when the call is over, the participants can be assured that no one can later decrypt that conversation ( even if the keys to some subsequent conversation are compromised. My own view is that an authentication protocol is designed to assure an agent A as to the identity of the other agent B with whom A is running the protocol; therefore, in most cases A should at least be assured that B thought he was running the protocol with A. However, some researchers take the view that it is enough for B to be present, and that A need not receive any further assurance as to Bs current state. We should recognize that the different authentication specifications may all be valid goals: there are circumstances in which the weaker specifications are all that is needed; in other circumstances, a stronger specification may be required. However, the designer of any protocol should make it clear that which form of authentication is supposed to be achieved. Reference these manuals to be sure you are aware of the rich collection of C features and that you are using these features correctly. Ux, U If you are not sure how a feature of C works, write a sample program with that feature, compile and run the program, and see what happens. U By keeping variables local to a function or a block, you can be sure they have almost complete protection from external effect, & It is difficult to be sure that the web server you are visiting truly belongs to the specified company. U The only way to know for sure is to test the number as follows & U Sometimes, the cause of an error may not be quite so obvious, in which case some additional information can be very helpful. UX JD  . We can use this operator to make sure that unwanted bits are zero in a variable. UxX, Uˆ X Many parents unwittingly place their children in danger by not making sure they wear seat belts.  `(; UxX JD However, in general it will be very difficult to prove results about a system running several protocols: we need to be sure that no protocol acts as an oracle for any other. Ux, U Firstly, they must make certain that their pension needs are adequately catered for. You should call the office to make absolutely certain that everything is in order. Youll have to leave soon to make certain of getting there on time. We dont have enough information to be able to tell for certain whether the loop terminates. Interest rates seem certain to rise next month. Its not yet certain who the driver of the car was. I cant say for certain when well arrive. uses the scope resolution operator to make it clear to the compiler that we want to reference the global variable count1. The apparently obvious goal of an authentication protocol is the provision of some degree of assurance of the identity of another party. U/Ux/Ȁ;  I feel pretty confident that my conjecture is right. U, , U The difficulty of course is convincing another party that the certificate creator can be trusted and that the no harm will come from using the information in the certificate. H, U, Ux; , t, t We are convinced of his guilt. At the conclusion of the dialog, each side is convinced of the identity of the other. Style |= HREDRAW | VREDRAW. This statement will set to the two rightmost bits of the variable style to 1, leaving the others at whatever they were before the execution of this statement. Bits that fall off either end of the variable are lost. All of the variables that we have declared so far have been declared within a block, that is, within the extent of a pair of curly braces. Both these variables exist from this point to the closing brace at the end of the program. P  P You will get an error message something like, & L @, L Ǭ\/D\ They might raise the question in your mind,  Why not make all variables global and avoid all this messing about with local variables that disappear? We can demonstrate how this works with a revised version of the last example: & The global scope resolution operator also does its stuff within the inner block, as you can see from the output generated by the statement we have added there.  `D \,   ǔ ,  t, L  t & it is only executed as a result of the  if condition being  TRUE . ~X \ A default case isn't essential. In its absence, if the value of the test expression doesn t correspond to any of the cases, the switch is exited and the program continues with the next statement after the switch. ~t D /L From this example we are directed to the following. Since we have no technique for attacking such a relation, let us list some terms and see whether there is a recognizable pattern.  $ ,  Xt The solution rested upon our ability to recognize that & If we fail to see this, perhaps we can examine the given sequence and determine whether there is some other pattern that will help us. ~ $ , Xt, (, X. Preshared secret key authentication relies on informationthe preshared secret keythat is known only to the parties to the negotiation. Each method hinges on the peers knowledge and use of some form of specialized information. At this point we shall examine recurrence relation with a variable coefficient. t At this point, we will & We see here that the first permutation is 123 and that we obtain & ~D .  , LŌ , L  . Once again, if 1 and 2 are interchanged in the last permutation, we obtain the first permutation in our list. \Ո One way to represent any relation is by listing the ordered pairs that are its elements. ~XՔ \ )@ ~XՔ t This pictorial representation is a lot easier to work with than the 36 ordered pairs of the relation R. , T  observation From these observations we consider the following concepts. Before continuing, we make a few observations about & When we look back at the partial orders in parts (b), (c), and (d) of Example 7.38, the following observations come to light. L mD XՌ . This theorem provides some insight into the number of odd-degree vertices that can exist in a graph. ~ t Ť 0D , ~\0 Ƭ ~ \ 0D `  . 0, We turn now to the reason why Euler developed the idea of the degree of a vertex: to solve the problem dealing with the seven bridges of Konigsberg. t ~D We turn next to the details of this construction. t, L<\  & so the pattern I ve found amounts to this: each e is the sum of the two numbers in the row above it. Before we can address this, however, there is a prior question of what the distinction between knowledge and belief really amounts to for us. (= to add up to, be in total, be equal to or be the same as) We can keep going right down to the beginning, but that doesnt seem any easier than drawing K1000 and counting directly. A Morphoid is a structure that has the potential of being a homomorphism (and therefore potentially also an isomorphism). 1, Ǭ1 We also consider when a direct product might be cyclic, given that its factors are cyclic. , ~| ` L, ~| L, ~| Continuing this process, we can move all of the g s to the right and all of the h s to the left, while reducing the powers of the g s modulo 2 and the powers of h s modulo 3 as we make the substitutions. t\ D Xt, ĬXt So, with this single example, we see that a is not a homomorphism. ~X , ~D L  ,  . ~` ̹\,  X The kernel and image of a homomorphism are special subsets worthy of consideration. It is worth noting that the authentication required can be achieved through A couple of general points worth noting are about the layout of the program. Firstly, and, secondly, While it would be expensive, this attack may be well worth the effort if the attacker knows that sensitive information will be passing across the link. In programming, there are in addition logical control structures, loops, recursion and such like. 0 XՌ t, թ/} Good health enabled him to carry out the plan. He was enabled to attend. The software enables you to access the Internet in seconds. A new programme to enable older people to study at college. Insulin enables the body to use and store sugar A new train line to enable easier access to the stadium This definition is much broader, and allows for many functions that are not as computational as one is used to from programming. This turns out to be valuable in both mathematics and CS. Our definition of what a function is will be completely extensional, the only thing that matters is the connection between input and output. How the latter is calculated is irrelevant. In fact, as we will see, in most cases there is no method to compute the output given the input. | ɔ\ @, 8  |\ @  $ Even worse would be to write the relation f in the form f(x, y), since this would produce endless confusion with functions of two arguments. T 8Ȕ, T \ @; ~@X <ٳ This is bad enough, but even worse is the fact that some bugs can be a security problem. Worse still, users and security administrators must now deal with multiple security models based on different forms of user credentials. To make matters worse, the bombardment mentioned above is usually done with IP packets in which the Source Address is spoofed; i.e., the sender sets the IP Source Address field to either a nonexistent address or to some address that is legitimately owned by some other party. On the other hand, it is not uncommon for students to wonder all along whether they are really doing magic rather than mathematics. XD, tXՌ , Ŭe Its solution had been communicated to him by Niccolo Fontana (who, unfortunately, came to be known as Tartaglia - the stammerer - because of a speaking disorder). ~\ L$8 It turns out that this development eventually gave a great impetus toward the acceptance of imaginary numbers. ~XՌ ; ~| \ %\ Ĭ0/ٳ0| X In Cardano's time, negative numbers were still being treated with some suspicion, so all the more was the idea of taking square roots of them. Many other mathematicians also had this view. t A vector can be uniquely specified by giving its magnitude (i.e., its length) and direction (i.e., the angle it makes with the positive x-axis). X t踔 ij Thus, ( can take on an infinite number of values for a given complex number and is unique only up to multiples of 2(. D The real numbers are deficient in the sense that not all algebraic operations on them produce real numbers. Thus, for  to make sense, we must lift our sights to the domain of complex numbers. Polya's Pattern Inventory will determine how many different necklaces there are all together of each kind, allowing for equivalence under rotations. For simplicity, we only consider machines with a finite set of inputs and a finite set of states.  Needless to say, fixing things so that this doesn't happen would add considerable complexity to the language. ň, й` ij t, D DP, p (1) You must compare various products specifications for operating speed, price, and security features. ~ X mթ X \ DP These costs are likely to be very high, especially compared with the ordinary operational expenses that might be expected in commercial key recovery systems. A second advantage is the reduced computational cost as compared with systems that require modular arithmetic. This road is quite busy compared to/with ours. Children seem to learn more interesting things compared to/with when we were at school. It also allows us to compare our approach to that in [BAN89], in particular to discuss a new attack on one of the results derived for NS in [BAN89]. In appendix B we look at the language and logic of VO in comparison to SVO. Comparisons between AT and SVO syntax require a semantic context as well, and, in the interest of brevity, we will not give a presentation of the full Abadi-Tuttle semantics. D 0X0 t, ,  We therefore make comparative comments at appropriate points throughout Section 1 and 3. \, \ DP, Ǭ, , p (2) This is essentially the same as a list of conditional rewrite rules, except for the behavior on terms that fail to satisfy any of the conditions. ~̹ |ଔ <\ ٳ|, x, x Except for the funny things, Do is very much like the For loop operation in Pascal. ~̹ |ଔ 买 D/ Ǭ/a׬ While[test, expr] is just like the command "while test do expr" in the language of while-programs.  , -  For[start, test, step, expr] is almost exactly the same as a for loop in the language C, except that in C the clauses are separated by semicolons instead of commas. (Note that C uses commas for compound statements, so the roles of commas and semicolons in C are exactly the opposites of their roles in Mathematica.) ~̹ |ଔ, xX pX ٳ|/; ~@  Quite alarmingly, in many cases security discussions proceed in exactly the opposite direction. ij;  The use of While loops is the same as that of Do loops; e.g., & - ,    Switch[ ] makes explicit use of Mathematica pattern matching. It is not really like anything else in other languages. x ~X 4ij t,  J As one sees from this example,  Switch[ ] returns the entire Switch expression unevaluated if the expression fails to match any of the forms, so it is a good idea to include a final pair whose form is _, with some neutral value, e.g., Null. t \0 L  t,  t, <, $ In many respects directories are like contexts; directories can contain subdirectories just as contexts can contain subcontexts; directories hold files while contexts hold variables and functions; there is a default directory just like there is a default context; and there is a directory search path used in the same manner as a context search path. ι@ ; Ǭ, DP The next family of graphs is in a sense  opposite to the null graphs. Ť X,  In many respects directories are like contexts; directories can contain subdirectories just as contexts can contain subcontexts; directories hold files while contexts hold variables and functions; there is a default directory just like there is a default context; and there is a directory search path used in the same manner as a context search path. Ǭ, DP), ), |, DP, ȹ,\, DXՌ,  ),  ),  <\ The only difference is the way that Vs TTP recovers the session key K. The compliment of any simple closed curve C can be partitioned into two mutually exclusive domains I and E in such a way that I is bounded, E is unbounded, and C is the boundary for both I and E. Lǘ, L t An intruder-in-the-middle attack on the Diffie-Hellman Key Exchange protocol works in the same way. A nested function call is read in much the same way that it is created, starting with the innermost functions and working the outermost functions. We could then apply our own user-defined functions in the same way as we call a built-in function ( by entering the function name and specific argument definition. manner In a manner (very) similar to how integers are treated, Mathematica uses different internal algorithms to do arithmetic on real numbers depending upon whether you are using very high precision reals or not. allowing the user to cause the program to behave in a manner to their advantage. 