Filters








37 Hits in 7.5 sec

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
Traditionally, this trend has been primarily seen as a serious risk for cryptography; however, a positive aspect of quantum technology should also be stressed.  ...  Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones  ...  The authors at first provide a fuzzy extractor that can correct O(m) errors in polynomial time from a biometric source.  ... 
arXiv:2005.04344v2 fatcat:jstlhwebznfadf5g2zdri4sb6i

A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks

Lianghong Zhu, Huaikun Xiang, Kai Zhang
2021 Symmetry  
In order to solve these shortcomings, we propose a new lightweight and anonymous three-factor authentication scheme based on symmetric cryptographic primitives for WSNs.  ...  For these reasons, research on efficient and secure real-time authentication and key agreement protocols based on the characteristics of WSNs has gradually attracted the attention of academics.  ...  In these application environments, many scattered users, various randomly distributed sensor nodes, and one or more relatively powerful gateway nodes form a powerful network system.  ... 
doi:10.3390/sym14010046 fatcat:tpkpctdjmzagzp6dbwrt3qdmlu

Preserving Privacy in Speaker and Speech Characterisation

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad (+11 others)
2019 Computer Speech and Language  
with a legal perspective on privacy preservation in the case of speech data.  ...  Speech recordings are a rich source of personal, sensitive data that can be used to support a plethora of diverse applications, from health profiling to biometric recognition.  ...  within the German National Research Center for Applied Cybersecurity (www.crisp-da.de); the BioMobile II project (no. 518/16-30); the DFG as part of project E4 within the CRC 1119 CROSSING and project A.1  ... 
doi:10.1016/j.csl.2019.06.001 fatcat:lgq6bz2y5zepvfbrfznhboplha

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
Indeed, we believe that the protection of wireless networks now requires more attention and a more systematic a priori approach.  ...  Due to the constant evolution of the field, one of the major challenges of writing such a book is ensuring that it will have a reasonably long shelf life (and that the material learned from this book has  ...  protocols for behavior enforcement was very helpful for Chapters 2 and 12; SrdjanČapkun and MarioČagalj, whose research shaped significantly the material of Chapter 5; Mario again, as his research was also a  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

Performance-Aware Refactoring of Cloud-Based Big Data Applications

Chen Li, Giuliano Casale
2017 2017 International Conference on Computational Science and Computational Intelligence (CSCI)  
The second step is to utilize parallel processors to calculate a hierarchal cluster of these n items based on this matrix. We have implemented our algorithm and have found it to be scalable.  ...  New Technologies Addressing Independence, Social Participation and Wellness for Older People Domicile in Residentinal Homes Joan Cahill, Sean Mc Loughlin, Delaine Blazek Centre for Innovative Human Systems  ...  It also specifies its significance and the errors that can highly affect the efficiency and effectiveness of a biometric authentication system.  ... 
doi:10.1109/csci.2017.264 fatcat:lq7gvjk2pzarllwdvrfw2g6xdm

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
Since only one key is shared among all users, each revocation requires a new key to be distributed to the remaining users, which causes a high revocation overhead.  ...  In other schemes, each user might have its own key, which makes user revocation easier and more efficient. Research challenges/tradeoffs.  ...  Fuzzy search using locality sensitive hashing. Adjedj et al. [2009] (ABC + ) propose a fuzzy search scheme for biometric identification.  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

War at the Background of Europe: The Crisis of Mali

Besenyő János
2018 Figshare  
Many people think that by doing so, France is trying to prove itself a great power and able to intervene on the world political stage according to its own diplomatic interest and being a force to contend  ...  Fueled by the fear of a greater and bloodier conflict and its overspill, limited military operations began.  ...  (Nagy, Karasszon, 2008) Unexploited opportunities result from the fact that aid economies do not have deep rooted institutions; therefore, an institutional system and virtual economic zones based on the  ... 
doi:10.6084/m9.figshare.7015283.v1 fatcat:dcgz7gzczff6tnyse3gmu2dz6i

Digital Watermarking for Digital Rights Management [chapter]

