Search results for "Authentic"

showing 10 items of 203 documents

GPRS Security for Smart Meters

2013

Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

GPRSComputer science[SHS.INFO]Humanities and Social Sciences/Library and information sciences02 engineering and technology[INFO] Computer Science [cs]Encryption[SHS.INFO] Humanities and Social Sciences/Library and information sciencesGPRS core networkAMI0202 electrical engineering electronic engineering information engineeringWirelessMetering mode[INFO]Computer Science [cs]General Packet Radio ServiceSmartgridMobile network operatorAuthenticationbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsSmart gridSecuritybusinessSmart MeteringComputer network
researchProduct

Trace Element Concentration and Stable Isotope Ratio Analysis in Blueberries and Bilberries: A Tool for Quality and Authenticity Control

2021

Vaccinium genus berries—wild bilberries (Vaccinium myrtillus L.) and cultivated highbush blueberries (Vaccinium corymbosum L.)—are consumed worldwide, and their consumption has a trend of stable increase. Thus, considering their wide use in ethnomedicine, for juice and jam production, as functional food, as well as their use in preparations of extracts which have application potential in pharmaceutical and cosmetics industries, studies regarding the composition of these berries are of special importance. The aim of this study is to characterise the elemental and isotopic composition, as well as variation in element concentration in bilberries gathered from different sites in Northern Europe…

Health (social science)Bilberrytrace elementsPlant ScienceVaccinium myrtilluslcsh:Chemical technologyHealth Professions (miscellaneous)MicrobiologyArticleauthenticityFunctional foodlight stable isotope ratioVDP::Mathematics and natural science: 400::Zoology and botany: 480pollutionlcsh:TP1-1185Food scienceIsotope-ratio mass spectrometryheavy metalsblueberriesbiologyChemistryStable isotope ratioTrace elementbiology.organism_classificationComposition (visual arts)bilberriesFood ScienceVacciniumVDP::Matematikk og Naturvitenskap: 400::Zoologiske og botaniske fag: 480Foods
researchProduct

QoS Mechanisms for IEEE 802.11 Wireless LANs

2004

Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…

IEEE 802.11uWi-Fi arrayComputer scienceInter-Access Point ProtocolMobile computinglaw.inventionIEEE 802.11lawWireless lanInternet ProtocolWirelessFixed wirelessIEEE 802.11sbusiness.industryWireless networkQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Multimedia ExtensionsTelecommunications networkWLAN Authentication and Privacy InfrastructureWireless site surveyThe InternetIEEE 802.11e-2005businessTelecommunicationsMobile deviceNeuRFonComputer network
researchProduct

Basic Chemometric Tools

2013

Abstract The authentication of protected designation of origin and other protected geographical indications for foods involves the need for a deep knowledge of these kinds of samples and the correct identification of appropriate markers that are suitable to be used for authentication purposes. For this, significance tests must be developed and applied to provide evidence in a fast and accurate way; from this, it seems clear that advances in analytical tools, to obtain data regarding food chemical composition, and chemometric data treatments must be continued to provide to the users powerful identification methodologies. In this sense, the objective must be to differentiate between foods pro…

Identification (information)business.industryComputer sciencePrincipal component analysisDeep knowledgeArtificial intelligencebusinessMachine learningcomputer.software_genrecomputerAuthentication (law)Hierarchical clustering
researchProduct

The new social mouvements : the case of the Bulgarian green movement

2015

This study examines the Green Movement in Bulgaria (1987-2014) as a typical and specific example of the New Social Movements. It focuses on the interconnection between environmentalism, politics and participation. We present the movement along with its evolution and analyse it on three levels: macro (through its relation to the most important contemporary issues, phenomena and processes); meso (in the national context during the past three generations); and micro (through the prism of individuals and their experience). Our general approach is interdisciplinary, combining qualitative, comparative and quantitative methods. Bulgaria’s green movement is a citizen and political movement of a new…

IndividuNew CultureNouvelle cultureAuthentiqueNouvelle politiqueNew Social Movements[SHS.DROIT] Humanities and Social Sciences/LawEngagement citoyenCitizen EngagementIndividualDemocracyNouveaux mouvements sociauxDémocratieActeurNew PoliticsGreen MovementsBulgarieMouvements écologiquesActorBulgariaAuthentic
researchProduct

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

How to measure students’ innovation competences in higher education : Evaluation of an assessment tool in authentic learning environments

2018

Abstract In all sectors of the economy, the importance of innovation is underlined. Although education plays a central role in the development of human innovation skills, several studies suggest that higher education institutions cannot fulfill these demands. In such, there is a need to update pedagogical practices and develop assessment tools to measure and develop a person’s innovation capacity. The aim of this study is to test and evaluate the functioning of the earlier developed assessment tool to measure students’ innovation competences in the authentic learning environments of Finnish higher education institutions. The electronic self-assessment questionnaire was distributed to studen…

Knowledge managementHigher educationarviointimenetelmätmedia_common.quotation_subjectinnovointikykyEducation0502 economics and businessComputingMilieux_COMPUTERSANDEDUCATIONinnovation competenceSystems thinkingta516Competence (human resources)Curriculummedia_commonvalidationTeamworkGoal orientationbusiness.industryEconomic sector05 social sciences050301 educationinnovaatiotAuthentic learninghigher educationkorkea-asteen koulutusassessment toolbusinessPsychology0503 educationarviointi050203 business & managementStudies in Educational Evaluation
researchProduct

Detection of archaeological forgeries of Iberian lead plates using nanoelectrochemical techniques. The lot of fake plates from Bugarra (Spain)

2014

Identification of forgeries is of considerable interest in studies of archaeological signariums and written Iberian artifacts, elements of capital importance for the knowledge of that culture, because there are many Iberian inscribed lead plate counterfeits circulating in the market and among many museum funds. A case study of identification of forgeries of archaeological lead using voltammetry of microparticles (VMP) and scanning electrochemical microscopy (SECM), aided by conventional optical microscopy and scanning electron microscopy (SEM/EDX) is described. The electrochemical methods are essentially non-invasive so can be applied to samples of nanoscopic size. Application to the authen…

Lead inscriptions IberianScanning electrochemical microscopyVoltammetry of microparticlesArchaeologyPalaeographyPathology and Forensic MedicineScanning electrochemical microscopyLead plateArchaeologyPINTURALawGeologyHeritage authentication
researchProduct