0\L Ǭ\ )<\/ Ǭ\ <\/ Ǭ\ <\ & in order to meet the government s requirements in a secure manner. ~\ )<\ In many respects directories are like contexts; directories can contain subdirectories just as contexts can contain subcontexts; directories hold files while contexts hold variables and functions; there is a default directory just like there is a default context; and there is a directory search path used in the same manner as a context search path. fashion Other proofs, including the fact that addition is associative, can be done in a similar fashion. As the proxy receives traffic, it processes the traffic in a fashion similar to our example in Figure 5-10. The package AbstractAlgebra`FiniteFields.m generates finite fields in a fashion similar to the way QuotientRing does but with restrictions on the allowable inputs so that only fields are generated. Much like real cookies, browser cookies don t last forever. In a similar way D\ )<\, ȹ,\, Ǭ\ )<\, With similar reasoning, we can show that the defining relation gr = e generates a group graph with r vertices. Ǭ\ <\, D\ <\, ȹ,\ A similar argument shows that & The right-hand side function looks very much like a mathematical equation: a left-hand side and a right-hand side separated by a colon-equal sign. This looks much like standard mathematical notation. Although a precise comparison of informal ideas is difficult, we also find an affinity with Boyd and Maos proposal that the protocols should be robust in the sense that depends only on information contained in the message itself or already in the possession of the recipient. This argument is similar in spirit to the argument for programming in an object-oriented style. Using the same line of reasoning as before, we can readily show that G contains no more than four elements g, g2, g3, and e. My sister works in publishing and I'm hoping to do something along the same lines (= something similar). X, ٳ| , Ǭ The next family of graphs is in a sense  opposite to the null graphs. Ť X,  Note that in MMA the semicolons bind more tightly than the comma, in distinction to most ordinary natural languages. ~@Ɣ 첬, t, \ It has much in common with GNY rule 2, although the GNY definition of  B possesses K result in rule 2 not distinguishing between B knowing/having K and being capable of computing K, nor does it imply B has demonstrated knowledge of K. 买 Ǭ/DX, t ι; l/lļ/(t ļ Whilst these have much in common with any IT implementation there are some uniquely SSO releated aspects. ~X \ !t What they have in common is that they can leave information unavailable when a key decision must be made.  p, DP, \ In contrast, non-recoverable systems can usually be designed securely without any alternative paths. Increasing the security of a system always comes at some cost and in a real world situation this cost can only be justified when contrasted to the exposed risk. However, in contrast to these operations, Do[ ] has no output. ~@Ɣ 첬, p<\ The words  generating function are used because, in some sense,  generates its coefficients. The word  ordinary is used to denote the fact that powers of X are used; other kinds of generating functions could use, by contrast, other functions like  in place of . Authentication is & . Authorization is by contrast an application-dependent process because different applications may need to control access within their individual domains quite differently. Stored-value systems, in contrast, attempt to replace cash with its electronic equivalent, e-cash, by transferring a unit of money between two parties. She is quiet and studious, in marked contrast to her sister. 7\ p, \ D This year s results, in marked contrast to last rear s were very encouraging. as distinct from: = used when emphasizing that you are talking about a particular kind of thing and not something else = x, ļX childhood as distinct from adolescence Insofar as is possible, we have considered the impact of these policies without regard to individual schemes or particular government proposals. Rather, we have attempted to look broadly at the essential elements of key recovery needed to fulfill the expressed requirements of governments (as distinct from the features that encryption users might desire). Snail mail: postal mail, mail sent through the postal service, as distinct from the faster electronic mail (informal) Note that in MMA the semicolons bind more tightly than the comma, in distinction to most ordinary natural languages. ~@Ɣ 첬, t, \ l/lļ/(t ļ After a time, the table will be full and the target system must start discarding SYN packets or removing half-open connection, and it has no way of distinguishing between valid connections and connections from an attacker. It has much in common with GNY rule 2, although the GNY definition of B possesses K result in rule 2 not distinguishing between B knowing/having K and being capable of computing K, nor does it imply B has demonstrated knowledge of K. One reason is to distinguish the use of asymmetric key pairs for signatures, encryption, and key agreement, .. A second reason is to separate the notion of binding a public key to a principal from the notion of the goodness of that key. Unlike a circuit-level gateway, an application gateway can differentiate the applications that need to be blocked from those that can be allowed to pass through the gateway. This principle may seem to have nothing in common with what we have been doing so far, but it will prove to be helpful nonetheless. L, tL ), ), |, DP,  ȹ,\, DXՌ, ǬXՌ The only difference is the way that V s TTP recovers the session key K. The compliment of any simple closed curve C can be partitioned into two mutually exclusive domains I and E in such a way that I is bounded, E is unbounded, and C is the boundary for both I and E. Lǘ, L t An intruder-in-the-middle attack on the Diffie-Hellman Key Exchange protocol works in the same way. A nested function call is read in much the same way that it is created, starting with the innermost functions and working the outermost functions. We could then apply our own user-defined functions in the same way as we call a built-in function ( by entering the function name and specific argument definition. In this manner, the site can identify the user for every request. t <\ t, t h<\h In a manner similar to how integers are treated, Mathematica uses different internal algorithms to do arithmetic on real numbers depending upon whether you are using very high precision reals or not. & in order to meet the government s requirements in a secure manner. ~\ )<\ In many respects directories are like contexts; directories can contain subdirectories just as contexts can contain subcontexts; directories hold files while contexts hold variables and functions; there is a default directory just like there is a default context; and there is a directory search path used in the same manner as a context search path. The right-hand side function looks very much like a mathematical equation: a left-hand side and a right-hand side deparated by a colon-equal sign. This looks much like standard mathematical notation. Although a precise comparison of informal ideas is difficult, we also find an affinity with Boyd and Maos proposal that the protocols should be robust in the sense that depends only on information contained in the message itself or already in the possession of the recipient. In a similar way D\ )<\, ȹ,\, Ǭ\ )<\, & A & , and analogously for B. ȹ,\ If a machine is designed as a snowblower, then tilling the garden with it isn't such a good idea. The same goes for IS technology.  ȹ, It was observed at the conclusion of question 2 that the kernel of a ring homomorphism is an ideal of the domain. This closely parallels the situation with groups. Ǭ, D, ȹ,; ~D X, LŌ  Just as RSA and Diffie-Hellman encryption may be penetrable in the future, so too may IDEA become penetrable. - ȹ,\ This argument is similar in spirit to the argument for programming in an object-oriented style. Other proofs, including the fact that addition is associative, can be done in a similar fashion. With similar reasoning, we can show that the defining relation gr = e generates a group graph with r vertices. Ǭ\ <\, D\ <\, ȹ,\ Using the same line of reasoning as before, we can readily show that G contains no more than four elements g, g2, g3, and e. My sister works in publishing and I'm hoping to do something along the same lines (= something similar). X, ٳ| , Ǭ As with Do and While loops, the output of a For loop is Null, so in the example we use a Print statement in order to see something. Ƙ, @ t This sounds very attractive at first, but as with the Sirens of mythology, there are serious side effects which completely outweigh any advantages you may gain. 䴰, x, X Ƙ, @ t If it still evaluates to True, then expr is evaluated again. Ȉ, Dij This result also points up the unfortunate fact that evaluating this For loop has had the unintended "side effect" of giving a value to i, which we probably didn't want.  , ~XՌ , , end up  ing, result in,  come down to (= to be able to be explained by a single important point) & if a problem, decision, or question comes down to a particular thing, that thing is the most important factor involved. Eventually our choice of hotel will come down to (= be decided by ) how much we can afford. It all comes down to money in the end. What it all comes down to is your incredible insecurity. What it comes down to is, either I get more money or I leave. After we had finished the calculation, the variable x ended up having the value 4. Intruder ends up knowing the key. Several works attempt to support low-value payments, by avoiding the use of public-key cryptographic operations. The assumption is that these operations, which are computationally intensive, result in significant cost and delay. ); , `  , )t This is highly desirable since there is no way to know in advance what other variables with values may be around when a particular function is used. If not for the existence of heads like Hold and HoldForm, there would be no way for an expression to return a partially evaluated result such as a component of a trace. There is no way of checking whether a certificate has been revoked. Here is one way of doing it. They differ according to whether they route packets according to host destination addresses or according to virtual circuit numbers. l,  , lļ, |, (t, (ļ In an actual network, one application may differ from another in requirements on the efficiency of a key agreement protocol. ((t)  , ,  , l,  l1, t踴 ,  break,  broken Time is broken into two periods: the present (the current epoch, beginning with the start of the current protocol run) and the past. Formulas generated specifically for the purpose of being fresh are called nonces. <\ \,  , l, l1; ļ ~| t, ~X ij\ This 6-byte, 12-digit hexadecimal number is broken up into two parts. The first half of the address is the manufacturer s identifier. & The second half of the MAC address is the serial number the manufacturer has assigned to the device. l, , ; ,  The principal advantage of having a program broken up into functions is that & There is a further advantage in that & A set of rules was required to break down the communication process into a simple set of building blocks. By breaking down this complicated process into small, manageable sections, building a house becomes easier. This breakdown also makes it easier to define who is responsible for which section. We asked for a breakdown of the accident figures into day time and night time. (breakdown = a division of something into smaller parts) An analogy to the OSI model would be the process of building a house. @ D While the final product may seem a complex piece of work, it is much simpler when it is broken down into manageable sections. In the protocols examined in the present paper, so-called  random numbers serve as nonces. ~\ x, ~X `D \, ~X lD \ & & That s what the PaddedForm[ ] is about. \ ~X `/t To embrace the idea of a signed message and an encrypted message, we use the following notation and semantics (notation for the first differs from BAN): & .. In proofs,  B sees {X}sA  should be taken to mean ( is taken to mean ) B has received a message containing a data item Y, and has verified the format of Y to be that of a signature on X using a key corresponding to the public signature key which B associates with A. ~| X\ ttt| \, tt| \, ~D ;\, X\; Ux For reference, and to put our work in perspective, we now list a subset of BAN inference rules previously proposed. 8\ To denote that A has sent a formula X in the present epoch (i.e., has recently said X), we use the AT construct  A says X . In order to reason more precisely about cryptographic keys (hereafter called keys), the concept  shares the good key , denoted by the symbol & requires refinement. 0 ~| t, m Without further information (e.g. whether K is also known by some unidentified or uncorroborated party B), such a key K which A has is called an  unqualified key (from A s point of reference). ~X 0 L In the light of ( or, in USA, in light of ) particular information, knowledge, etc means considering or using this information, knowledge, etc in order to make a decision or understand something. (ex) - This development is significant in the light of what happened later - This should be discussed more fully, particularly in the light of the developments in the University. - The semantics of confirm(K) are best understood in light of the following new Confirmation Axioms: We assume f results in a joint key K which can be deduced only with knowledge of the appropriate private information, and that knowledge does not compromise the secrecy of the other party s private information. ~| LD|̹ l`  To be technically precise, we should use ~ and ~ in place of ~ and ~ in the statement of Axiom 3, but we write simply the latter for appearance; the meaning should be clear by context. A similar comment applies to the argument of F( ) in Definition 4. At first it is hard to see how this procedure can be used to calculate anything, but our discussion of the lambda calculus should help explain how this works. LŔ; ijt , u There is one binary operation, that of applying a function to a value, written (f g) (using LISP-like notation), called application, and one construction written lx . expr, called abstraction, whose intended interpretation is "the function of x given by the expression expr"; i.e., it is the same thing as Function[{x}, expr] in Mathematica. X, t@; ~@ ٳ|,    ,  0 This very simple syntax is the starting point of a vast theory called the lambda calculus. It is intended to capture the two most fundamental properties of functions in a certain sense, namely, that of applying a function to an argument by substituting the argument for a bound variable in the body of the function and that of giving a name to the function determined by a rule. Here are some examples of terms in the lambda calculus. P $, ij, 0 , ; , 0 Here are two examples. Let us walk through an example to get a feel for how these special status codes and headers work. | 䴠; D 0 t, 0 t, LD0 t If we want to apply a function to several arguments, things get more complicated. |t T t It could get quite complicated. d ` ij This is not of very much practical value, however, because Sn has order n!, which is much larger than the order of G, in general.  