Farid Ahmed, Cecilia Gomes
Handbook of Research on Modern Systems Analysis and Design Technologies and Applications  
contents has become an increasingly challenging task, leading to a contentious area called digital rights management (DRM).  ...  Consequently, maintaining the quality of service of the applications and the rights of the content owner as well as enforcing a viable business model among the producer, consumer, and distributor of digital  ...  Cryptographic attacks on key-based watermarking systems are also possible.  ... 
doi:10.4018/9781599048871.ch027 fatcat:vqikvrms6ngvjcejtn6zra3siu

Digital Watermarking for Digital Rights Management [chapter]

Farid Ahmed, Cecilia Gomes
Handbook of Research on Modern Systems Analysis and Design Technologies and Applications  
contents has become an increasingly challenging task, leading to a contentious area called digital rights management (DRM).  ...  Consequently, maintaining the quality of service of the applications and the rights of the content owner as well as enforcing a viable business model among the producer, consumer, and distributor of digital  ...  Cryptographic attacks on key-based watermarking systems are also possible.  ... 
doi:10.4018/978-1-59904-887-1.ch027 fatcat:lj4bk4elkvc6zhpthseqgc7oeu

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
(R 19 29,32,33) rfi AOL's Scunthorpe saga: risks of string-based censorship (S 21 5:17, R 18 07-08); more on AOL filtering of Internet e-mail (R 17 65, 18 18,41,42,44,46,48) fi The "finger" command and  ...  Force computer-based test (R 19 71) more on GPS jamming/spoofing: British Airways flight lost all three GPS systems while French military was testing jammers; Continental DC-10 lost all GPS signals  ...  (S 17 1) -Risk Management: Books by Brian Wynne, Lorraine Daston noted (S 18 2:8) + IEC TC4 WG3 International Standard on industrial machines safety (S 16 3) + NewSpeak, a safer programming language (S  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
(R 19 29,32,33) rfi AOL's Scunthorpe saga: risks of string-based censorship (S 21 5:17, R 18 07-08); more on AOL filtering of Internet e-mail (R 17 65, 18 18,41,42,44,46,48) fi The "finger" command and  ...  Force computer-based test (R 19 71) more on GPS jamming/spoofing: British Airways flight lost all three GPS systems while French military was testing jammers; Continental DC-10 lost all GPS signals  ...  (S 17 1) -Risk Management: Books by Brian Wynne, Lorraine Daston noted (S 18 2:8) + IEC TC4 WG3 International Standard on industrial machines safety (S 16 3) + NewSpeak, a safer programming language (S  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
(R 19 29,32,33) rfi AOL's Scunthorpe saga: risks of string-based censorship (S 21 5:17, R 18 07-08); more on AOL filtering of Internet e-mail (R 17 65, 18 18,41,42,44,46,48) fi The "finger" command and  ...  Force computer-based test (R 19 71) more on GPS jamming/spoofing: British Airways flight lost all three GPS systems while French military was testing jammers; Continental DC-10 lost all GPS signals  ...  (S 17 1) -Risk Management: Books by Brian Wynne, Lorraine Daston noted (S 18 2:8) + IEC TC4 WG3 International Standard on industrial machines safety (S 16 3) + NewSpeak, a safer programming language (S  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Reliability Inversion: A Cautionary Tale

Behrooz Parhami
2020 Computer  
Generally, one cannot say that a system is always more reliable than another one. One system may be more reliable for short mission times, while another fares better for long mission durations.  ...  We see in Figure 1 that even though System A is more reliable than System B (if we somehow knew the actual reliabilities), the model-based lower bounds ascribe a higher reliability to System B.  ...  More than a dozen scholarships of US$1,000 and up are available, lasting one academic year (approximately nine months). Apply by 30 September 2020.  ... 
doi:10.1109/mc.2019.2958907 fatcat:xcaxq7gocbfy5iyv2ne7d6nwlu

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
It is based on a virtual password system.  ...  Proposed Continuous Biometric Authentication System There are several issues that threaten the security in biometric authentication systems.  ...  Since then many cryptographic schemes have been proposed based on CL-PKC.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2016 International Journal of Network Security   unpublished
The proposed protocol is based on chaotic maps to create a kind of signcryption method to transmit authenticated information and make the calculated consumption and communicating round restrict to an acceptable  ...  Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols.  ...  Acknowledgments This work is supported by the Project of The Research of License Plate Recognition System (No.2014j4100201).  ... 
fatcat:nivpmyymvvecpft6npkuhw7smi
« Previous Showing results 1 — 15 out of 37 results