x,  /8 x/ / )/ Unfortunately, this leaves the user open to attack, x, )X In the Internet threat environment, this opens the protocol to numerous failures associated with normal datagram delivery, such as reordered and duplicated datagrams. x Another flaw in its firewall product leaves it open to a DoS attack. x¨ However, SSO can, if badly implemented, introduce further security risks because if the master key is not properly managed and protected, many systems will be exposed to unauthorised access. Key management issues and how our security solution stands against possible threats are also described in this white paper. Corporate security mechanisms guard against unauthorised manipulation of computer hardware and network equipment, e.g. stealing, sabotage, cable rearrangement, etc. A "Cookie" Exchange guards against simple flooding attacks sent with bogus IP Sources or UDP Ports. An effective way to counter the above attacks is to use public-key certificates ( a data structure containing among other things a public key, the identifier of the owner (be it user, host, network or application), and a digital signature created by a trusted authority called Certification Authority (CA). This is a passive attack and is best countered by encryption. Lead to/into The goal of this lab is to develop the concept of an ideal through examples, leading to discovery of some of the properties of ideals. Following the sings led us into a small square with a fountain. Years of painstaking research have led to a new vaccine. Indifference to pollution now will lead us into serious problems in the future. Any digital bank note can be copied at infinitum. This is bound to lead to cheating. ~` t Ҽ , U, D, certain Whether this is what was intended or not is unimportant in the current discussion. The important points are, firstly, that an informal description can be expected to have ambiguities which may lead to weaknesses in certain interpretations; secondly, that the interpretation that allows the attack is what appears to have been used in the BAN logic analysis. Failure to understand the precise meaning of specific goals has lead to misunderstandings about the differences between various protocols. This motivates us to explicitly identify six distinct candidate positions which may or may not be intended as formal goals in a specific authenticated key establishment protocol. t t L8/ٳ0\ Ƭ ~ . ~XՌ  t So, we know how to find all solutions of 4x + 6y = 4. But, 4x + 6y = 9 didn't appear to have any solutions. (Note that it's already "reduced.") Why is that? \ ? Do these work as we suppose? \\ ٳ`L?  ),  ,  ,  |,  $x Since we are working on a finite machine, we can only show finite subsets of Z. Imagine, however, that H extends infinitely (in both directions) with the same pattern. Ž<\, ) Comparing the coefficients of x on both sides gives the relation & Ĭ| DPXt The left side of figure 1-4 shows the key protocols for Web communications. At the bottom is the IP. At the right side of the figure indicates, SSL adds security by acting as a separate security protocol, inserting itself between the HTTP application and TCP. | , DŘ , $x Assume the mobile station starts off associated with AP1 at the left side of the diagram because it was powered on in AP1's coverage area. As the mobile station moves towards the right, it must eventually associate with AP2 as it leaves AP1's coverage area. | , $x By acting as a new protocol, SSL requires very few changes in the protocols above and below. The HTTP application interfaces with SSL nearly the same way it would with TCP in the absence of security. DŘ  ǔ & and the operator << indicates that what appears to the right of the operator is to be sent to the output stream, cout. The operator << points in the direction that the data flows ( from the variable or string on the right to the output destination on the left. ), , , $x , | If x and y are words of length m and n, then x y is the word of length m + n obtained by placing x to the left of y. | , $x Then, if B is to the right of A, the number of x-units in the segment AB is equal to x2  x1. ~X $x The rightmost one is the one that gets filled by the entries from the list Range[500]. The next one to the left belongs to the pure function in the argument to NestList, while the leftmost one belongs to the predicate that is mapped down the resulting list. | $x , L<\ |ƽ ǔ , | |ƽ However, note that assigning one array variable to another one makes a copy of the first, so that component assignments to either one don t affect the other. Ő \ , x \ Referring to Figure 45 and viewing from left to right, decipherment begins with the arrival of a message. D t; |ƽ $x<\ t   In our hierarchy of algebraic structures, an integral domain belongs between a commutative ring with unity and a filed, as we shall now show. ~X  \, t; t tǠ. If the masses are equal, the center of gravity lies halfway between them.  x One dress was too elegant, the other too casual; she had nothing in-between. Most of us work in organizations that fall somewhere in-between.  t The answer probably falls somewhere in the middle.  ɔ, 买 ɔ These ideas are of such importance that we formalize them in a definition. Definition & 买 ɔX\ ~\, With hackers making the national headlines weekly, protecting wireless data streams is of the utmost importance. However, rather than simply tacking together the notation and rules from all of these we adopt an integrated approach, designed to yield a logic that is sound with respect to a single, relatively simple model of computation. <, iX  ι@ X & , especially if you are sending large amounts of information over a single SSL session or over multiple SSL sessions that use a shared master secret. On the other hand, if you expect to be serving dozens or more SSL HTTP requests over the course of a minute, you should consider getting either an extremely fast computer or hardware assistance for the public key operations. ι@ X ; ٳH There is thus a fair amount of syntactic reduction since primitives of one language are often definable in another. On the logical level there is a similar amount of axiom chopping. ι@ X, d ι@, ιt, ι A fair amount of research has centered around anonymity. Some of the work is highly theoretical, but some solutions are practical and have been implemented. Much of the work in this area is based on Chaum s invention of a digital mix. Existential quantifications are also signaled by a host of Englihs words: &  8tհ,  tհ,  ij The problem with the Needham and Schroeder Public-key protocol is that the certificates for the public keys of A and B are not linked to the requests. A simple modification takes care of this. ~X 8Ȕ; tհ`  The concept of  Single Sign-On or SSO provides an opportunity to help address these problems by providing users with a single  master key to all the systems he is allowed to access. 8tհ ijt . Group theory has been a significant help in the solution of this problem. ~| xԔ p, tհXՔ p p ijt . Scripting can help in the introduction of standard rules for the composition of passwords. ~| ijXՔ p ijt . To plot the graph of a complexvalued function of a complex variable, four dimensions are required as follows: two for the complex variable and two for the complex function value. One method, to circumvent the need for fourdimensional graphics, is to show how the function transforms sets of lines that lie in the complex plane. tհ` \ )@, <`  ǔ )@ To get around/round (= overcome) this problem, let us have the AS provide both the client and the TGS with a secret piece of information in a secure manner.  tհE,  tհ) $RecursionLimit: Can you program your way around this problem? A way around this problem is to perform a network logon to the network operating system such as a Windows NT domain logon or a Netware logon. Q<\, Q, A "Cookie" Exchange guards against simple flooding attacks sent with bogus IP Sources or UDP Ports. Each party passes a "cookie" to the other. In return, a list of supported Exchange-Schemes are offered by the Responder for calculating a shared-secret. 8, ), ɹD, ɹ; , , In response, the server will also send its own ChangeCipherSpec message. The responding system replies with a packet with both the SYN and ACK flags set. I asked her what her name was but she made no reply. I am writing in reply to your letter of 16 March. The Supplicant PAE sends a Response packet in reply to each Request. In so doing we also give definitions of useful expressions from the languages of those logics.  Xt In the first stage, two peers negotiate a common secure channel further called a ISAKMP Security Association or a ISAKMP SA for short. 9@ , 貈 ~| x, , }m The first three phases (cookie, exchange, and identification) must be carried out in their entirety (= whole extent) before any Security Association can be used. ‰; Ȁ, P, DȈ These problems were not so much flaws in the protocol design itself, but rather ambiguities and omissions in the specification that could lead to insecure or incorrect implementations if the specification were not correctly understood. Indeed, in one case we found that several incorrect implementations were being developed as a result of an omission in the IKE specification. ~|0 䲔 ~, $ Contrary to first appearances, this need not result in an overly complex logic. x 첬, 0@Ɣ 첬, O 0Ŕ On appearances, the password is not intelligible, but with standard Unix utilities, the passwords can be decoded without too much difficulty. In ISP environments where many users share the same Web server, it is important to use as specific a path as possible in the cookie. ij]tt/\ \ l & and we also have p not dividing a. Our list was for n from 1 to 10. How about trying from 69 to 71, to pick two funny numbers that come to mind. x , $t Many times it will get you out of a bind (= nuisance). , ȅ; 䬀, tհ Of course, each of these security breaches has happened, probably lots of times. Oh my! You know, it's enough to shake your confidence in the whole idea of experimental mathematics. UD h(, 4(; P ȴ/|, P, P Ǵ Wouldn't it be nice if we could see these roots plotted in the complex plane? That way we could see where they are, relative to each other. ~Xt JDL?;  t ~` ij The roots of the factors are known as the roots of unity, since they are all numbers that, when raised to some power, give 1. ~ \ L$8 , L , x, , m, 8m; q, First let s remind ourselves what the factorizations of these polynomials look like. 0XՐ, 0XՐ If you have ever browsed through The Mathematica Book, you may have come across the description of the cyclotomic polynomials. , ̹, X Our goal at this point is to develop an alternate way of building the cyclotomic polynomials without using the complex numbers. t Ƭ \Ԕ, t Ƭ ` @  /T׈ t/t As usual, the "iterator" has abbreviated forms. ј, t, X@ t Alternatively, and as is more usual in the literature, the revocation could be done by the issuer of the certificate rather than by the owner of the certificate. |, T׈ t As always, the latest information is available at the URLs listed at the end of this advisory. t Note that when used, as is common, without colent-side certificates, the SSL protocol is subject to a similar form of connection depletion attack. T׈ t A receiver of a certificate may accept it at face value or, as is more probable for critically important transactions, wishes to verify that it is still valid, for example in case there is & Nevertheless, clever design has its limitations when delay is excessive, as is often the case in the public Internet. ~ T׈ t Most often, this information is comprised of a user ID and password. , , T׈ Most of the time, these ingenious workarounds will weaken the overall security level of the enterprise. In most cases, & Therefore, to use the third element, we either pick it off the list of elements, as we did earlier or we create it anew with the Poly function. In this case, this polynomial can be obtained by & QDŴ, ɴŴ, ͜X, |; <, ^ Note that this is now identical to third. ٳ|,   (t, T, |, X "Teddy, you have it all wrong. You were the one who taught me that I could make a difference. X, T, | At first sight, the only difference between & The order in which we write x and y makes a difference. t, (t The only difference is the way that V s TTP recovers the session key K. There is an important difference here in that an attacker with knowledge of a compromised key could produce a fraudulent suicide note, which would prevent the owner from using its certificate, a denial of service attack. Another important difference is that the suicide note refers to one certificate only, whereas the To verify that a (whatever it turns out to be) is a root of a, we need to represent as coefficients as elements of a. t 4t , P , t The use of  Indeterminate ( x is just for consistency. |1D 0X0 t, |1D t As we can see by the result of Inverses, R is not a field. ~<\0 L  t,  t We illustrate these theorems with examples to give you a better feel for what they say and what their implications are. ~ \/\ D 0 t, , (a) If there is no confusion about the actual choice of the prime number a, one often writes ~ instead of ~. <ٳt D , ~ ~\  However, many questions regarding EC-systems are still open at this moment, making it unclear what the future of these systems will be. D ι@ 8 ; <\; UXՌ \ We now take up the question of when a quotient ring of a ring is a field and when it is an integral domain. t ~ 8| 踐, 8 0, 8 ij  \0, notation The following notation is used throughout the paper. & . We use the following notation to describe the protocol. From now on we shall often simply write gh instead of g( h. We then analyze the well known Needham-Schroeder protocol, henceforth  NS , as an example. When the specific value of the key is not of central focus or is evident by context, we write simply PKd(A). \ \0|  We use "" here to mean the left hand side rewrites to the right-hand side in a single step. \0 $ Throughout this paper, we use the term administrative domain to denote an IP service provider(either an operator or Internet service provider. As a notational convention, we use E (and variants) to denote events, while M is a message and C is a spell. \0 We use the notation e(X,Y) to mean the encryption of word Y with key X, and d(X,Y) to mean the decryption of word Y with key X. Multiple encryption is represented by the use of nested functions; e.g., if we encrypt word Z with key Y, and then decrypt that using the decryption of word X with word W, that is denoted by d(d(W,X),e(Y,Z)). We give some abbreviations that will be used in the exercises. First, let WS and SS stand for the Weakest induction Step and Strong induction Step: WS: SS: Next, let A mean that all P.n are true: A: Finally, let WI and SI denote Weak Induction and Strong Induction: WI: SI: Define occurs(v, e) to mean that at least one variable in the list v of variables occurs free in at least one expression in expression list e. The IETF working groups solution was the Point-to-Point Protocol, more frequently called PPP. In the protocol description that follows, the letter I is used to refer to the initiator and the letter R is used to refer to the responder. An atomic event in a key establishment protocol is a single transmission of a message from one principal to another. This is also called a pass of a protocol. To indicate that a principal A sends a message m to a principal B, we write (A ( B : m). Note that m may consist of plaintext or ciphertext or both. For example, if A wants to use encryption to ensure the confidentiality of a plaintext ptxt, the transmission would be written as (A ( B : f ptxt g kAB ), where f ptxt g kAB denotes the message obtained by encrypting ptxt using a (secret) cryptographic key kAB shared by A and B. One reasonable guess might be that the identity function is an isomorphism, since the domains are identical. \ \ !@, ɑ,  I had difficulty getting any details. He wasn t very forthcoming(=willing). This difficulty is at the core of the debate over key recovery. In fact, an incomplete logic that gets us most of what we want easily is generally preferred over one that gets us all of what we want but with greater difficulty. As a further difficulty, generation of keys may face legal restrictions in some jurisdictions. From the issuers point of view, a CRL is an efficient way of making known which certificates are involved. LŬ,  The server then checks its secure session cache for a match. If a match is found, & |XXՔ ǔ Ux\ ~xŔ lij; $\ ~̹; x (apart from) The key must not be allowed to become known to any users apart from those participating in the protocol or trusted servers. It is simple to see that the use of a secret key means that no-one apart from A is able to compute the correct response to Bs challenge. Internet PKIX certificates have recently come into use as an attempt to provide a workable and acceptable certificate structure for Internet applications. XՌ , tnj  In the extreme, providing no network services at all will result in a very secure but useless commer system. <\ At one extreme, RADIUS does not require & At the other extreme, the user is not willing to wait severval minutes for authentication. \ո<\& \& This viewpoint is essentially looking at a LAN as a distributed system, with emphasis on the distributed operating system and the service it provides. p,  PKC alleviates some of the problems of symmetric key systems, but at the same time creates some new ones of its own. X The hash-value of x is computed and compared to the protected hash-value; if they are equal, one accepts that the inputs are also equal, and thus that the message has not been altered. DP, , ٳ| , , 䲑\ Solutions to this problem fall into a variety of categories. 䲑\ , X\  , X The Web is already being put to a variety of uses: educational, social, political, and commercial. 䲑\ ij It is an important issue, since, as we will see, session key distribution protocols must resist a variety of novel attacks. /䲑\ A future mobile user will be offered a much larger variety of services than in today s networks. Any defined EAP method can be used within IEEE 802.1X, enabling support for a wide variety of authentication credentials. Remote access servers vary widely in their functionally. For various reasons, we consider this to be the most useful definition of authentication: it insists that the two agents agree on all the essential features of the protocol run, while avoiding specifying features that are hard to achieve and less likely to be required. t \, ~XՔ \ո, ļ\ ~`  J, 1 This will be of manifold advantage. First, & t . Amongst other things, such a foundation can give us assurance that the reasoning in the logic is sound (i.e., false conclusions cannot be derived from true premises.) ij It also has a range of other options relating to the way a workspace is handled. , ), ) These devices come in different forms and are typically used in branch office and corporate networks. 䲑\ X/\ М. Key establishment protocols come in various flavours (= a type or kind of something). Computer network attacks can take many forms and any one attack may include many security events of different types. Upon receiving (= receipt of = reception of) instructions from B, K decrypts the instructions with Kbk, thus verifying that they were issued by B at some time in the past (K does not care about replays). Xt After this sequence, E is authenticated as B towards A, and knows what A believes to be the session key, namely the public information M, A, B. xǝ X, l, X, Ѕ, ATM card based systems fall into this category. t \. Solutions to this problem fall into a variety of categories. Wiretapping is subdivided into passive and active categories. We further divide pipes into two broad classes: general pipes and service-specific pipes. What services might a network application need from a transport protocol? We can broadly classify an applications service requirements along three dimensions: data loss, bandwidth, and timing. It also works well against physical intrusion; an attacker who tapped in to an Ethernet cable, for example, would not be able to inject spurious packets. 㴔/ٳ\/ The principal disadvantages of the client puzzle protocol by comparison with the standard approaches is its requirement for special client-side software. It is a sad fact of life that most software has bugs. t/  However, most important of all, wireless subscribers have a different set of essential desires and needs than desktop or even laptop Internet users. 4 ɔ\ @/ ɔ\ @ Wireless service providers are able to offer a new dimension of service that complements the existing features of their networks, while extending subscriber access to the unbounded creativity of the Web. ~Xt ٳ \ (X 0x, p, t , 0 While the obivous limitations are rooted in (= having as their origin or cause) the nature of wireless devices and data networks, there are also more fundamental differences that are important to understand. This incompleteness can be attributed to the limitations associated with our current models of cryptographic protocols. they are both using the same master secret, they will generate identical symmetric key pairs. X (both X )  L,  tL,  \L,  ֬,  ,   The techniques presented up to this point for protecting sensitive documents on Web servers from unauthorized eyes can be considered basic forms of access control. Research to date has encompassed public key techniques for authentication and key transport, but not for key generation. More specifically, public-key based key establishment protocols in which both parties contribute to the established key ( referred to as key agreement protocols ( have not previously been analyzed by these methods. LX, \LX l; T l<\ йt;  Up until now, remote connectivity to a corporate Intranet has been made by means of circuit-switched technologies, e.g. PSTN and ISDN. Up until the early 1990s this was the standard way of doing things. 90DL There are as yet (= up to this moment) no accepted standards for wireless transmission. L; ֬\ Until recent years \L But, until recently, these networks were essentially hardwired, offering little flexibility. In the examples given so far we have used SetDelayed (:=) to define functions. L, tL However, Ethernet technology is currently by far the mostprevalent access technology in enterprise networks. ֬\ L By far the most controversial aspect of the EES system, however, is key escrow. By far the most popular LAN topology is Ethernet. Since Ethernet is by far the most popular topology, we will cover it in detail here. Thus upon successful completion, A believes that B conveyed TB in the current epoch, as an intended response to the specific challenge RA. ~&.0<\^n8 T   h F h \~|ojhqkh'EHUhqkh'B*o(phhqkh'o(hqkh'5\hqkh'5B*\o(phhqkh'5B*\ph hqkh'hqkhb&OJQJh]qCJOJQJo(hqkhb&CJOJQJhqkhb&CJOJQJo(hqkhb&5CJ(OJQJ(&4^n h >pVlD%D% D%PSD%PSD%D%PSD%2&$d%d&d'dNOPQgd:Q* & F$d%d&d'dNOPQgd:Qgd:Qgd'$$a$ $&dP 0Fp8HJNPRln(L 0468XZ\b̧̻̱̻̟zskskshqkh1o( hqkh1hqkh'5hqkhv5o(hqkhvo(hqkhv5\o(hqkh:Q5hqkh:Q5o(hqkh:Q6o( hqkh:Qhqkh:Q5\hqkh:Qo(hqkh:Q5\o(hqkh'5\o(hqkh'o(jhqkh'EHU(4XD%D%]D%PS]D%PS]]D%ޅ&$d%d&d'dNOPQgd1* & F$d%d&d'dNOPQgd1&$d%d&d'dNOPQgdv* & F$d%d&d'dNOPQgd[b4TJ&(*,`bl%6v#.;vĺĺhqkh$5o(hqkhb&5\o(hqkhb&o(hqkhb&5\ hqkhb&hqkhb&5o(hqkhb&5hqkh15o(hqkh16o(hqkh16hqkh1o( hqkh1hqkh157_;D%D%PSD%PSD%PSD%PSD%2[D%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ/ & F$d%d&d'dNOPQ^`* & F$d%d&d'dNOPQgd1 v2RTn~:<$&.0*  JSb9BSTu}~ hqkh Leo( hqkh Lehqkh9;\hqkhb&5o(hqkhb&6]hqkhb&6]o(hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&Am KD%.zzD%PSzD%PSzD%PSzD%PSzD%PSzD%2/ & F$d%d&d'dNOPQ^`' & F$d%d&d'dNOPQ/ & F$d%d&d'dNOPQ^` T= D%D%PSD%PS|D%PSD%ޅU' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgd Le2 & F$d%d&d'dNOPQ^`gd Le* & F$d%d&d'dNOPQgd9; (09;<=  !4!R!T!V!Z!!!!!!!!!!!!!!!!""$"H"|"""""""""###$.$3$D$R$q$r$hqkh>56hqkh>6 hqkhV^)hqkhV^)o(hqkh>5B*o(phhqkhb&5\o(hqkhb&5\hqkhb&5o(hqkhb&5 hqkhb&hqkhb&o(: \!!"s$$D%PSD%PSD%PSND%PS2 & F$d%d&d'dNOPQ^`gd>, & F$d%d&d'dNOPQgdV^)/ & F$d%d&d'dNOPQ^`#$d%d&d'dNOPQr$s$t$$$$$$$$$%%%%%%%#%Y%w%%%%%%%%&&&&&&&&&&'$'('4'ûûûôҜynynyhqkhb&5\o(hqkhb&o(hqkhb&5\ hqkhb&hqkhb&5o(hqkhb&5hqkhx6H*hqkhx65 hqkhx6hqkh5}o( hqkh5}hqkhQo(hqkhQ5 hqkhQhqkhx6o(hqkh>5hqkh>o( hqkh>)$%w%%&&4'D%PSD%PSD%2tED%PSED%2/ & F$d%d&d'dNOPQ^`' & F$d%d&d'dNOPQ2 & F$d%d&d'dNOPQ^`gdx62 & F$d%d&d'dNOPQ^`gdQ4'6'J'L'R'd'f'j'''''''''(((((#(/(7(9(H(U(Y(c(e(f(t((((((((((įvhhqkh1?5B*o(phfhqkh1?5o(hqkh1?o( hqkh1?hqkh]}5B*o(phfhqkh]}5o(hqkh]}o( hqkh]}hqkh.5B*o(phfhqkh.o(hqkh.5B*phf hqkh.hqkh.5B*phhqkh.5o(hqkh.5(4'R''(9(e((()l*D%D%PSD%PSD%PSD%PSD%PSD%PSw, & F$d%d&d'd9DNOPQgde!72 & F$d%d&d'dNOPQ^`gdz* & F$d%d&d'dNOPQgdz ((((((((((())) )()<)L)2*F*f*l*n***J+P+^++++++2-ļļwwm_mX hqkhzhqkhz5B*\phfhqkhz5\hqkhFo(hqkhF5o(hqkhF5B*o(phfhqkhF5B*phfhqkh5B*o(phfhqkh5o(hqkho( hqkhhqkh.5B*o(phhqkh.5B*o(phfhqkh.5o(hqkh.o( hqkh.!l**+-. 0 0D%PSD%PSuuuKD%* & F$d%d&d'dNOPQgd#\, & F$d%d&d'd9DNOPQgdz, & F$d%d&d'd9DNOPQgde!72 & F$d%d&d'dNOPQ^`gdF2-4-6->-@-D-H-N-P-T-X-b-f-n-p-t-x------........////00 0 0000 0"0B0R0T0d0f0x0z0|000000000ɿѪhqkhI5o(hqkhIo( hqkhIhqkhxu5B*o(phfhqkhxu5o(hqkhxuo( hqkhxuhqkhz5B*\phfhqkhz5\ hqkhzhqkhzo(: 00d112*334}44405l55D%PSD%PSD%PSD%PSD%2qD%PSqD%PSqD%PSqD%PSqD%PSqD%22 & F$d%d&d'dNOPQ^`gdU* & F$d%d&d'dNOPQgdU2 & F$d%d&d'dNOPQ^`gd#\ 01b1d1h111111122D2v222222222*3,33333333444 4^4f4}4444444444555 50515:5W5b5j5l5m5澶hqkhU5o( hqkhU hqkh:hqkh:o(hqkhIno(hqkhUo(hqkhI5hqkhI5o( hqkhI hqkh~?hqkhIo(hqkh~?o(hqkh~?5o(;m555566 666"6$60626>6N6P6z6666666666677(7*787:7X7Z7^7f7n7v777777777778 8 8 888&8*83878A8H8J8K8r8w8~888888888888hqkh=6o(hqkh=o( hqkh=hqkh=5o(hqkh=5hqkhU5o(hqkhUo(L568777 8J888D%PSoD%PSoD%PSooD%PSoD%PSoD%PS2 & F$d%d&d'dNOPQ^`gd=4 & F$d%d&d'dNOPQ^`gd=* & F$d%d&d'dNOPQgd=8888888889 9 99999,9095999M9N9`9d9i9r9s9w9999999999999999999 ::,:3:>:A:K:L:Q:Z:b:f:y:z:::::::::::::::::::::hqkh=5hqkh=5\hqkh=5\o( hqkh=hqkh=5o(hqkh=o(O89M9999 :K:y:::;D<<=D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%2D%PS|D%PS  & F^` & F^`gd.2 & F$d%d&d'dNOPQ^`gd=4 & F$d%d&d'dNOPQ^`gd?:::;;;;;;7;;;;;;;;;;;;;<&<(<B<D<L<\<d<z<<=*===.>T>>>׽׮{q{j hqkhb&hqkh 5o(hqkh o( hqkh hqkh Le5o(hqkh Leo(hqkh.5\o( hqkh.hqkh.o( hqkh'hqkh'o(hqkh5hqkh5o(hqkho( hqkhhqkh=5o( hqkh=hqkh=o(&=>?\@~AA\BCBDDD EKED%PSD%PSD%D%PSD%PS}D%PSxD%PSkD%PS  & F"^`gd  & F ^`  & F^`  & F^` & F &&^&`gd=2 & F$d%d&d'dNOPQ^`gdb& & Fgdb&  & F^` >>>?Z@@@@@PAlA~AAAA B\BCCCCEEhF}FFFGGHH I5IgIrIIIII JJJJJJJJJJJKK8K:KLK\KzKʺhqkh\Co( hqkh\Chqkhbo( hqkhbhqkhb&5hqkhERo(hqkhER5 hqkhERhqkhb&5\hqkhb&5\o( hqkhb&hqkhb&5o(hqkhb&o(8KEhEEEF*o(hqkhb&5o(hqkhb&o(hqkhb&5B*\phhqkhb&5\ hqkhb&8qY"ZZZ[#\u\\]]]B^^^_L``D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ* & F$d%d&d'dNOPQgd,\8\9\B\\\\\+]0]^]e]]]"^.^=^>^l^s^^^^ _B_I_}__``&`H`R`V`Z`^`b`f`j`n`p`r`t```ratava|apbbbbbbbbbbcc cccc c"c$c.c0cFcNcrcxccNdRdVdZd^dbdhqkhb&5\hqkhb&o( jhqkhb&o(hqkhb&5 hqkhb&hqkhb&6P`~a0cxd2e/fffghphj:kkYllmnnoUppD%PSD%ޅD%PSD%PSD%PSD%PSD%PSD%ޅD%PSD%ޅD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ#$d%d&d'dNOPQbdfdjdldndpdvddd&e(e*e0ef-fLfTfffg0gdgmggg!h9hhhhhjjj8k:k`kkkllYlalplllllllmmmm m&mRmWmXmnnnnndooohqkhb&5\o(hqkhb&6]o(hqkhb&6hqkhb&H*hqkhb&\hqkhb&5o(hqkhb&5hqkhb&5\hqkhb&o( hqkhb&BooooooooUpZptppppppppp q"q*q5q{֥oΦ&K<m72,:jD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSڪ۪9JYikls 7Jگ @pðİͰΰް߰2?CDwiԲ.<˳"&bzLR\ hqkhb&5H*o(hqkhb&5o(hqkhb&5hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&hqkhb&H*H.3=T\|޶ 1EHI|޷߷<hxz68:`@S^ak{|椙晋hqkhb&5B* \phhqkhb&B* phhqkhb&5B*\phhqkhb&5o(hqkhb&5hqkhb&5B*\ph jhqkhb&hqkhb&6] hqkhb&hqkhb&5\hqkhb&o(5j:@3AD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%2/ & Ff$d%d&d'dNOPQ^`#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ 459a ZzּRpx|~νֽ'pǾ׾*:;? hqkhb&5hqkhb&5B*\phhqkhb&\hqkhb&o( hqkhMvYhqkhb&5\ hqkhb& jhqkhb&o(CARj"8D%PSD%PSD%VggD%PSggD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ) & F$d%d&d'dNOPQ (:MhlpL "5;=ŽŽŽŽŲŽŽ̏̏Žhqkhb&5B* ph3hqkhb&5\o(hqkhb&B*phhqkhb&B* ph3hqkhb&o( hqkhb&hqkhb&5B*phhqkhb&5\hqkhb&5B*\phhqkhb&5B* \ph38  &(,.8 ~]^q 6xijom杳hqkhb&5\o(hqkhb&5B*\ph3fhqkhb&5hqkhb&5B*\phhqkhH5hqkhHo( hqkhHhqkhb&5B* \ph3hqkhb&5\ hqkhb&hqkhb&o(98~x kmpmD%zD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgdH4:vTkoPTn "*7 &,۹妘}hqkhb&6B*H*phhqkhb&6B*phhqkhb&5B*\phhqkhb&B*phhqkhb&6hqkhb&5B*\phhqkhb&6] jfhqkhb&hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(1*ZD%PSD%PSD%.D%bD%PSD%PS&$d%d&d'dNOPQgdj0 & Fd$d%d&d'd4$NOPQgdj#$d%d&d'dNOPQ ,-P,J`,XZ\hxzRt hqkhx3hx3hx35o( hx3o(hx3 hwo( hqkhwhqkhw5\hqkhwo( *hqkhwo( *hqkhwhqkhb&5B*\o(phhqkhb&o(hqkhb&5\o( hqkhb&hqkhb&6B*ph0 -<de.;BO.L`7FQd J`hr>`2>?H]^滰滰滦hqkhw5o(hqkhw5\o(hqkhwo(hqkhw6]hqkhw5B*\phhqkhwB*ph hqkhwhqkhw5\hqkhw\AB.`J?`W ZzD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgdj, & F$d%d&d'dNOPQgdjVWp}.9Z`yz /HV)09wx  *02`(HJbn0JL hqkh.hqkhw5hqkhw5o(hqkhwo(hqkhw5\o( hqkhwhqkhw5\Mz0wH\D%PSD%PSD%ޅD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS, & F$d%d&d'dNOPQgd., & F$d%d&d'dNOPQgdj&$d%d&d'dNOPQgdjLZ\rt"8.0L *,>BDLNRTĽĽĽĽΧhqkhjo( hqkhj hqkhhhqkhRo(hqkhR5B*\phff hqkhRhqkhR5\hqkhR5hqkhw5o(hqkhwo( hqkhwhqkhw5hqkh.o(6R,0].4D%PSD%PSD%D%PSD%PSD%PSD%PSD%PSD%PSD%PS, & F$d%d&d'dNOPQgdj&$d%d&d'dNOPQgdjT01>JZdir')*]fgo.0BDb46Jƾƾhqkhjo( hqkhjhqkh5o(hqkho( hqkhhqkh 5o(hqkh o( hqkh hqkhR5o( hqkhRhqkhR6hqkhpo(hqkhRo(hqkhR6o(74J D%PSD%2D%PSD%S+'$d%d&d'dNOPQ^'`' & F$d%d&d'dNOPQ($d%d&d'd9DNOPQgdj. & F$d%d&d'd9DNOPQgdjJx  "PdBRdj"&+<=AGMNSYxyɿ緬 hqkhb&hqkhb&5B*\o(ph hqkhCAhqkhb&5\o(hqkhb&o(hqkhj5o(hqkhj5B*o(phhqkhj5B*\o(ph hqkhjhqkhjo(hqkhj\o(8=y@TtD%PSD%PSD%2D%PSD%PSD%PSD%PSD%PSD%ޅD%PS#$d%d&d'dNOPQ+'$d%d&d'dNOPQ^'`+$d%d&d'dNOPQ^`y| 45PST\bklmx}=U <PR 4:Rn ˽˽˽hqkhCA5B*\o(phhqkhb&5B*\phhqkhb&5\ hqkhb&hqkhb&o(hqkhb&5B*\o(phhqkhb&5\o(D(*>@P^`"$JL\rt ,Z\|<Z\z "@nhqkhb&\hqkhb&7o(hqkhb&5\o(hqkhb&5\hqkhCA5B*\o(ph hqkhCAhqkhCAo(hqkhCA5o(hqkhCA5hqkhb&o( hqkhb&9\"t   0 *   SM D%D%PSD%PSD%PSD%PSD%D%PSD%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQLj(J       $ ( , 8 T V f j           $ . 0         b  678GHPQRLMUY]fhqkhb&H*hqkhb&B*CJo(phhqkhb&CJhqkh8tCJhqkhb&5\o(hqkhb&o(hqkhb&5\ hqkhb&hqkhb&5Cf2Lpx  +OY,2FLVZhp8\hj"LN^bǷǷǷǷǷhqkhb&5B*\o(phhqkhb&B*o(phhqkhb&5\hqkhb&5\o(hqkhb&5hqkhb&o( hqkhb&DR8jD%PSD%PSD%PSD%PSD%D%PS/ & FW$d%d&d'dNOPQ^`' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ PStFN0@0|00000000000001R1p11111ݴ hqkh6:hqkhb&5B*\phffhqkhb&5\o(hqkhb&5B*\o(phffhqkhb&o(hqkhb&5\ hqkhb&hqkhb&6]D081t112X23 4`556677>88:D%PSD%PSD%PSD%D%ޅD%PSD%PSD%PSD%PSD%D%.#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgd6:1"2@2V2X2Z2z2222223 333333633 4 4F4|555"666666J7R77777788889::V:^:x:::::::::~;;;;<<==== >J>b>d>>>?hqkhb&5\o( hqkhChqkhCo(hqkhC5o(hqkhC5hqkhb&o(hqkhb&5\ hqkhb&J::=b>?@BAACDDEF`GJHIHDHFHHHHHHI III$I4III"J(J.J2J6J:JLBLDLJLߺߨhqkhb&5B*\phhqkhb&B*ph hqkhhqkho(hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5B*\phffhqkhb&B*phff<K4KXLlM"NpN,OOOP`P2QD%D%PSD%ޅD%PSD%PSD%PSD%aaD%PSaD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgd* & F$d%d&d'dNOPQgd JLLLPLRLXLLLLLLLM MMMRMVMXMhMlMMMMM N"N0N,O|OOOOOOOOOPPPP*PBPPPPQQQ`RbRdRlRnRR񕋕hqkh#v5o(hqkh#v5hqkhb&5hqkhb&\hqkhb&5\hqkhb&5\o(hqkho(hqkh5hqkh5B*phhqkhB*ph hqkhhqkhb&o( hqkhb&62QbRNSS@SLSNSrSvST8T:TBTHTPTdTTTTTT UtUxU|UUUUUUUUUUUUUUUUVVVVVVVVVVVVVVVVV WW{_|}"}$~p~~~؀ցD%PSD%PSD%ޅD%2D%PSD%PSD%D%PSD%PSD%PSD%ޅ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ~<VZԀր؀ ,hԁ؁ށ8Cbgʂ߂ (<.8Vjl\^|ĆƆȆܸﰦhqkhb&6o(hqkhb&6hqkh%X-o(hqkhb&5B*\ph333hqkhb&5B*\phhqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5\AցM߂(xBh Pԋ?D%D%PSD%PSD%PSD%2D%PSD%PSD%PSD%PSD%2D%PSD%PSD%PSD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQȆ "6t '(*+/2AEMOQk}ˆÈĈˈ҈Ո+UVWXYZ Zjv|ƊԊLPċƋ!= jhqkhb&o( jhqkhb&o(hqkhb&6o(hqkhb&6]o(hqkhb&5\o(hqkhb&5\hqkhb&5o( hqkhb&hqkhb&o(A=>Wjl/<ail{}j FHJxƏ@Bڐܐ2NP¸j hqkhb&EHUj hqkhb&EHUhqkhb&6hqkhb&6o(hqkhb&6]hqkhb&6]o(hqkhb&5\o(hqkhb&5B*\ph333hqkhb&5\ hqkhb&hqkhb&o(7}$ZZ (u$D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%D%ޅD%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQPbޑ&VXʒZҕԕ֕ؕ ?(8JVߗ#+3BJXZ{ǘؘ'(-ѯhqkhb&5\h!hb&]o( h!]o( h!6]h!h!]o(hqkhb&6]hqkhb&6]o(hqkhb&5\o(hqkhb&o( hqkhb&A-™Ù".5]h՚!0;IVWYpĝߝ*ƞ24FHğҟ*ڴکhqkhb&6]o(hqkhb&6o(hqkhb&6]hqkhb&6hqkhb&5\hqkhb&5\o( hqkhb& jhqkhb&o(hqkhb&o(B$ƞ4t\\4dBD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%#$d%d&d'dNOPQ%$d%d&d'dNOPQ) & F$d%d&d'dNOPQ*,.NjlƠڠܠXlnp/0abuvǢȢ٢6@SZbuǣͣXhΥ246@BJL\^drtŸhqkhb&5B*phhqkhb&5\jhqkhb&EHU hqkhb&hqkhb&5\o(hqkhb&o(hqkhb&6o(F§ħzƩȩЩީFNvxzȪҪ@ҬجHJЭ߻խ߻ߥ߻ߥÚխhqkhb&5B*\o(phhqkhb&5\o(hqkhb&H*hqkhb&5B*\phhqkhb&\hqkhb&o( jhqkhb&hqkhb&5\ hqkhb&hqkhb&B*phfhqkhb&5B*\phf6BЭ*.fN1Ⱥ&VdD%PSD%PSD%PSD%PSD%PSD%PSD%.D%PSD%PSD%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgdYw#$d%d&d'dNOPQЭ&,-8=HY%7;R ,4<$@Rjz*.Zbn.6>εhqkhb&5B*\o(phfhqkhb&5\o(hqkhb&o(hqkhb&5B*\phfhqkhb&5B*\ph hqkhb&hqkhb&5\ELTX^`fh·ַLN <DP޹ɿɿњњɅ}sehqkhg5B*o(phfhqkhg5o(hqkhgo( hqkhghqkhYw5B*\phfhqkhYw5\hqkhYw5>*B*o(phfhqkhYw5>*o(hqkhYw5o(hqkhYwo( hqkhYwhqkhb&5B*\phfhqkhb&5\ hqkhb&hqkhb&o('125;O_flȺɺ˺кݺ&'5:ADVWXYcjnݻͿͿͯͿקͧͿͯߠhqkhb&o( hqkhb&hqkhYw5hqkhYw5B*\o(phfhqkhYw5B*o(phfhqkhYw5o(hqkhYwo( hqkhYwhqkhgo(hqkhg5hqkhg5o(7ݻļƼּ޼08Ƚ*H\z.Dؿ&B 8CL}v*,FN`ǽܭܭսսhqkhb&5B*\o(phhqkhb&5\hqkhb&5B*\phf hqkhb&hqkhb&o(hqkhb&5B*\o(phfhqkhb&5\o(DؿB8J6D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%* & F$d%d&d'dNOPQgd E#$d%d&d'dNOPQ @@j68b0|6N>N   89op{<Vjlnhqkh E5o(hqkh Eo( hqkh Ehqkhb&5\ hqkhb&hqkhb&5\o(hqkhb&o(Lo<n6hD%.D%ޅD%2D%PSD%PSD%PSD%PSD%d#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgdaf<&$d%d&d'dNOPQgd E 6N4bhlnv|<FPTh| Bt "28>L`brz0F˽˽˽˯˯hqkhb&5B*\phhqkhb&5B*\phhqkhb&5\hqkhb&5B*\o(phfhqkhb&5\o( hqkhb&hqkhb&o(Ch"b|kD%PSD%ޅD%2D%ޅD%PSD%PSD%PSD%D%PSD%PS' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgdaf<#$d%d&d'dNOPQFHS^ ;P,.^`@BD  #(4纲ݺhqkhb&B*ph333hqkhb&5B*\ph333hqkhb&5hqkhb&5B*\phfhqkhb&H*o(hqkhb&5\o(hqkhb&5\ hqkhb&hqkhb&o(hqkhb&6o(< !)04?Jk ,.DR\` 8:^j "*0@eoüññüñññüññüüüññüññüñüühqkh:5\hqkh:5\o( hqkh:hqkh:o(hqkhb&5\hqkhb&5B*\o(phfhqkhb&5\o( hqkhb&hqkhb&o(@l ,8@`D%ޅD%D%PSD%PSD%PSD%PSD%PSD%.&$d%d&d'dNOPQgd:* & F$d%d&d'dNOPQgd:#$d%d&d'dNOPQ @U\_,`bl4R07:GQY/6:;BCEI_aipۻۻۻۻۻۻۻۻۻۻۻۻۻۻۻhqkhb&5\o(hqkhb&5B*\o(phhqkhb&5B*\phhqkh=o( hqkh=hqkhb&o(hqkhb&5B*\phhqkhb&5\ hqkhb&hqkh:o( hqkh:hqkh:5B*\ph3`l::Vt I00D%D%PSD%PSD%~, D%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ* & F$d%d&d'dNOPQgd= R$:\V rt(: 6Hn)HIqz.0P Xhqkhb&5\o(hqkhb&5B* \ph3jhqkhb&EHUhqkhb&5B*\ph jphqkhb&o( jqhqkhb&o(hqkhb&5\hqkhb&o( hqkhb&>0F8t)XFprD%D%PSD%ޅD%PSD%PSD%PSD%PSD%ޅD%D%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ XfNlrAQ|8pr8,P~ H^ JnLjhqkhb&CJOJQJo(hqkhb&5B*\o(phffhqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(JJ   >   D%PSD%PSD%PSD%PSD%PSD%ҍD%PS, & F$d%d&d'dNOPQgd#$d%d&d'dNOPQ($d%d&d'dNOPQgdW:"*!%./W^1G Znr"$tLN( B hqkhb&B*ph3fhqkhb&B*o(ph3fhqkhb&5B*\ph3fhqkhb&5\ hqkhb&hqkhb&o(FB N T                                        B H R 8DGJghϼܼܼܼܼܼܼܼܼܼܼܼܲܲܪܲܲܒܼ *hqkhW jhqkhb&hqkhb&5B* \ph3hqkhb&5hqkhb&5\hqkhb&o(hqkhb&B*ph3fhqkhb&B*o(ph3f hqkhb&hqkhb&5B*\ph3fhqkhb&5B*\phff5 B7D%PSD%PSD%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgdW, & F$d%d&d'dNOPQgdW#$d%d&d'dNOPQ B&8: 12OYtu亲ֺֺ亪 *hqkhWhqkhb&5B*\o(phffhqkhb&5\o(hqkhb&o(hqkhb&6 hqkhb&hqkhW5\o(hqkhW\o(hqkhb&5B*\phffhqkhb&5\hqkhWo( *hqkhWo(5!.56ot{",Jlrt|$&ͽ𳫤hqkhb&H*hqkhb&5B*\phffhqkhb&5\ hqkhb&hqkhb&o(hqkhb&5o(hqkhW5B*\o(phhqkhW5\o(hqkhW5B*\phhqkhW5\ hqkhWhqkhWo(0JC\r^*  D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS%$d%d&d'dNOPQ#$d%d&d'dNOPQ($d%d&d'dNOPQgdW,NV"mtuVX^`DHLTX\˽˽˽˽ս˽էէ՟˽˽hqkhb&5hqkhb&H*hqkhb&5B* \ph3hqkhb&5B*\phffhqkhb&5\ hqkhb&hqkhb&o(hqkhb&5B*\o(phffhqkhb&5\o(>.:FD^jt 8 D t  !!$!&!."R"""""(#2#B#J#######$8$:$$$b%l%|%%̜̾̾̾jhqkhb&EHUhqkhb&5B*phffhqkhb&5hqkhb&5B*\phffhqkhb&5\hqkhb&5B*\o(phffhqkhb&5\o(hqkhb&o( hqkhb&= !!##%&C' (() *n++,,Y.D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS) & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ%%%%%%%%%%%%&&&*&O&[&&&&&&''' '-'4'C'^'s'(2(4(J(t(((((((((())))))* *!***++;+m++²͚ͨͨhqkhb&5B*\phhqkhb&6o(hqkhb&5B*\o(phffhqkhb&5\o(hqkhb&o(jahqkhb&EHUhqkhb&5\jhqkhb&EHU hqkhb&<+++++++++++N,R,t,v,,,,,,,,,,, .$.6.9.\.h.n.t.....V/b////0 0o0|0000 1111171=1D1E1M122 2hqkhb&B*phhqkhb&5B*\phffhqkhb&5B*\phhqkhb&5\hqkhb&6]o(hqkhb&5B*\o(phhqkhb&5\o(hqkhb&o( hqkhb&8T888:2:>:D:F:H:P:R:r:hqkhb&6 jhqkhb&hqkhb&5B* ph3hqkhb&5hqkhb&5B* \ph3hqkhb&5\hqkh"bo( hqkh"b hqkhb&hqkhb&o(@r:::::;;P;R;;;;; <</<0<Z<g<m<p<<<<!=,=0========>>>? ???? ?(?,?.?l?x?>@`@@@@@AAAAAAAAAAABBB BBBBҸhqkh5hqkh5\hqkho( hqkhhqkhb&o(hqkhb&5\hqkhb&5B* \ph3 hqkhb&G=Q=>.?z?@BBCDEFtGHJJKD%PSD%PSD%PSD%PSD%PSD%PSD%ޅD%.D%PSD%PSgdaf<#$d%d&d'dNOPQ&$d%d&d'dNOPQgdB"B(B2BNBBBBBB C.C0CHCTDlDnD|DDDDDEE^EdEfElEpEvExE~EEEEEEElFnFtFvFFGG G*GZG^GbGjGnGrGtGGzHHظذذذذذظظبذذذذhqkhb&5B* ph3hqkhb&5hqkhb&o(hqkhb&H*hqkhb&5\hqkhb&5B* \ph3 hqkhb&hqkh"bo(hqkho( hqkhhqkh5o(8HHHHJJ&JJJJJKKKLLLL L.L0LPLRLTLlLnLpLrLLLLLLLLL2MNMvM캰~vlalhqkh 456o(hqkh 46o(hqkh 46hqkh 4o( hqkh 4 hqkh*Lhqkh*Lo(hqkh 45o(hqkh*L5o(hqkh*5o(hqkh*5hqkhb&5\ hqkhb&hqkhaf<o(hqkhaf<5\ hqkhaf<hqkhb&o(hqkhb&5\o(&K LRLMINpNNN;OD%PSD%PSD%PSD%PSD%PS\D%PS($d%d&d'dNOPQgd*&$d%d&d'dNOPQgd 4($d%d&d'dNOPQgd 4* & F$d%d&d'dNOPQgd*vM~MMMNNPN]N|NNNNNNNNNNNNO&O)O,O9ODOLOPOSO]OuO8PJPPPPPQQQQ RRR RĽĨĨĞĽijvhqkhb&6\]hqkhb&5B* \ph3hqkh8to( hqkh8thqkh8t5\hqkhb&5\o(hqkhb&5\ hqkhb&hqkhb&o(hqkh 4o(hqkh 45 hqkh 4hqkh*6o(hqkh 46o(hqkh 46,;O]OPPQRRRTUD%PSD%D%PSD%PSD%2iiD%ޅ#$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgd* R(R*R?RRRTRRRRRRRRRRRRSSPSTTUUUUUUUVVV6VVV@WWbXnXXXXXX YY*Y,Y.YRY\YbYdYrYYYZZZ[n[x[[[[[ \"\&\i\r\\\\\ĹĹĹĹĹĹĹĹĹĹĹĹhqkhb&5\o(hqkhb&o(hqkhb&B* ph3hqkhb&5B* \ph3hqkhb&5\ hqkhb&hqkhb&6\IUVX,Z[[\A]$_``ag@ggggghhhhhhqkhb&H*hqkhb&]o(hqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5\Phhhi,iLiTiXifiiii jjOjXjZjajcjjjjjjjjk$k+kDkOkwkxkkkkkkkFlllllDmlm~mmmmmm*nnnnnnnnooopTp۪hqkhb&aJhqkhb&5B*\ph333hqkhb&6hqkhb&5B*\o(ph333hqkhb&6]o( hqkhb&hqkhb&o(hqkhb&5\hqkhb&5\o(?Tpbpqq~qqqqJrzrrrrrrrrsssstt)t;tCtLttttuv8v:vbvhvtvvvvvv,wƾ~wmwmwmwhqkhd5\ hqkhdhqkhE r5o(hqkhE r5hqkhb&5B* \phhqkhb&5\ hqkhb&hqkhE ro( hqkhE rhqkhb&o(hqkhb&aJo(hqkhb&56\]aJhqkhb&6]aJhqkhb&aJhqkhb&5\aJ*prs8vhvtw.xxyD%D%PSD%ޅaaD%2D%PS#$d%d&d'dNOPQ&$d%d&d'dNOPQgdd&$d%d&d'dNOPQgdE r* & F$d%d&d'dNOPQgdE r,w0w2w8wabv} '?FGPƀӀȾȾ jhqkhb&o(hqkhb&5\hqkhb&5B*\phhqkhb&5B*\o(phhqkhb&5\o(hqkhb&o( hqkhb&C+7|ˁс "؂ $(8Ffm GSĆȆʆ̆Ά҆ Vprz|.468hŽhqkhb&\hqkhb&56o(hqkhb&o(hqkhb&5B*\phhqkhb&5\ hqkhb&hqkhb&6IhdH Ԇp̌D%PSD%PSD%PSD%PSD%PSD%D%PS&$d%d&d'dNOPQgd9* & F$d%d&d'dNOPQgd9&$d%d&d'dNOPQgd' hj8:BLV|~26P`dhċ"$4Zhrz|̌<>d<ŽĎΎ $h϶϶ϯhqkh\5hqkh\o( hqkh\hqkhb&5\o(hqkhb&5B* \phhqkhb&o(hqkhb&5B* \ph3hqkhb&5\ hqkhb&hqkhb&5o(>̌Ē“ޖ8<D:D%PSD%PSD%PSD%PS, & F$d%d&d'dNOPQgd>,&$d%d&d'dNOPQgd9&$d%d&d'dNOPQgd\ hz|Ə4:`pڐƑґ,:DFz’TVXZv“ԓ֓ "NRlnprhqkhb&H*o( jhqkhb&hqkhb&5B* \ph3hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&Irtxz|ڔDv–ƖȖʖΖҖԖؖږܖDZԗ "$&*.0248ϫhqkhb&B* ph3hqkhb&B*phhqkhb&5B*\phhqkhb&5B* \ph3hqkhb&5\hqkhb&H*o(hqkhb&o( hqkhb&?8^n<>Dܙ0\bdflntx :Лқ֛؛"@TjlϽϽϽϽϽϽϽŽޚϽuhqkh95B* o(ph3hqkh95o(hqkh>,5B* ph3hqkh>,5hqkh95B* \o(ph3hqkh95\o(hqkh9o(hqkh95\ hqkh9hqkh>,o( hqkh>, hqkhb&hqkhb&o(hqkhb&5\o(+:֛jМNvD%PSD%2tD%PD%PSPN#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ2 & F$d%d&d'dNOPQ^`gd92 & F$d%d&d'dNOPQ^`gd>,̜ΜМҜ44Lj{vxƠҠTz~ȣԣܣ¤֤ "$&*.26<Jѿɴɴѿѿѿѿɴhqkhb&5B*\phhqkhb&5\o(hqkhb&5\hqkhb&o( hqkhb&hqkh>,o(hqkh>,5B* o(ph3hqkh>,5hqkh>,5o(?v<̧pƫjD%D%2D%cccD%PScc&$d%d&d'dNOPQgd62* & F$d%d&d'dNOPQgd62#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ JV^"Ԧ֦txħƧ̧XZjp  &@BL *np&(,DtǽϨݞ֐ݐݐ֐֐hqkhb&5B*\phhqkhb&5\ hqkh62hqkh555B*o(phhqkh555o(hqkh55o( hqkh55 hqkhb&hqkhb&o(hqkhb&5\o(hqkhb&5B*\o(ph8«ī*fxf| (V6<>@BFHNRVXZ\`bjlpįdz8:ºººººhqkhpx5o(hqkhpxo( hqkhpxhqkhb&5B*\phhqkhb&5\hqkhb&5B*\o(phhqkhb&o( hqkhb&Ej<\|J,^D%PSD%PSD%ccD%PScD%PSccD%PScD%2#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ* & F$d%d&d'dNOPQgd62&$d%d&d'dNOPQgd62 :<`nȱʱ|²\h~ "vдhtv)+,9E]^Ƕ "XZ "$&Dʺ۩hqkhb&5B*\phffhqkh625\ hqkh62hqkh62o(hqkh625\o( hqkhb&hqkhb&5\hqkhb&5\o(hqkhb&o(BZؽ̿@:p4<\HD%PSD%ޅD%PSD%D%2D%PSD%PSD%|D%PS' & F$d%d&d'dNOPQ#$d%d&d'dNOPQgd62ʺں(D\bhؽ 0̾ξؾ&68@`r̿z28<@:N`fpJdhqkhb&5B*\o(phhqkhb&5B*\phhqkhb&5\hqkhb&5B*\o(phffhqkhp*o(hqkhb&5\o(hqkhb&o( hqkhb&Adp:&68J(4@l|Fr~ <>\bln&02.HNZ\t:JVZhqkhb&5B*\o(phhqkhb&5\o(hqkhb&5B*\phhqkhb&5B*\phffhqkhb&5\ hqkhb&hqkhb&o(EHJp@b&~8|D%PSD%PSD%PSD%2D%PSD%PSD%D%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ#$d%d&d'dNOPQ*6HJX|p @^`b&&RjxJXlrx|>Nbflpvx|~˵˵˵hqkhb&5B*\phhqkhb&5hqkhb&5\hqkhb&5B*\o(phhqkhb&5\o( hqkhb&hqkhb&o(G :Nj\bcdv8lnp|*,L|j4TZpv ">Bd6ܼhqkhb&5hqkhb&5B*\phff jhqkhb&o(hqkhb&5B* \o(phhqkhb&5B*\o(phhqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5\="(Kpb~D%PSD%D%PSD%PSD%PSD%ޅD%PS D%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgdz:#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ">N`nTVZ\rtvz~  "&(8:V:<hz¸Ѹɝ•щ~hqkhb&6]o(hqkhb&5\aJhqkhb&H*hqkhb&5B*\phff jhqkhb&6]hqkhb&6] hqkhb&hqkhb&o(hqkhb&5\hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5o(1D ADLSWXyz%&8JKLXefj    hqkhz:6o(hqkhz:5o(hqkhz:o( hqkhz:hqkhb&5\hqkhb&5\o( hqkhb& jhqkhb&o(hqkhb&o(D '*+-245;<KO_bdfgiknopqvw}~ $-Dºº hqkhb&hqkhb&o( hqkh-hqkh-6o(hqkh-o(hqkh-5o(hqkh-5hqkhz:6hqkhz:5o( hqkhz:hqkhz:6o(hqkhz:o(:D\]`QRbd|~V.ovݥӥӥhqkhb&5B*\phhqkhb&5B*phhqkhb&5 jhqkhb&o(hqkhb&5\ hqkhb&hqkhb&6hqkhb&o(hqkhb&5\o(A MP jRD%PSD%PSD%ޅD%PSD%D%ޅD%ޅD%PS' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ P_`bo2>r| #GXYZLXjVr $Dz *d:t hqkh7Shqkhb&6o(hqkhb&5o(hqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5\JRt* `L&DD%D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%ޅ, & F$d%d&d'dNOPQgd7S&$d%d&d'dNOPQgd7S* & F$d%d&d'dNOPQgd7S  $(*hn|<`Tp~19Ө福ˑhqkh7S5o(hqkh7S5B*phhqkh7S5hqkh7S5B*\o(phhqkh7S5\o(hqkh7So(hqkh7S5B*\phhqkh7S5B*\ph hqkh7Shqkh7S5\89@CDR_`vzIZsvw  "&*.0246:<@DJLfl|Ƚ߳سسسس؞hqkhb&5B*\phhqkhb&5\ hqkhb&hqkh7S5B*\phhqkh7S5\hqkh7S5\o(hqkh7S5B*\o(ph hqkh7Shqkh7So(hqkh7S5o(hqkh7S5B*o(ph1$>BLT , !"#$%@MTU\afjp}ͽͽͲͽhqkh7So(hqkh7S5\o(hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5B*\phhqkhb&5\ hqkhb&hqkhb&o(C .2@FRTVh  8 V ~           $ % < C D O f n w              𳥳hqkhb&6]hqkhb&5B*\phhqkhb&5\hqkhb&5B*\phhqkhb&5B*\o(phhqkhb&H*o(hqkhb&5\o( hqkhb&hqkhb&o(=(  &    <PnD%PSD%D%PSD%PSD%PSD%.D%PSD%PSD%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ  H    & 6 \ r      J|FV &/7xzK:<HJVXdfnpxz &^q˽hqkhb&5B*\phhqkhb&5\hqkhb&5B*\o(ph hqkhb&hqkhb&o(hqkhb&5\o(Hn:DTTB#xD%ޅD%D%ޅD%PSD%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ "$&028<@BD`&*2FNTx Rbn~ *v:Røøhqkhb&\hqkhb&5B*\phhqkhb&5\o(hqkhb&5B*\o(phhqkhb&o(hqkhb&6]hqkhb&5\ hqkhb& jhqkhb&@R,BN  "5;}  .24lnvx".0xz|ٿ٥hqkh/5o( hqkh/hqkh/o(hqkh/5Uhqkhb&H*hqkhb&6hqkhb&5B*\o(phhqkhb&6]hqkhb&o(hqkhb&5B*\phhqkhb&5\ hqkhb&7D L; ֬,  modern-day (= present-day, contemporary,  ,  ) In modern-day public-key cryptosystems, the encoding user and the decoding user access different keys to decrypt a message. The fast-moving demands of a modern-day sport & the by-products of modern-day living Boxers are modern-day gladiators.  Even in modern-day Britain it seems some people still believe in sorcery and black magic. At the present time the development of regulatory policy for cryptography in many countries appears to be in a state of flux. And much the same can be said for the technical solutions for key escrow/recovery. Therefore Business is in the position where it needs to try and influence the outcome. One way of doing this is by stating what it considers to be suitable goals and criteria to which acceptable key escrow/recovery regulations and solutions should aspire. The main points to emerge from work package 1 in these respects are as follows. \ )/)@ at present : at this time; now. "Are you busy?" "Not at present." At present she's working abroad. Very few of the systems in common use at present support easy and scalable interworking between authentication domains. Ms. Hellman is busy at present, can she ring you later?   ,   ,  ,  p Because many kinds of information must be kept confidential for long periods of time, assessment cannot be limited to the protection required today. Equally important, cryptosystems  especially if they are standards  often remain in use for years or even decades. $ƫٳH/$Ɯ  ٳH,  \ ɔ\ @; x, XՔ, X ǔ, ǔ & but it will not keep out a determined cracker for very long. $ƫ ٳH Back in the early days, TCP/IP standards writers adopted the word gateway for what the commercial marketplace now calls a router. =0Ŕ In earlier times, an organization would use a single subnet mask through an entire network. LŔ, =0Ŕ There have been many examples in recent times of individuals in sensitive positions violating the trust placed in them. \ The router price/performance ration has decreased steadily over the past few years. ɜ D, \ D During the past few years, other networking technologies like frame relay and ATM have become available for forming corporate networks. Within the past few months it has become obvious that there is a great deal of interest and financial stake involved in the deployment of protocols for & \ , \  , \  t, ɜ  Just over a year ago, the idea of a single wireless data standard was unheard of, yet today the WAP specification is available to the public. 1D̹ tij& 췘 @ / 䴴 t Although the Web only started gaining popularity around 1993, the underlying concepts for the Web have been around for quite sometime. & which was given to them some time in the past. p Ő  In the late eighties BAN developed BAN logic, which quickly became the most widely used and widely discussed formal method for the analysis authentication protocols, particularly authenticated key distribution protocols. There have since been a number of papers noting BAN s inability or limited ability to reason about some features of both protocols and attacks on protocols. This has led several authors to propose alternatives to BaN. Many of these proposed alternatives are essentially extensions. ~D ; t, \ As a director for over a decade, I established myself as the leading expert in both & 10D There are few chances that the world will ever agree on a single electronic purse scheme in the near future. L ǘ, And, in the very near future, Odyssey Server will be able to forward WLAN authentication reqests to Steel-Belted RADIUS, to authente WLAN users against non-Windows back-end databases such as token systems or SQL. Within the next 2-3 years, SET will become the predominant method for doing credit card payments on the Internet, initially in software only, but later supported by smartcards. 2, 3 D & the above scenario appears likely in the not-so-distant future. @ J@ ǘ A CSMA protocol works as follows: A station desiring to transmit senses the medium, if the medium is busy (i.e. some other station is transmitting) then the station will defer its transmission to a later time, if the medium is sensed free then the station is allowed to transmit. The comments should be sufficient for another programmer, or you at a later date, to understand the purpose of any particular piece of code, and to understand how it works. In course of time, new and increasingly abstract representations of value were introduced. t ɘt, ( Sometime in the future, PPTP is going to be supplanted by L2TP. That future is not here yet, however. At a later time, a subset of participants  will pool their shares in an attempt to compute the key K.  If a transaction can be carried out using computer technology, it is certain that at some time or other a client will decide to do so. After a time, the table will be full and the target system must start discarding SYN packets or removing half-open connection, and it has no way of distinguishing between valid connections and connections from an attacker. l/lļ/(t ļ After some time, I will get a message that confirms my enrollment. ȹ H Ǵ, ȹ ɘt, p D0 /8X0  Our goal here is not to provide a complete classification, but simply to identify a few of the most important axes along which application requirements can be classified. , ~t DȲ ~, Parts of this general discussion are sourced from [Scho99], and I recommend you read Mayer-Schonberger s full paper.  ͘,  xǩ  control The authenticator is in control of the frequency and timing of the challenges. There has been some violence after the match, but the police are now in control of the situation. Were you in control of your emotions at the time? If either computer comes under the control of a network attacker, then the secret password is compromised. ~X  䴴 Last, but perhaps just as important, remember that you re most likely going to be installing firewalls at more than one site. ȹɹ<\ Email Hi Keith, Hope you are doing well. You will remember that a couple of months back DongGook Park sent you a draft paper on forward secrecy in mobile protocols. We submitted to ICICS'99 and just had a rejection notification. One referee seemed to misunderstand the notation - we can clarify that. The second was in favour. The third, however, gave scathing comments including a statement that because UMTS is designed for key escrow then forward secrecy is a waste of time. We disagree with this referee's comments but I was wondering whether you might be able to give any opinion yourself, in particular whether that last point has any validity. (I realise that there may be some delicacy required here since Chris Mitchell was on the ICICS'99 panel and we assume you may have passed the paper on to him.) We are inclined to resubmit elsewhere, but if we have made a misjudgement on the value of the paper we would rather not spend more time on it -- so your candid opinion would be valued! Many thanks if you can help. Best wishes, Colin  Hi Keith, Many thanks for your prompt and fulsome reply. I am writing this from home so this will be a quick reply which I will follow up tomorrow. I wanted to make a few quick points. 1) I never intended to imply that Chris was the referee in question. In fact I think I know who it was, and that person is well known for making his strong opinions very forcefully. 2) The statement about UMTS and escrow was my paraphrasing. I may have been inaccurate - I will check this tomorrow since I do not have it here now. However, the remarks fit in with my conjecture about who the referee was. 3) I think that we would agree with all your comments, including that it is a lightweight paper. If this was the reasons for rejection we would have no argument. 4) It would be great if you could visit us for a day or two in September/ October. I am fairly sure we could pay for your local travel. I will check with Ed and get back to you tomorrow. Ux, U Best wishes, Colin  Dear Manager of Ray White Toowong, My name is DongGook Park, the tenant of the unit with the address "Unit 68 24 Dunmore Terrace Auchenflower". The rental contract expires on 26th July, 2000. Could you please help us by having the house inspected by the 24th (Monday) July before my family and I permanently leave Brisbane for Korea on 25th (Tuesday) July, 2000? By inspecting prior to our Australian departure, we will still have an opportunity to rectify any minor problems, should they be identified. There is an area of carpet that has been damaged by water leaking through the roof. This damage occurred after we moved in. We provided verbal advice of this damage to the owner and to Ray White Toowong. We would like to ensure that the cost of fixing this problem is not deducted from our bond as we were not responsible for this damage. Also, when the air conditioner was installed, some cracks in the wall developed. We do not believe we are liable for the cost of fixing these cracks as we did not cause them. The owner was advised of this problem in person. We have a friend who has agreed to take care of any matters that arise after our departure. Her name is _____. If the bond refund cannot be processed before we leave the money should be given to _____, who will forward it to us in Korea. Is there a formal procedure to allow this to happen? We would greatly appreciate your timely reply to these enquiries. Best Regards, DongGook Park  Dear Professor Won, Please find attached a paper for consideration for ICISC 2000. Authors: DongGook Park, Colin Boyd and Ed Dawson Title: Micropayments for Wireless Communications I attach an electronic copy of the paper in MS Word format and a separate cover sheet. I look forward to hearing from you in due course. Sincerely, Colin Boyd  Conversations  H; t H I am sorry to be slow to respond. Actually I had problems on the weekend with my computer. Sorry for the delay in replying. I had a quick read through of the final paper. It looks great to me. I am very sorry that I have not replied before now. Actually I had a real problem last Thursday evening. It was very remiss of me not to answer your letter. t H Ŭ  We are privileged to welcome you as our speaker this evening. We are privileged tonight to have as our main speaker the Foreign Minister of France. We are privileged in having with us in tonight s show one of the world s greatest comedians, Mr. Les Dennis. I have a problem of a rather delicate nature that I'd like to discuss with you in private. x<\ X|` |t . I don t want to be a nuisance so tell me if you want to be alone. <֐ ڳhҸD%PSD%PSD%PSD%2D%D%PS^D%PS^D%PS^D%PS^D%PS&$d%d&d'dNOPQgdN, & F$d%d&d'dNOPQgdN* & F$d%d&d'dNOPQgdN#$d%d&d'dNOPQ (>fz³ijȳʳγҳԳسڳ޳ "V 0LNhjȶ  "(*.0Dv$Ҹ  ²²hqkhb&5B*\phhqkhb&6]o(hqkhb&5B*\o(phhqkhb&5\o( *hqkh8o( hqkh8hqkh8o(hqkhb&5\ hqkhb&hqkhb&o(< ,¹@JdnȺּ̻ܻؼ.FNPVZνڽ^`FLbп<Ž hqkhNhqkhN5\hqkhf35B*o(phhqkhf35o(hqkhf3o( hqkhf3hqkhb&5B*\o(phhqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5\7Ҹʹ.* D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS, & F$d%d&d'dNOPQgdN&$d%d&d'dNOPQgdN  "$*,Dhln6Tfnp 6HJXft׻hqkh85o(hqkh85\ hqkh8hqkh8o( *hqkhzCo(hqkhl5o(hqkhlo( hqkhlhqkhNo( hqkhNhqkhN5\hqkhN\:D|4Fd DLl>l rvx|~"&(.268>Dhqkh86]jOhqkh8EHUhqkh85\hqkh8o( hqkh8hqkh86JD\zfV8>x@D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS, & F$d%d&d'dNOPQgdl&$d%d&d'dNOPQgdl&$d%d&d'dNOPQgdNDn46jnrvz~<BFL:>\:>BHLTX\`dhnrz~>Z "$(*04:<@BFJNPTVhqkhlo(hqkhl5\ hqkhlhqkho(hqkh5B* \ph3 hqkhhqkh5\LVZ\^`fxzz $4fhVx $(*.2<>t ,BTpĺīijćĺijijijijijijijijćijijćhqkhzC5\o( hqkh(}#hqkh(}#o(hqkh(}#5o(hqkh(}#5 hqkhzChqkhzC5\hqkhzCo( *hqkhzCo( *hqkhwo( *hqkhw *hqkhl hqkhlhqkhlo(5>`d(6vxb@8npHX>NP`bºhqkhb&5B*\o(phff hqkh,P hqkhb&hqkhb&o(hqkhb&5\o(hqkhLo( hqkhLhqkhL5hqkhzC5\hqkhzC6] hqkhzChqkhzCo(hqkhzC5\o(3p D%ޅD%PSD%D%PSD%PSD%PSD%PSD%PS_D%PSD%., & F$d%d&d'dNOPQgdIN#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgdN   JVfpz*jμhqkhIN5B*\o(phffhqkhIN5o(hqkhINo( hqkhINhqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5B*\phffhqkhIN5\o(hqkhb&5\<,46>NPXfh|8J\hjlnB񳡳糏hqkhb&o( hqkhb&"j#hqkhqfB*EHUph"j!hqkhqfB*EHUphhqkh,PB*o(phjjhqkhqfEHUjwhqkhqfEHUjMhqkhqfEHUhqkh,P6o(hqkh,Po( hqkh,P.BX~lz|@RTbpxz( 2:PTjz $&*,.0dhx*Zf˥hqkhb&5B*\phhqkhb&B*o(phhqkhRB*phhqkhb&5\hqkhb&5B*\o(ph hqkhb&hqkhb&o(hqkhb&5\o(A~ P20D%PSD%PSD%PSD%D%PSD%PSD%.D%gD%PSgD%PSgD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ fBN^$&(,0dfhξhqkhb&B*phff jhqkhb&o( hqkhb&fHo(q hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5B*\phhqkhb&o( hqkhb&hqkhb&5\;(~Dh"D%PSD%PSD%ND%PSD%PSD%PSD%PSD%PSD%~, dD%PSdD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ%$d%d&d'dNOPQ#$d%d&d'dNOPQ 0@l0TZ\F~ v,prtz|Fd.@Rdx6hѧ jhqkhb&o(hqkhb&6hqkhb&5hqkhb&fHq hqkhb&o(hqkhb&B*phffhqkhb&5\hqkhb&5\o( hqkhb&Bh68T|">FHl~f|~  * , 2 L r v x  h l n v   6 : < d z X f      hqkhPo( hqkhPhqkhb&5\hqkhb&5\o( hqkhb&hqkhb&o(P"(f * 2 x x <  D%2D%PSD%D%PSD%PSD%2D%aD%PSaD%PSaD%PSaD%PS&$d%d&d'dNOPQgdP* & F$d%d&d'dNOPQgdP' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ   >@BJNRVZ\bdlnvxz~$*<Npr *Hbؼؼص hqkh%Vhqkh45o(hqkh4o( hqkh4hqkhP5o(hqkhP5\hqkh%Vo(hqkhPo( hqkhPhqkhb&o(hqkhb&5\ hqkhb&= b(p&D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%2D%* & F$d%d&d'dNOPQgdP, & F$d%d&d'dNOPQgdP&$d%d&d'dNOPQgdP  &(:PXhHJ&0<JƾƾƾƾƾƶƇyƾhqkhP5B*\phhqkhP5\hqkhP5B*phhqkhP5B*o(phhqkhP5o(hqkhP5hqkhPo( hqkhPhqkhF5o(hqkhFo( hqkhF hqkh%Vhqkh%V5o(hqkh%Vo(/HNH.P~P 2!D%PSD%PSD%PSD%PSD%PSD%2D%PSD%D%PSD%PSD%PSD%~, D%PSD%PSD%PS&$d%d&d'dNOPQgdw* & F$d%d&d'dNOPQgdw&$d%d&d'dNOPQgdP *6Hv.h~FZhr~046TVXl<LPfz|.>LTbئئhqkhb&5\ hqkhwhqkhw5o(hqkhwo( hqkhb&hqkhb&o(hqkhb&5\o(hqkhP5B*o(phhqkhPo( hqkhPA z    2!","."4"""#$#&#R#V#^#`#h#j#r#t#|#~##########$ $$:$L$V$X$b$d$ %%%%%%%&%*%0%ͼͼͼͼͼͼܦhqkhb&5B*\phhqkhb&6 hqkhb&fHo(q ̙hqkhb&fHq ̙hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&A2!R##t%\&(t))++,-.&01R24D%PSD%D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ0%6%:%<%B%Z%`%d%j%n%r%%%%%4&8&<&>&B&F&L&N&P&T&V&|&&&&','L'Z'x''''(((((f)l)n)r)))))))))))))*$************++(+0+:+hqkhb&5B*\phhqkhb&5\o(hqkhb&5B*\phhqkhb&5\hqkhb&o( hqkhb&K:+D+T+d+l+|++++, ,H,R,X,,,,8-:-j-v--------d.p.r.~......./ /(/8/:/F/L/R///// 00&0@0L0\0^0d0j011H111111ֿֿֿֿֿֿ֧hqkhb&6]hqkhb&5B*\phhqkhb&5\jy%hqkhb&EHU hqkhb&hqkhb&o(hqkhb&5\o(hqkhb&5B*\o(phB1026282>2@2D2H2R2222222233>3N3b3r3t334"4\4l4 55D5L5d5v5555555566J7L7N7t777 828Z8\8ʽʫʣʫʙʫhqkhsu5o(hqkhsu5 hqkhsuhqkhsuB*phhqkhsuB*o(phhqkhsuo(&hqkhsu5\fHo(q ̙hqkhb&5\o(hqkhb&o( hqkhb&4455L77\88:<<=.>??@@D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS) & F$d%d&d'dNOPQ, & F$d%d&d'dNOPQgdsu#$d%d&d'dNOPQ\8j8p888888896:t:|:~:::::::::::::::::::::;<<<@=`=====R>z>~>>??????<@P@T@V@@@@@@@@@@бhqkhb&CJhqkhb&CJo(hqkhb&5\o(hqkhb&5\ hqkhb&hqkhb&B*o(phhqkhb&o(&hqkhb&5\fHo(q ̙B@@@@@@@@@@@VBlBpBBBBBBBBB\C^C`CCCCCC D DJDjDDDDD&E*EGVGxGGGHH@HbHHHHHHHHHH I(I$JBJRJTJJJJJJJK KK,KBKpKxKKK׻״zzohqkhtd^5\o(hqkhVZL5hqkhVZL5o(hqkhVZLo( hqkhVZLhqkhXL5o(hqkhXLo( hqkhXL hqkhtd^hqkhb&5\o(hqkhb&5\ hqkhb&hqkhb&o( hqkhb&fHo(q ̙hqkhb&fHq ̙*HHRJKLlM6OPQRRrTTTD%D%PSD%.D%PSD%PSD%PSD%PSD%PSD%ޅD%2D%PSD%PSD%PS#$d%d&d'dNOPQgdtd^&$d%d&d'dNOPQgdXL* & F$d%d&d'dNOPQgdXL KKLNL^LLLLM.M>MlMMMMMNNNNN0N`NbNtN|N~NNNNNNNNNNO6O\OhOjOrOtO2PPPPPPQDQQQR*R2RBRRRRR>SBSvSSSSSSSShqkhb&5B*\o(phhqkhb&5\o( hqkhb&hqkhb&o(hqkhb&5\hqkhtd^5\o( hqkhtd^hqkhtd^o(FSSSSST&T.T4T6T>THTVTrTtTTTTTTTTTTTTTTTUU UUUU(U*U0U2U@UBUnUVBVVVVVVVVVVWWWWtXXXXX"Y$Y:YZ$Z&Z4ZFZbZZZ[[d[[[[[\\\^\hqkhb&5hqkhb&5\ hqkhb&hqkhb&5\o(hqkhb&o(STnUVWWX$YZ[\\:^t_j`FabD%ޅD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%.D%ޅD%ޅD%PSD%PS+$d%d&d'dNOPQ^`#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ^\d\\\0]:]b]]^ ^ ^^^^^"^&^*^,^2^4^8^:^j^`_j_l_r_z__Z`^```f`h`j``FaHahaaabbb*bbbbtccd(dVdddffggh`iPjD%ޅD%PSD%ޅD%2D%bD%PSbD%PSbD%PSbD%PSbD%ޅ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ+$d%d&d'dNOPQ^` eeBfVfXffg&gZglgggg,hhhhiBiDi`iiiiiNjtkkkkkk0l\llm,mvmmmmnnn*nnooopp p(p*p0pZpppppppppNqtqxqzqqqqqqqrjrӾhqkhb&5B*\ph hqkhhqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&hqkhb&5KPjrjkklmnp0ppqrD%D%PSD%2D%PSD%PSD%PSD%PSD%gD%PSgD%PSgD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ jrprrr|rrrrrrrrrssssstttt ttttt>t^ttttttttttuuuuuv v@vHvJvRvTvbv>wdwxxxxyy y yyyyyyz2z8z>z@zFzJzRzhqkhb&5B* \phhqkhb&B*\ph̙hqkhb&5\o(hqkhb&]hqkhb&5\ hqkhb&hqkhb&o(Hr ttu$vvwxyZzb{R|D%PSD%PSD%D%PSD%PSD%PSD%ޅD%gD%PSgD%PSgD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ) & F$d%d&d'dNOPQ#$d%d&d'dNOPQ RzTzXzZzzz${>{@{B{F{J{P{T{V{X{`{z{{{{{{2|4|6|P|R|||||}}} }(}*}P}d}}N~Z~~~~~4v NP$(BX ²hqkhb&5B*\o(phhqkhb&5\o(hqkhb&H*hqkhb&6H*hqkhb&6hqkhb&5\hqkhb&o( hqkhb&BR|*}}~P(x|D%ޅD%PSD%PSD%D%PSD%PSD%ޅD%PSD%PSgD%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ T^|~ڄ t…ą\zΆ*:N^‡Zv҈Pfjn*,Ɗ֊ (txzԋދ2 hqkhb&hqkhb&5\hqkhb&5\o(hqkhb&o( jhqkhb&o(QP‡pj,܍d$ƑD%PSD%PSD%PSD%PSD%PSD%PSD%2D%PSD%PSD%ޅD%PSD%PSD%PSD%PSD%ޅ&$d%d&d'dNOPQgdw* & F$d%d&d'dNOPQgdw#$d%d&d'dNOPQ`bʍ̍ԍ֍ڍdfƎ$&Php &Ƒȑʑ֑ޑ*P\x’ĒZxȕƾ޶פhqkhb&5\ hqkhb&hqkhb&5\o(hqkhb&o(hqkhw5hqkhw5o( hqkh^3 hqkhwhqkhwo(hqkh^3o(hqkh^35hqkh^35o(<Ƒ^ĒΖD@JD%D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%2D%PS#$d%d&d'dNOPQ%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ ЖҖtv $@Dlt~Hbz\vΛΜ(ĝƝ̝,@ΞО@FHVXȟ"@FTpʽʲʽʽʲhqkhb&6]o(hqkhb&56\]hqkhb&6]hqkhb&5\o(hqkhb&5hqkhb&o( hqkhb&hqkhb&5\F̝B`ȢD%ޅD%PSD%PSD%PSD%PSD%PSD%2D%PSeD%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ ֡htȢ`dhjprvxңԣJb|ʤbrxT^6hا >@B hqkh Y hqkh!hqkh!o(hqkh!5o(hqkh!5hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(FȢx:vD%PSD%PSD%PSD%PSD%ޅD%D%PSD%D%PSD%PSD%2&$d%d&d'dNOPQgd Y* & F$d%d&d'dNOPQgd Y#$d%d&d'dNOPQ Bv  &b"«֫ Lh֬ج:L24:FH\^h26>@JLT$HΰPZbp*<N~hqkhb&\o(hqkhb&5\o( hqkhb&hqkhb&5\hqkhb&o(R&$:TD%D%PSD%PSD%.D%PSD%~, eD%PS%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQhа"(T:j޷nD%PSD%PSD%PSD%2D%PSD%D%PSD%PSD%PSD%PSD%PSD%2&$d%d&d'dNOPQgdpH * & F$d%d&d'dNOPQgdpH #$d%d&d'dNOPQ (*8:FHTسƴVbvҵ2:<n̶jlڷ޷ Djnpz|񱦱hqkhpH 5hqkhb&56]hqkhb&6]hqkhb&5\o(hqkhpH 6hqkhpH 6o(hqkhpH 5o(hqkhpH o( hqkhpH hqkhb&o( hqkhb&9nz8VD%D%PSD%PSD%2D%iD%PSiD%ޅgD%PSgD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ ʸ<Lxzʹ0bʺ6  V*PRTVfrֽhjھܾRT.0ptvŽŽŽŵŽŵŽŽŽŽŽŽhqkht5o(hqkht5hqkhto( hqkhthqkhb&5\o(hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\mH o(sH @txPD%D%PSD%2D%]D%PS]D%PS]D%PS]D%PS]D%PS]D%PS&$d%d&d'dNOPQgdXM* & F$d%d&d'dNOPQgdXM&$d%d&d'dNOPQgdt* & F$d%d&d'dNOPQgdt :hdfhlntvxNP@ѿѿѿѿѿDZѿѿѿѿѿѿѿѩѿѿѿѿѿhqkhXMo(hqkh Y5o(hqkh Y5hqkh Y5B*\phhqkh Yo(hqkh Y5\ hqkh Yhqkh Y5B* o(ph3hqkh Y5B* ph3hqkhP5B* ph38RD%PSD%PSD%PSD%PSD%PSYD%.&$d%d&d'dNOPQgdp*, & F$d%d&d'dNOPQgdp*&$d%d&d'dNOPQgdXM, & F$d%d&d'dNOPQgdXMPRTBD"$&0JLnJTĽ赤xxnxxnhqkhb&5\hqkhb&o( hqkhb& hqkhp*hqkhp*5hqkhp*5B*o(phf! jhqkhp*5B*o(phfhqkhp*o( hqkh[~hqkh[~o(hqkh[~5o(hqkh[~5hqkhXM5o(hqkhXMo( hqkhXMhqkhXM5+ 0D%D%PSD%.D% D%PSD%WD%PS.$d%d&d'dNOPQ^`gd}`' & F$d%d&d'dNOPQgd(#$d%d&d'dNOPQ' & F$d%d&d'dNOPQTVb.0n&0>.Xt (,.0DFHJlpt<hŽŽŽŰŰŽŰŽŰŨەhqkhb&6]o(hqkhb&5hqkh(o(hqkh(5\]o(hqkh(]hqkh(]o(hqkhb&OJQJo(hqkhb&o( hqkhb&hqkhb&5\hqkhb&5\o(:0Jt<h.fD%PSD%D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgdd #$d%d&d'dNOPQ+$d%d&d'dNOPQ^`RZ\(LBFvfzH ,b "&,.TDJLX\dfr˽˯hqkhb&6o(hqkhb&5B*\phhqkhb&5B*\phhqkhb&5\ hqkhb&hqkhb&5B*\o(phhqkhb&5\o(hqkhb&o(A<& tDH:@BHLRV\bfjp"$(*,8NRξhqkhb&5B*\o(phhqkhb&5\o(hqkhb&o(hqkhb&5B*\phhqkhb&5\ hqkhb&KJr0.0:"@D%PSD%PSD%.D%ޅD%D%hD%PShD%PShD%PShD%PShD%.hD%ޅ#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ%$d%d&d'dNOPQ#$d%d&d'dNOPQ R"$(*,.02BFLNTbd,6Z"B  .6Rdزززززhqkhb&5B*\o(phhqkhb&5B*\phhqkhb&5B*\o(phhqkhb&5\o(hqkhb&B*o(phhqkhb&CJOJQJo(hqkhb&o( hqkhb&hqkhb&5\hqkhb&5B*\phff4dft~@FfZ^&(<XZdNTVZ\djrtz @zܫܹܫܫhqkhb&5B*\ph333hqkhb&5B*\phhqkhb&5hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5\hqkhb&5o( hqkhb&hqkhb&o(>|LpBD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%.D%D%PS($d%d&d'dNOPQgdG' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ 8<>BDLt~ *4jl<JL^p| hb&o(hqkhb&6o(hqkhb&6]j}'hqkhb&EHUhqkhb&5B*\phhqkhb&5B*\o(phhqkhb&5\o(hqkhb&5\hqkhb&o( hqkhb&5(*68@BDJ\br(*DZlnprx,<>Ǽ~~hqkh&o( hqkh& hqkhGhqkhGo(hqkhG5B*o(phhqkhG5o(hqkhG5hqkhb&5\o(&hqkhb&5\fHo(q #hqkhb&5\fHq #hqkh5\fHq 1pX@*D%PSD%PSD%PSD%PSD%PSD%ޅD%"dD%PSdD%PSdD%PSdD%PS#$d%d&d'dNOPQ($d%d&d'dNOPQgdG&$d%d&d'dNOPQgd&&$d%d&d'dNOPQgdG `|*,X"<N\v (*>@VjDzDzǤhqkhb&o(hqkhb&5B*\phhqkhb&5B*\ph hqkhb&hqkhb&5\ hqkh&hqkh&o(hqkh&5B*o(phhqkh&5hqkh&5o(= $&.ZdrDT|&0P 4Xfp`p|ʸʸʸ­hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5\hqkhb&o(hqkhb&5B*\phhqkhb&5hqkhb&5B*\phffhqkhb&B*phff hqkhb&> R4h  ^   nD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%~, D%' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ   d t     f       " @ \ ^           > N &0LN\|JZxv<`bHlhqkhb&5B*\o(phhqkhb&5B*\ph hqkhb&hqkhb&5\o(hqkhb&o(hqkhb&5\Kln4HX\pr|~06b(:<\^.0ߟhqkhb&5B*phhqkhb&5B* ph3hqkhb&5B* \ph3hqkhb&5\hqkhb&5B* o(ph3hqkhb&B* o(ph3hqkhb&5hqkhb&5o(hqkhb&o( hqkhb&7<vD%PSD%PSD%PSD%PSD%PSD% D%PSD%$OD%gD%PS%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ&$d%d&d'dNOPQgd#$d%d&d'dNOPQ 0<R|~ $&: &JNPRv~ (.RXtv޽hK~h%5\ hK~h1l hK~hhK~h5 h%5 h%o( hK~h%hK~h%5 hb&o(hqkhb&o( jhqkhb&hqkhb&5\ hqkhb&h1lhb&5B* o(ph3h1lhb&5B* ph34vx "&6 8 B D L T ^    8!:!J!!!!!!!!"""*":"""""$&$($0$2$6$$$$% %%%%%"%$%(%N%V%X%\%%%% &&&j)hqkhb&EHU hK~hb&hqkhb&5B*\phhqkhb&5\hqkhb&o(hqkhb&5B*\o(ph hqkhb&G8  J!""$,%%&(P) *2*D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%2D%ޅD%PSD%PSD%ޅD%($ & F$d%d&d'dNOPQ#$d%d&d'dNOPQ+'$d%d&d'dNOPQ^'` &&&&&&&&&'''''''6(8(((((((((())))) )&)(),).)2)6)>)B)L)N)P)^)`)r)z))))***** *2*P*X****`+r+++縨hqkhb&5B*\o(phhqkhb&5\o(hqkhb&5hqkhb&5B*\phhqkhb&5B*\phhqkhb&5\hqkhb&o( hqkhb&B2*+,X/|224>79::h;2<=D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%ޅD%kD%PSkD%PSkD%PS#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ%$$d%d&d'dNOPQ + ,d,j,l,p,,,-2-..*/X//&040l0|0~000001(1F1f11111111111222223$3T3d3t334424Z4p4444445|5556v666,7<7778899۽۽hqkhb&5B*\phhqkhb&5B*\o(phff hqkhb&hqkhb&5\hqkhb&o(hqkhb&5\o(J99999999999999999999:H:R:T:j:r:x:z:|:::::::::Z;p;;;;;;;;;;;;2<b<|<<<<====>.>4>>>>>P?x?z???@\@p@@ξhqkhb&5B*\o(phhqkhb&5\o(hqkhb&5B*\phhqkhb&5\hqkhb&o( hqkhb&K=P?NEHLJKLLrM6NNOPD%~, D%^ D%D%PSD%PSD%PSD%hD%ҍD%ޅD%PSD%ޅD%PS%$d%d&d'dNOPQ' & F$d%d&d'dNOPQ#$d%d&d'dNOPQ#$d%d&d'dNOPQ @@AA6A8AATAhAAABB*BRBBBC,CtCCCCCCCC&D(D*DPDDENEvExEEEEEF2FHFpF|FFFFFFFFG"G|GGGG H*HHHHHHHILJ|JJJJK`KbKzKL(LFLHLLLLLLLLLLLMZMhqkhb&5\o(hqkhb&o( hqkhb&[ZMpMrMMN4N6NHNdNNNNN OOrOtOvO|O~OOOOOOOOOBPTPPPPPPXX~__n`p`r`kƿƿ񴨗wnhK~hb&^Jj~,hK~hb&UhK~hb&5\j+hK~hb&U jF+hqkhb&OJQJUo(hqkhb&OJQJo(hqkhb&OJQJ hqkhwhqkhwo(hqkhw5o(hqkhw5 hK~hb&hqkhb&5\hqkhb&o( hqkhb&*PPXXn`r```fdhdhhkkkkkkkkl llllNmPmmmD% D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%IgdK~kkknnnnnnnnnnn"o6o8ooooo pbpdpvppppppppq4q6q8qNqZqqqqķīwwwohqkh-o(hqkhb&5\hqkhb&5B*\o(phhqkhb&5\o( hqkhb&hqkhb&o(hqkhb&OJQJo(hqkhb&CJOJQJhqkhb&OJQJ$j-hqkhb&OJQJU^Jo( hK~hb&hK~hb&^Jj-hK~hb&U^J(mndnfn|nnnnnnobp6qqqD%D%D%D%D%D%D%|D% D%D%PSD%PSD%PSD%2{D%* & F$d%d&d'dNOPQgdK#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ%DIgdK~qqq:rrBr^rrrr sDsFstsvssssst`tttxttttttttuuFuHuRuTupuuuuuu>vvjwwwwxпhqkh-+5o(hqkh-+o( hqkh-+hqkhb&5\o(hqkhb&o(hqkhb&5\ hqkhb&hqkhvj5o(hqkhvjo( hqkhvjhqkh-5o(hqkh-o(hqkh-5 hqkh-2qvjwwwzxxyD%PSD%PSD%BTD%PSD%PSD%D%2D%2D%PSD%PSD%PSD%PSD%PSD%PSD%PS&$d%d&d'dNOPQgd-+* & F$d%d&d'dNOPQgd-+&$d%d&d'dNOPQgdKxxnxvxxxxxxxxxx"yz4zzzzzz{{{{ ||||}p}}~@~~~~~~~~:HTVX^`pr~ ȀH`ǽǽǽhqkhi*5o(hqkhi*5hqkhi*o( hqkhi*hqkhb&o(hqkhb&5\ hqkhb&hqkhb&5Jyz{{||}~ 2ht4>v(D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%' & F$d%d&d'dNOPQ 3$4$5$7$8$NRhȂ4H6R<x~.DVRƊn"0RbvD^ :`Vdfh 68\&Tlhqkhb&5\o(hqkhb&mH o(sH hqkhb&5\hqkhb&o( hqkhb&hqkhb&5N8TR>t.NnԘdbD%PSD%PSD%2D%PSD%PSD%PSD%PSD% D%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PSD%PS#$d%d&d'dNOPQ(2d6PRz>p~ΕޕB^tĖʖؖޖ*LN(8(bdbnpȚʚԛڛܛȻȻhqkho(hqkhb&5\o(hqkhb&6hqkhb&5B*phffhqkhb&5hqkhb&OJQJo(hqkhb&OJQJhqkhb&o( hqkhb&hqkhb&5\=bvjD؝4r dTD%PSD%D%PSD%PSD%PSD%PSD%2D% D%PSD%PSD%PSD%PSD%PSD%PSD%PS6D%PSD%PSD%PSD%PS$a$#$d%d&d'dNOPQ' & F$d%d&d'dNOPQ "$6j DFJLP^؝  4@zzŸޟ8@nr̾ݷhqkhb&OJQJhqkhb&OJQJo(hqkh5hqkh5o(hqkho( hqkhhqkhb&5B*\phhqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(hqkhb&5B*\o(ph4*02l΢Т>£dxzҤ"$ҥFbdpЧv24J`zBNƪЫhqkhb&6o(hqkhb&5B*\o(ph33hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(LЫޫ&(,.JƬȬڬܬ268BNz*,.8:<xJZƯ02lİư4NR^`Ʊαر>Z\ܲ&(6JNhqkhb&5\hqkhb&5\o(hqkhb&6o(hqkhb&o( hqkhb&SNPn@NRtv,DR$46HƷ 6<v.6Jfhx̺ܺ B^`pĻƻȻ$&((DHNXxнhqkhb&6o(hqkhb&5\hqkhb&5\o(hqkhb&o( hqkhb&SнҽTξо 0f2402:<>`jb~  FVZ^p| :FHpTVZv hqkhb&hqkhb&o(hqkhb&5\o(hqkhb&5\WBLfhDPTb0:Lt*68NPVXTV FJLnvx6zP`>Bfhqkhb&OJQJhqkhb&OJQJo(hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(M&R6BT"D%PSD%PS D%PSD%PSD%PSD%PSD%PSD% D%PSD%PSD%PSD%PSD%PSD%PSD%PS D%PSD%PSD%PS$a$2TX>@ D24\fz24>`lz(*:Ndr &<RTlhqkhb&6o(hqkhb&o(hqkhb&5\o( hqkhb&hqkhb&5\S2DL`bdnz&:L4>NPfl&BX &(@|hqkhb&5B*\o(phhqkhb&5\hqkhb&5\o( hqkhb&hqkhb&o( jhqkhb&o(L Ldfnp$XZ^z$TXbhrDHNd,hqkhb&5\hqkhb&5B*\o(phhqkhb&5B*\o(ph hqkhb&hqkhb&o(hqkhb&5\o(J,NV\LV|FJ\ Rbv4Bjpvx(6Jd. 4DLz jhqkhb&o(hqkhb&5\ hqkhb&hqkhb&o(hqkhb&5\o(R,8Lfx* , 4 < J ^ n           4 B t       $ & 4 6 > v      4 > r t x             <D4<LRjlp hqkhb&hqkhb&o(hqkhb&5\hqkhb&5\o(Vp(8J\nz 46:HJLln"<>pz Tphqkhb&OJQJo(hqkhb&OJQJhqkhb&o( hqkhb&.01h2P. A!"R#$7%S Dd h,J  C A? "2`/Wg-ui"<D `!4/Wg-ui"@|xcdd``> @c112BYL%bL0YnLB@?6  UXRYvo&`0LY \RB\Xt9*ˍ*!3yX"c:02L䂺 C3n``ÄI)$5|>S .Fl 3!l!v1203FDd h,J  C A? "2_EvVq4enE;B `!3EvVq4enEĜ@|xcdd``> @c112BYL%bL0YnLB@?6  UXRYvo&`0LY \RBo\& \ ,@u@@ڈkcƕH\/1ps @&VrA]!ؙP 0y{aĤ\Y\P2d& s;.Ff~EDd ,J  C A? "2[ @c112BYL%bL0Yn ,56~) m @ k+'5MbnĒʂT+~3);a~&<ʜTߗqpme`b`*F\!.ϬwjD?u`TbXu=؇`!v 0y{aĤ\Y\Pnɑ2d& s;.Ff~yE.Dd J  C A? "2r$V8 8 `!r$V8  8>xڅ=KAg&_M ")N B" "'hD|'a F-҉VL^XvwYG H|"bĩ\U$oSZM'T'3/h +AJ覈x`kbBI’lJ(>  $ޔŋm×%kUjaqB6<(GgO?Tiq=%'* ntq7ڹ<4q%aP.풹\4-rϟś7W^^-=:g?ߪ/<aRjaKǥú__=&vρ.gOP׬{<1տD#srEDPDAwR)P+hDd LTJ  C A? "2M}㮭\lI `!M}㮭\lI<  XJlxڅR=KA}\.@ (v j)"F#(b" OFlBL/x}^v̛7CHcPO--BO 7M#YDYGsI3Qx* y-ٚ&LJ.V!OA]]Yިe-\{MaF8sb @c112BYL%bL0Yn ,56~) m @ k+'5MbnĒʂT+~3);a~&<ʜTߗdT T&0dtw晲q c:0*-䂺 CF=0adbR ,.Ie(dI3`b2†b#3X?8EDd ,J  C A? "2\jq|QM@8. `!0jq|QM@xcdd``> @c112BYL%bL0Yn ,56~) m @ k+'5MbnĒʂT+~3);a~&<ʜTߗdT T&0dtw晲q c:0*-䂺 CF=0adbR ,.Ie(dI3`b2†b#3X?8EDd ,J  C A? "2^<&u6"u;Q:( `!2<&u6"u;Qxtxcdd``> @c112BYL%bL0Yn,56~) m @ k+/ UXRYvo&`0L \RBE,\ \ ,@u@@ڈk7#IN#ּ$.yy`\F3 N\Ps}6b;&LLJ% a,i ] @fB0Cbd`Dz<Dd @J  C A? "2tf*]+dmz$`!rtf*]+dm$ @xmQJQ=3MESX !blA,ܸvOX, ZJ׹033g̝K%,A ,"\uZ괢`QR"rU@LP,P S~~:   C A?2gќqxQW$C` `!;ќqxQW$ ) xcdd`` @c112BYL%bL0Yn B@?6 Nj䆪aM,,He`7Ӂ`0LY \RB.I.:]j m6J_Jt u a>#dO؄= c%w\{7v0o8+KRsʅ9Nq0t1ccaOI|LDd T>   C A ? 2,i`Y R,Y `!,i`Y R, {6J\xcdd``ad``baV d,FYzP1C&,7\~! KA?H jx|K2B* Rt1 @0018g&)(T2-NHq50jVrB* 0 GkT`(̃ 2C'|M3He\nfܞ rYQ?!E0C6T`w  ~D] u0,;.F>03B8vQ7v0o8=021)W2H[2W= (mDdT>   C A ? 2\6=AKd&"G8 `!06=AKd&"G CJxcdd``> @c112BYL%bL0Yn LB@?6 5U17T obIFHeA*0l? S~~vnbNBpIeN* spc`b`*F\:*!Gy5\1ps@&DTrA]!#t] `p021)W2HS`b2†b#3X?G\Dd;8   3 A ? 2r[kV57 N `!F[kV57  2]x]PJ@fv[0x)?5Ul2({MMrob`_Kw(ˮuxQb~,_ 1*D|Gn#f 0`(io?IA&|ժF$ug#bފm(B|{g]^G߭?G*Dd b  c $A? ?3"`?2t}ka!P|`!H}ka!`:xcdd`` @c112BYL%bpu:]j mjP<&yI9 @]|\bcuXǵ Ps0M䂆 8އX-LLJ% 1.E.bGAp9TDd b  c $A? ?3"`?2=acżOO&W|`!acżOO&W: @Ƚxcdd`` @c112BYL%bpub·Xr>.P16zroj%.KB$+KRsAb\ ]` ]*4C`( l4G+Dd b  c $A? ?3"`?2u>À yĊwA{Q|`!I>À yĊwA{`:xcdd`` @c112BYL%bpu:]j mjP<&yI9 @k|\'Ŝ? ; skvs2UgR .pȁ Z+KRsAb\ ]` Brt?0U?Dd b  c $A? ?3"`?2;匰˻6w!|`!匰˻6w:@Rxcdd`` @c112BYL%bpu.P16R`TYÐR F;jAvFF&&\"CX1H!M;v}285Dd b  c $A? ?3"`?2=acżOO&W#|`!acżOO&W: @Ƚxcdd`` @c112BYL%bpub·Xr>.P16zroj%.KB$+KRsAb\ ]` ]*4C`( l4GDd;>   C A ? 2r[kV57 N% `!F[kV57  2]x]PJ@fv[0x)?5Ul2({MMrob`_Kw(ˮuxQb~,_ 1*D|Gn#f 0`(io?IA&|ժF$ug#bފm(B|{g]^G߭?GDd;>  C A ? 2r[kV57 N' `!F[kV57  2]x]PJ@fv[0x)?5Ul2({MMrob`_Kw(ˮuxQb~,_ 1*D|Gn#f 0`(io?IA&|ժF$ug#bފm(B|{g]^G߭?GDd-8>  C A?23 hc hlbw) `! hc hlbwD@sRxMN AQ=3$ YZY=?@QJRwX~Dgx4g3Rs(T"D:]"kjS^P͡|Z6R鈓Ahh'_{h 8dͬ|農3`bMI-S&hҫ N+~XّiQ.DdD%<P  3 ƦF3"(( DdD%<P  3 ƦF3"((DdD%<P  3 ƦF3"((DdD%<P  3 ƦF3"((DdD%<P  3 ƦF3"((,jv&O*{>8,jv&O*{>8,jv&O*{>8JT@T \$<<1$H$a$ OJPJQJ_HmH nHsH tHp@p ȩ 13$$dh-D1$@&H$M ̙a$5CJKHOJQJ\^Jt@t ȩ 2=$$ & FGBd<1$9D@&H$^B`a$5CJOJPJQJd@d ȩ 3-$$ & FHdx<1$9D@&H$a$5CJOJPJQJt@t ȩ 4=$$ & FI^dx<1$9D@&H$^^`a$5CJOJPJQJv@v ȩ 51$ & FJxx5$9D@&H$^`"56KHPJ_HmH nHsH tHT@T ȩ 6*$ & FK<1$@&^`OJPJJ@2J ȩ 7$ & FL@&^`OJPJ:@2: ȩ 8$ & FM@&OJPJN @N ȩ 9 $ & FN.@&^.` OJ PJQJ (A@( 0 } 4FiF \ \ :V 44 la $k$] L ~O~ Bullet 10C1$3$5$7$8$9DH$^C`$KHOJPJQJ_HmH nHsH tHlOl Bullet 25$0.d((1$3$5$7$8$^0`.a$ KHOJQJrOr Bullet 3<$ & F\ d((1$3$5$7$8$^ `a$ KHOJQJO" Bullet 4C$ & F] d((1$3$5$7$8$^`a$B*KHOJQJmH phsH XO2X Ref_List-$ & FR x1$^`a$R0@BR 8 08 $ & FOd<1$9Da$ OJPJQJh6@Rh 8 08 22$ & FP d<1$9D^a$ OJPJQJ8Oa8 Hidden Text <>*B*xOrx K~ Norm_Bullet  & Fd<1$4$9DH$(CJOJPJQJ_HaJmH nHsH tHJOJ Norm_Bullet_0$ & FC1$a$O Norm_Bullet_1$ & Fdx1$4$9D>T H$^`a$KHOJO Norm_Bullet_2$ & Fd<1$4$9D>T -H$^`a$KHOJO Norm_Bullet_3i>T ^`O Norm_No$ & F h>T)Tf^h`a$OJPJO Norm_No_1| & Fd>T)Tf^`OJPJO F Norm_No_2 & Fd<9D>T()Tf^` OJPJQJOq H Norm_No_3v & Fk>T.)Tf^k`ZOZ title1' $dhh&d9DPa$ CJ4OJ QJ >>  MѤ¸!$a$CJOJPJQJ&&!&  8pH*T#T  ((# y Rd x9D^R`OJQJ2L@2 $$a$ OJPJRH6@R6 8 % 8!OJPJB/@bB ]&dh^` OJPJQJJJ ( 1"'$ y d xx9Da$5;HH ( 2"($ y d 9D^a$:HH ( 3")$ y d 9D^a$6HH ( 4"*$ y Xd 9D^Xa$CJHH ( 5"+$ y  d 9D^ a$CJHH ( 6",$ y d 9D^a$CJHH ( 7"-$ y d 9D^a$CJHH ( 8".$ y xd 9D^xa$CJHH ( 9"/$ y @d 9D^@a$CJ6+6  MѤ¸0$a$OJPJ&*&  8pH*6 @"6  2 8!OJPJ2@22 \ 0 3^$)@A$ t 8N"@N X#5$$$x9D^$`a$ CJOJPJDY@bD 8 lp6-D M OJ QJ ^J bOrb GBullet 5,7d((3$5$7$8$^` KHOJQJpOQp Caption_Protocol)8$$9 d^9` a$ 6OJ QJ 8O8 Comment56B*OJQJJOJ Logic:$d<9Da$ OJPJQJ~-~ l\ MѤ¸6;$  ` @ <<1$H$a$ OJPJQJ_HmH nHsH tHO Protocol\<$ $d%d&d'dNOPQ] ^a$OJQJ<O< Protocol_123 = & FQhOh Protocol_normal/> & FGRd]^G`R>O> Quote?z9D]^z6~O~ Table_Bullet_1<@$ & FS K`(3$4$]^K``a$ CJOJQJO Table_Bullet_2EA$ & FT dx(3$4$G$]^`a$ CJOJQJzO"z Table_NoBullet_list.B$ d`]^` a$ CJOJQJ`O2` Table_NormalC$(3$4$]a$6CJOJQJNOBN Courier TextDd8 OJQJ^Je@R HTML PreformattedKE$ 2( Px 4 #\'*.25@91$H$a$OJPJQJ^JtH TOaT %X-Norm_No_2 Char OJPJQJ_HmH nHsH tHVOqV 7%X- Bullet 5 Char$KHOJPJQJ_HmH nHsH tH4Or4 %X-Norm_No_3 Char`OA` K~| Courier Text + DijkstraIdOJQJbo{fge8d{00;00:0;00:0{00:0{00:0{00:0;00:0/7+6~,j{_;G~ J H 3 X  y | (y8|GP6P b \Y  I,[Z>f0y7hQxd* 3!p!"6"p"?###$b$$$$$E%~%%%&'b(((H)))6***++,a,E--.8..e// 00611J2223q3394|44b556l66w77 88\9:]::U;;|<<4==o>>+???@@AAB\BCC DDE FqFFFaGGHZHIcII}JJSKK}LL5MMMPNNyOPPPWQ=R6SSTpTT7UU!VaVV WWWWiXX8YsYYaZZZ/[O[[[[\\]^~__K``aqaaa(bnbbbUccd+eee]ffQgghh-ihiijj{k-mOn~nooqqrssstuuLvvww"xxiysyyGzzz{]{{{o|w}K~~~$jˁLwp܄Fم9;>l;X9܊7P#bϐ!Bߓ A~ٕ֔JI2h7o{l$\(3o<ˡk΢Yftvިb-4}p82zN~;ǰFm?y$Vڵ 8x ڹ{%ͻ%+½z߿. E3{'J^%JsMF6<[10n@*F&Q_)7j6,yK'/h_;%@hY:X T)tlj0#,vSFnM5    9   JXta4c5i!H0G*^ N!!!"z""\###$I$$p%&P&&''(()3*>***I++I,Y,,,,-K--?.s/y/#0}0122`33}44J556!77888(999::;;&<'<:<<K==?}??Y@nAB/CDD EENFFGG]HHI{JJJQKLSLLM(MMM OjOO]PP6QCRR'S5SS;TTUXVV=WWX6XYZZZ[s\a]^^^^ __O``aabbQdde3f`ffggHhh ii jjkkllllmn9nrnno&o p$ppbqqqorr*s1t8uuvvcw-xxx~yz1{{c|1}(Ή2e8xtێ:ސΑ6B2?nrm8C nYN ".n+uƧ.sڨ}/(Kp3jʰWEZ8(ǷW+{ͺa ZϽZqN\_8Za /`P+dI_, _|(nWzf?a2`7XzLbevZH C~c8?WmCe8#2(-btkXx N   4   g)_\ ( 1[;-kL^y qv@/  !/"r"#c##U$$%&&v'5(l()M)))*++A,,,U---s..p// 0?0000k1112U33+45~58666777,88C9P99:y:9;x;;</==>>/??Q@@@@WAA%BBBCCnCCjDDEEEZFFGGHHHVIIJJ&KK LcLLL`MNN1OOOPHPVQQ*RRRSScTTUiUUXVqVVVWXYYZnZZU[[R\[\\w]]]^^1_j___u``a7aTa0b|bbbccdeyeeefKf ggghh*idiiii2jsjjjkkul~lmmmneooppMq\qqr;rHr>sBssttvv ww/wwxhxyzy| }}c~~b LmlAk؉-|5r!ύގƑ$xٓvTѕ~LqS5ǝyڞ| Wɡ[ڣ!Xת)PձXֳ߳.´9õܹ޹ѽҽDESTUceyzXtu@OUVMl*Fjq5pnU/Dv owxn ,l'0EAa.LWm   6Zd 0000 0 0 0 0 00 0 00 00 0 0  0  0 0 0 0 0 0 0 00 0  00 0 0 0  0  0  0  0 0 0 0 0  00 0 0 0 00 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0  0! 0" 0# 0$0 0% 0& 0' 0( 0) 0*0 0+ 0, 0- 0. 0/ 000 01 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0 0 0 0 0 0 0" 0# 0$ 0% 0& 0' 0* 0+ 0, 0 0 0/ 00 01 02 002 02 04 0 00 0 0 0 0 00 0 0 0 0 0 0 0  0! 0"0 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/0 00 01 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0J 0K 0L 0M0 0N 0O 0P 0Q 0R 0S 0T 0U 0V 0W 0X 0Y0 0Z 0[ 0\ 0] 0^ 0_ 0`0 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j 0k 0l 0m 0n0 0o 0p 0q 0r 0s 0t 0u 0v0 0w 0x 0y 0z 0{ 0| 0} 0~ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0f 0 0 00 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 00 0 0 0 00 0 00 0 0 0 0 0 0 0 00 0 0 00 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0  0! 0" 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/ 00 010W 0 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S 0T 0U 0V 0W 0X 0Y 0Z 0[ 0\ 0]0 0_ 0` 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j0 0k 0l 0m 0n 0o 0p 0q 0r 0s 0t 0u 0v0 0w 0x 0y 0z 0{ 0| 0}0 0~ 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0  0  0  00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0  0! 0" 0# 0$0 0% 0& 0' 0( 0)0 0* 0+ 0, 0- 0. 0/ 00 010 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@0 0A 0B 0C 0D 0E 0F 0G 0H 0I00 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S 0T0 0U 0V 0W 0X 0Y0 0Z 0[ 0\ 0]0 0^ 0_ 0` 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j 0k 0l 0m 0n 0o0 0p 0q 0r 0s 0t 0u 0v 0w0 0x 0y 0z 0{0 0| 0} 0~ 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0J 0K 0L0 0 0 00 0 0 0 00 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0  0! 0" 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/ 00 01 020 03 04 05 06 07 08 09 0:0 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E0 0F 0G 0H 0I0 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S0 0T 0U 0V0 0W 0X 0Y 0Z 0[ 0\ 0] 0^ 0_ 0` 0a 0b 0c0 0d 0e 0f 0g 0h0 0i0 0j 0k 0l 0m00 0n 0o 0p 0q 0r 0s 0t 0u 0v 0w 0x 0y 0z0 0{ 0| 0} 0~ 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 00 0 0 0 0 00 0 0 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 00 0 0 00 0 0 0 0 00 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0  0  0  00 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 00 0 0  0! 0"0 0# 0$ 0% 0& 0' 0(0 0) 0* 0+ 0, 0-0 0. 0/ 00 01 02 03 04 05 060 07 08 09 0: 0;0 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E000 0F 0G 0H 0I 0J0 0K 0L 0M 0N 0O0 0P 0Q 0R 0S 0T0 0U 0V 0W 0X0 0Y 0Z 0[ 0\ 0] 0^00 0_ 0` 0a 0b 0c0 0d 0e 0f0 0g 0h 0i 0j0 0k 0l0 0m 0n 0o 0p 0q 0r0 0s 0t 0u0 0v0 0w 0x0 0yt0t 0zt 0{t 0|t 0}t 0~t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0I0D0%000 0 0 0 00 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0 0 0  0  0 0 0 0 00 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0 s 0!s 0"s 0#s 0$s0s 0%s 0&s 0's 0(s 0)s0 0*P 0+P 0,P 0-P 0.P 0/P 00P 01P 02P 03P 04P 05P 06P 07P 08P 09P 0:P 0;P0 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E0/7+6~,j{_;G~ J H 3 X  y | (y8|GP6P b \Y  I,[Z>f0y7hQxd* 3!p!"6"p"?###$b$$$$$E%~%%%&'b(((H)))6***++,a,E--.8..e// 00611J2223q3394|44b556l66w77 88\9:]::U;;|<<4==o>>+???@@AAB\BCC DDE FqFFFaGGHZHIcII}JJSKK}LL5MMMPNNyOPPPWQ=R6SSTpTT7UU!VaVV WWWWiXX8YsYYaZZZ/[O[[[[\\]^~__K``aqaaa(bnbbbUccd+eee]ffQgghh-ihiijj{k-mOn~nooqqrssstuuLvvww"xxiysyyGzzz{]{{{o|w}K~~~$jˁLwp܄Fم9;>l;X9܊7P#bϐ!Bߓ A~ٕ֔JI2h7o{l$\(3o<ˡk΢Yftvިb-4}p82zN~;ǰFm?y$Vڵ 8x ڹ{%ͻ%+½z߿. E3{'J^%JsMF6<[10n@*F&Q_)7j6,yK'/h_;%@hY:X T)tlj0#,vSFnM5    9   JXta4c5i!H0G*^ N!!!"z""\###$I$$p%&P&&''(()3*>***I++I,Y,,,,-K--?.s/y/#0}0122`33}44J556!77888(999::;;&<'<:<<K==?}??Y@nAB/CDD EENFFGG]HHI{JJJQKLSLLM(MMM OjOO]PP6QCRR'S5SS;TTUXVV=WWX6XYZZZ[s\a]^^^^ __O``aabbQdde3f`ffggHhh ii jjkkllllmn9nrnno&o p$ppbqqqorr*s1t8uuvvcw-xxx~yz1{{c|1}(Ή2e8xtێ:ސΑ6B2?nrm8C nYN ".n+uƧ.sڨ}/(Kp3jʰWEZ8(ǷW+{ͺa ZϽZqN\_8Za /`P+dI_, _|(nWzf?a2`7XzLbevZH C~c8?WmCe8#2(-btkXx N   4   g)_\ ( 1[;-kL^y qv@/  !/"r"#c##U$$%&&v'5(l()M)))*++A,,,U---s..p// 0?0000k1112U33+45~58666777,88C9P99:y:9;x;;</==>>/??Q@@@@WAA%BBBCCnCCjDDEEEZFFGGHHHVIIJJ&KK LcLLL`MNN1OOOPHPVQQ*RRRSScTTUiUUXVqVVVWXYYZnZZU[[R\[\\w]]]^^1_j___u``a7aTa0b|bbbccdeyeeefKf ggghh*idiiii2jsjjjkkul~lmmmneooppMq\qqr;rHr>sBssttvv ww/wwxhxyzy| }}c~~b LmlAk؉-|5r!ύގƑ$xٓvTѕ~LqS5ǝyڞ| Wɡ[ڣ!Xת)PձXֳ߳.´9õܹ޹ѽҽDESTUceyzXtu@OUVMl*Fjq5pnU/Dv owxn ,l'0EAa.LWm   6Zd 000 0 0 0 0 0 00 0 00 00 0 0  0  0 0 0 0 0 0 0 00 0  00 0 0 0  0  0  0  0 0 0 0 0  00 0 0 0 00 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0  0! 0" 0# 0$0 0% 0& 0' 0( 0) 0*0 0+ 0, 0- 0. 0/ 000 01 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0 0 0 0 0 0 0" 0# 0$ 0% 0& 0' 0* 0+ 0, 0 0 0/ 00 01 02 002 02 04 0 00 0 0 0 0 00 0 0 0 0 0 0 0  0! 0"0 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/0 00 01 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0J 0K 0L 0M0 0N 0O 0P 0Q 0R 0S 0T 0U 0V 0W 0X 0Y0 0Z 0[ 0\ 0] 0^ 0_ 0`0 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j 0k 0l 0m 0n0 0o 0p 0q 0r 0s 0t 0u 0v0 0w 0x 0y 0z 0{ 0| 0} 0~ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0f 0 0 00 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 00 0 0 0 00 0 00 0 0 0 0 0 0 0 00 0 0 00 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0  0! 0" 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/ 00 010W 0 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0F 0G 0H 0I 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S 0T 0U 0V 0W 0X 0Y 0Z 0[ 0\ 0]0 0_ 0` 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j0 0k 0l 0m 0n 0o 0p 0q 0r 0s 0t 0u 0v0 0w 0x 0y 0z 0{ 0| 0}0 0~ 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0  0  0  00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0  0! 0" 0# 0$0 0% 0& 0' 0( 0)0 0* 0+ 0, 0- 0. 0/ 00 010 02 03 04 05 06 07 08 09 0: 0; 0< 0= 0> 0? 0@0 0A 0B 0C 0D 0E 0F 0G 0H 0I00 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S 0T0 0U 0V 0W 0X 0Y0 0Z 0[ 0\ 0]0 0^ 0_ 0` 0a 0b 0c 0d 0e 0f 0g 0h 0i 0j 0k 0l 0m 0n 0o0 0p 0q 0r 0s 0t 0u 0v 0w0 0x 0y 0z 0{0 0| 0} 0~ 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0J 0K 0L0 0 0 00 0 0 0 00 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0  0! 0" 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/ 00 01 020 03 04 05 06 07 08 09 0:0 0; 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E0 0F 0G 0H 0I0 0J 0K 0L 0M 0N 0O 0P 0Q 0R 0S0 0T 0U 0V0 0W 0X 0Y 0Z 0[ 0\ 0] 0^ 0_ 0` 0a 0b 0c0 0d 0e 0f 0g 0h0 0i0 0j 0k 0l 0m00 0n 0o 0p 0q 0r 0s 0t 0u 0v 0w 0x 0y 0z0 0{ 0| 0} 0~ 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 00 0 0 0 0 00 0 0 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 00 0 0 00 0 0 0 0 00 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 00 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0  0  0  00 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 00 0 0  0! 0"0 0# 0$ 0% 0& 0' 0(0 0) 0* 0+ 0, 0-0 0. 0/ 00 01 02 03 04 05 060 07 08 09 0: 0;0 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E000 0F 0G 0H 0I 0J0 0K 0L 0M 0N 0O0 0P 0Q 0R 0S 0T0 0U 0V 0W 0X0 0Y 0Z 0[ 0\ 0] 0^00 0_ 0` 0a 0b 0c0 0d 0e 0f0 0g 0h 0i 0j0 0k 0l0 0m 0n 0o 0p 0q 0r0 0s 0t 0u0 0v0 0w 0x 0 0yt0t 0zt 0{t 0|t 0}t 0~t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t 0t 0t 0t 0t 0t 0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0%0 00 0 0 0 00 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0  0  0 0 0  0  0 0 0 0 0 0 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0s 0 s 0!s 0"s 0#s 0$s0s 0%s 0&s 0's 0(s 0)s 0 0*P 0+P 0,P 0-P 0.P 0/P 00P 01P 02P 03P 04P 05P 06P 07P 08P 09P 0:P 0;P 0 0< 0= 0> 0? 0@ 0A 0B 0C 0D 0E 0bv r$4'(2-0m58:>zKPU,\bdoy3„)$}ڪ,LTJyfb(1? HJLRDXG`pjnt~Ȇ=P-*ЭݻFXB %+ 2r:BHvM R\hTp,w|hhr8J:ʺd D9 R( DVBfh 0%:+1\8@FKS^\ejrRz BTRdl0v&+9@ZMkqxЫNн,p    "#%')*+-/024568:;=?@BCEFGHJLMNOQST $4'l* 058=KEI`NqY`p6A8z4&0:K2Q"bvց$Bh`0  Y.=K;OUpy̌:vjHRnxƱҸ" 2!4@HTbPjrR|ƑȢn02*=Pmqyb  !$&(,.1379<>ADIKPRH o2$Zac 3̫1ԩb$Z5 vzwOG2"$L"`$G2$<,Na9IzSH2$;YWǥ4{"2$< Z]uW"@0( R V H c $ ?b _Hlt504377118 _Hlt504377119LpLpd@@LpLpd5FxG HMMITQJxKL$eDMQN QO QPQQR QSUYUZ[lC\B]N^H_<Q`VJa\Jb|Sc_dIetnfČgƪhLij HklTm\?n?oep4fqCrCs4ttudDvDdDwܻ@x@y@z<@O O Z #'U'U'Wpp%J}J}''+ˠˠggk"ݽݽ ^UU^2   d      !"#$%'&(*)+,-./01324Y ^ ^ %'Z'Z'Wuu&M}M}*00ҠҠjpp!&&'m]bb4   d  !"#$%'&(*)+,-./01324>2*urn:schemas-microsoft-com:office:smarttags PersonName=4*urn:schemas-microsoft-com:office:smarttags PlaceName=3*urn:schemas-microsoft-com:office:smarttags PlaceType8*urn:schemas-microsoft-com:office:smarttagsdate9*urn:schemas-microsoft-com:office:smarttagsState8!*urn:schemas-microsoft-com:office:smarttagsCityB0*urn:schemas-microsoft-com:office:smarttagscountry-region95*urn:schemas-microsoft-com:office:smarttagsplace 2000267DayMonthYear54325055055505505435!54354354355!5050543543225!225!.KLfgRŝĵdXaWaae4 6 |RV4=''1)4)**++G-J-/ /`:c:::!<'<R?\???t@x@AAAAACAjBuBFFFFeIgICLHL5M6MMMUUUVXX[[[[w\|\E_I_qasabb^bdbbbpperirrrv vvw>zFz<|=|||?@y~ru†]j]dٕߕpzΚԚlp$ u|Ra/3ABܵߵ:=_gJL),mr(004#$ 0 TXfnZ]!*ruPR,38?  23*.8 = W"X"##R&T&)*//==K=Q===??FGGG_HgHHH|JJNNeThTUUWW\\`abbeejjkk\l_lllllllmm,u2uuuxxzz!|#|A}E}~~߀ILMQ\^̇Їfl_fѦ)*lpMPaf¶ö.4ݷ!(,z~&' 679EJ(+ ms ~        ,-6:!@H$$%%%%5(7(O)P)))..001144777799f=h=BBCCGGNN T&T:X=XZ[[[\\f]g]]]^^ eeg"gmmmmgoiovp|pdsosuuɀʀ}LO ,4ioˎ35͘yzvwAȪ׳޳S]fs*9*4 +<>X[w}14MOpv7[dgbd%&ilVWd333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333376,;Gy !yHPbCd* 5#?#$$))))++,a,-E-..;/e/22|889]:t@@@ABCE FhFqFGHIIcII}LL5MMMMNPNTpTUU WWZZ/[O[[[K_~_~eel-msswwjysy{{~~^jbٕI7o{Tl(3]f.}p2zN0;ѱ8xڸ GzM[1*FQ7j 6lo_h!_;X #lSj#g4H@G*  !!Y""G##&P&))*>*-+I++I,s/y/V3`333}44?5J5!7788w88;;<:<<<8=K=>}??? @Y@B/CGGII{JJSLLOP%Q6QRR#S5S{TTV=WX6XZZaabb3fffggg jjklrruu*wcwxx%}1}҄Wt1:Α$6Wrm8C VnM ".sڨ(jʰEZ+Ƿ+{Ea x8 GP|^?7bevC~5?m$(tkzx N   (1F3[L^gv  !/"##g'v'~,,00W1k111U3+44~577C9P999g:y:&<<=>>/? B%BBBnCCEEZFFGHJJK L[LcLLLNNOOVQQoSSqVVR\[\^1_b_j_v``}bbf giisjjkkol~lmmnnXoeoooppq\q;rHr>sBsssttv/wK~c~~bĀ yLl2Ak-ގƑ$xTѕ~{]rɡd 9ת)v{ձͳ߳-9ܹ]EcEU soZadd DongGook Park DongGook Park DongGook Park DongGook Park DongGook Park DongGook ParkPark, DongGookPark, DongGookPark, DongGookPark, DongGook<߂ zP~ |mvr a|U ! 4D I[ l .v,w!k#Zzj}=QW+pƪ/?+Sdi`$z%(dT+Jg+^19@4޾|F9RHx:p:C]vW-]FrHUI0iJnLZkQNېDR m@?mT8i'Vw-V|RXLKYmv\\ܓ\Ld\ؓ6x]ȣA^&`|Va[JZcjd)h;j^>txMm?&(o _HoQql}crc^(:tkzZP| ^`OJQJo(l hh^h`OJQJo(l@@.@..@...@ ....@ .....@ ......@ .......@ ........**h^`QJo(%h ^`OJQJo(oh   ^ `OJQJo(h ~ ~ ^~ `OJQJo(h NN^N`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(*@ ^`OJQJo(p^`pOJQJo(hHn@p@^@`pOJQJo(hHup^`pOJQJo(hHl` p` ^` `pOJQJo(hHn p ^ `pOJQJo(hHu p ^ `pOJQJo(hHlp^`pOJQJo(hHnp^`pOJQJo(hHuP^`P@@^@`.08^`0..`^``... ^` .... ^` ..... p^` ...... ` ^``....... 0@ ^0`........**^`56>*CJOJQJo([] **^`o(.**@k^k`.)*** W^`WOJQJo(****W^`WB*OJQJo(w**W^`WB*OJQJo(w*****W^`WB*OJQJo(-^`B*OJQJo(w******^`B*OJQJo(w*^`56B*CJOJQJo(W^`WB*OJQJo(-****p^`pOJPJQJo(hH% p ^ `pOJQJo(hHnp^`pOJQJo(hHu@p@^@`pOJQJo(hHlp^`pOJQJo(hHn` p` ^` `pOJQJo(hHu p ^ `pOJQJo(hHl p ^ `pOJQJo(hHnp^`pOJQJo(hHu*** *^`OJQJo(hHp^`pOJQJo(hHn@p@^@`pOJQJo(hHup^`pOJQJo(hHl` p` ^` `pOJQJo(hHn p ^ `pOJQJo(hHu p ^ `pOJQJo(hHlp^`pOJQJo(hHnp^`pOJQJo(hHu***l l l: p:C9@4ZkQdi`Ъ: Va4:  _Ho: Q: ?&(o`: )hĬ: mv\(: 0iJ: ?+S: ?mTT: rH: kz: 4D : LKY: ~H: nL: ZP|: Wt: RHx:ر: dT+<: w-V: xMm: /h: I[ ̳: |F90: UI: vr: Ld\\: Qq: ^1ع: Jg+<: k#: (:t: jdh: [JZc̻: |RX0: W-]F: w!: %(\: 8i'V: ^&`\$         Zl R6x]^&`Qq$: LKY:  $+pQq:  $QqP: Qq: Qq: Qq<: Qq: Qq: Qq(: Qq: vrp: Qq: Qqx: Qq: aQq: ^&`;jQqd: Qq: Qq: Qq: Qq4: QqL: Qqd: Qq Qq ſ Qq$ɿ Qq<Ϳ QqTѿ Qqlտ Qqٿ Qqݿ Qq Qq Qq Qq Qq Qq, QqD Qq\ Qq( Qq Qq Qq Qq̭^1DQq Qq̲ Qq䶸 Qq Qq Qq,ø QqDǸ Qq\˸ Qqtϸ QqӸ Qq׸ Qq۸ Qq߸ Qq Qq Qq Qq4 QqL Qqd Qq| Qq3 Qq3 Qq3 Qq 3 Qq3 Qq43 QqL3 Qqd3 Qq|!3 Qq%3 Qq)3 Qq-3 Qq13 Qq53 Qq :3 Qq$>3 Qq3 ^`OJQJo(hH>3 !p^`pOJQJo(hHnH?3 "@p@^@`pOJQJo(hHu?3 #p^`pOJQJo(hHl @3 $` p` ^` `pOJQJo(hHn@3 % p ^ `pOJQJo(hHu@3 & p ^ `pOJQJo(hHldA3 'p^`pOJQJo(hHnA3 (p^`pOJQJo(hHuB3 ^`OJQJo(hHB3 !p^`pOJQJo(hHn`C3 "@p@^@`pOJQJo(hHuC3 #p^`pOJQJo(hHl8D3 $` p` ^` `pOJQJo(hHnD3 % p ^ `pOJQJo(hHuE3 & p ^ `pOJQJo(hHl|E3 'p^`pOJQJo(hHnE3 (p^`pOJQJo(hHuF3 ^`OJQJo(hH G3 !p^`pOJQJo(hHnxG3 "@p@^@`pOJQJo(hHuG3 #p^`pOJQJo(hHlPH3 $` p` ^` `pOJQJo(hHnH3 % p ^ `pOJQJo(hHu(I3 & p ^ `pOJQJo(hHlI3 'p^`pOJQJo(hHnJ3 (p^`pOJQJo(hHuJ3 ^`OJQJo(hH$K3 !p^`pOJQJo(hHnK3 "@p@^@`pOJQJo(hHuK3 #p^`pOJQJo(hHlhL3 $` p` ^` `pOJQJo(hHnL3 % p ^ `pOJQJo(hHu@M3 & p ^ `pOJQJo(hHlM3 'p^`pOJQJo(hHnN3 (p^`pOJQJo(hHuN3 ^`OJQJo(hH= s G)!lN$|$N;)-?.@15<MB?D5lHJJ NkDP8fWDtZiwl\G_ aHDdCeImBXo-b\o/Ws#|[w!R '2L\ d :Q8tKR'$\z 1?9;kpH "#(}# I%b&&d'(V^)i*+-+>,%X-1f3^3 406e!7XT8::6:z:<af<CC EHVK{KXLVZLIN]nN,P PQ7S U]VWWMvY\^td^T'a"b Leqfef)h7ajvjWkqkIn]qE rxu#vYwww3z|!J}]}6 1=Fp hsuv*L=`j862ER8wXM%V~?U5}ITt9b4'%*x6U?px[xK~N#"F!N_x355Qfl%9.1llP Ggj-t[zC[~1 Y.CAp*l>#\dJ-_vw[/=BdJE}`\C-6eAEI7 2!3!p!"6"p"?###$b$$$$$E%~%%%&'b(((H))**++,a,E--.8..e// 00611J2223q3394|44b556l66w77 88\9:]::U;;|<<4==o>>+???@@AAB\BCC DDE FqFFFaGGHZHIcII}JJSKK}LL5MMMPNNyOPPPWQ=R6SSTpTT7UU!VaVV WWWWiXX8YsYYaZZZ/[O[[[[\\]^~__K``aqaaa(bnbbbUccd+eee]ffQgghh-ihiijj{k-mOn~nooqqrssstuuLvvww"xxiysyyGzzz{]{{{o|w}K~~~$jˁLwp܄Fم9;>l;X9܊7P#bϐ!Bߓ A~ٕ֔JI2h7$o<ˡk΢Yftvިb-4}p82zN~;ǰFm?y$10n@*F&Q_2(btkXx N   4   g)_\ ( 1[;-kL^y qv@/  !/"r"#c##U$$%&&v'5(l()M)d)@22ā?e22<< < z zzII[[BB B!B"B#B)B*B+R,R-R.R0R123789:=>5@5ACDEFGHIJ~L~M~N~O~PTTTU W X Z [ \cdlmstvwkykz{|~΀΁qquuuѱѲѳѵѶѷGGGGppssOOObbbbbb b b b b !#$%&u(u)u*C,C-C/C0C2C3C4C6n7n9n;n<n=n>n@nABCDEFHIKLMOQSTU-W-X-Z-[^_`abcefghijlmop"r"s"vwy{|}ЄЅІЇЈЌЍЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫЬЭЮЯабвгдезиrrr::ppppubpp p ppppp,@ppp8@p p"pH@p&pP@p*p,p.p0p2ph@p6pp@p<p>p@pBp@pJpLp@pPpRp@pVp@pZp@p`pbpdp@pjp@pnp@prptpvpxpzp@p~p@ppppp@pp @pp(@ppp4@ppH@pp\@ppl@ppt@pp|@pp@pp@pp@pp@ppp@pp@pp@ppppp@ppp@pppppppp p p@ppp(@ppp4@ppp@@p"pH@p0p2p6pp@p:p<p>p@p@pDpFpJpLpPpRpTpVpXpZp\p^p@pbp@pfp@pjp@pnppprptpxpzp@p~pp@ppp@pp@ppp,@ppD@ppppp\@ppppt@pp@ppppp@ppppp@ppp@pp@pp@pppp@pp@pppppp@ppp@p p@pp$@ppp0@ppp"p$pL@p(pT@p,p\@p2p4pl@p8p:px@p>p@pBpDpFpHpLp@pPp@pTpVp@p^pbpfphp@plpnprp@pvpxpzp|p@pp@ppppppppppppp<@ppppppppppppl@pppppppppppppppp@pppppp@pp@pp@pppppp@ppp@pp@p ppp$@pp,@pppp<@pUnknownGz Times New Roman5Symbol3& z ArialK,Bookman Old StyleARZapfDingbats/ |i0д]Century SchoolbookCentury;|i0Batang/5  |i0t?& Arial BlackY MS SerifTimes New Romans  Times New Roman MT Extra BoldMaplePi5& z!TahomaA& Futura Md BTCFComic Sans MS?5 z Courier Newc&  Tw Cen MTLucida Sans Unicode9Dijkstra;Wingdings 1 ShAkQJu`pvEvE!"!%),.:;?]}  2 3 ! 0 0 0000 =]([\{  0 0 0000;[2dEǢ 3Q\K(? Le Park, Dong-GookPark, DongGookKfdR.b.r. i Z'`IZ'<                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; Oh+'0x  4 @ LX`hp ssPark, Dong-Gookarkark Normal.dotGPark, DongGook96kMicrosoft Word 10.0@u@pt}@OvE՜.+,0 hp  Korea Telecomo{    !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FmData .1TableZWordDocument2SummaryInformation(DocumentSummaryInformation8CompObjf  FMicrosoft Word MSWordDocWord.Document.89q