Search results for "Crypt"

showing 10 items of 1111 documents

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Neural networks for the diagnostics of gas turbine engines

1996

The paper describes the activities carried out for developing and testing Back Propagation Neural Networks (BPNN) for the gas turbine engine diagnostics. One of the aims of this study was to analyze the problems encountered during training using large number of patterns. Each pattern contains information about the engine thermodynamic behaviour when there is a fault in progress. Moreover the research studied different architectures of BPNN for testing their capability to recognize patterns even when information is noised. The results showed that it is possible to set-up and optimize suitable and robust Neural Networks useful for gas turbine diagnostics. The methods of Gas Path Analysis furn…

Back propagation neural networkGas turbinesEngineeringArtificial neural networkNeural computerbusiness.industryDiagonalControl engineeringEncryptionbusiness
researchProduct

Q-Chem 2.0: a high-performanceab initio electronic structure program package

2000

ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…

Basis (linear algebra)Computer programProgramming languageComputer sciencePrincipal (computer security)Theoretical modelsAb initioGeneral ChemistryElectronic structurecomputer.software_genreComputational scienceComputational MathematicsKey (cryptography)Density functional theorycomputerJournal of Computational Chemistry
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Predicting mobile apps spread: An epidemiological random network modeling approach

2017

[EN] The mobile applications business is a really big market, growing constantly. In app marketing, a key issue is to predict future app installations. The influence of the peers seems to be very relevant when downloading apps. Therefore, the study of the evolution of mobile apps spread may be approached using a proper network model that considers the influence of peers. Influence of peers and other social contagions have been successfully described using models of epidemiological type. Hence, in this paper we propose an epidemiological random network model with realistic parameters to predict the evolution of downloads of apps. With this model, we are able to predict the behavior of an app…

Behavior over timeRandom graph050103 clinical psychologyComputer scienceeducation05 social sciencesMobile appsMechanical engineeringEpidemiological random network050109 social psychologyComputer Graphics and Computer-Aided DesignData scienceRandom network modelTerm (time)UploadModeling and Simulationmental disordersKey (cryptography)0501 psychology and cognitive sciencesMobile app spreadPredictionMATEMATICA APLICADASoftwareNetwork modelSIMULATION
researchProduct

Decoding Children's Social Behavior

2013

We introduce a new problem domain for activity recognition: the analysis of children's social and communicative behaviors based on video and audio data. We specifically target interactions between children aged 1-2 years and an adult. Such interactions arise naturally in the diagnosis and treatment of developmental disorders such as autism. We introduce a new publicly-available dataset containing over 160 sessions of a 3-5 minute child-adult interaction. In each session, the adult examiner followed a semi-structured play interaction protocol which was designed to elicit a broad range of social behaviors. We identify the key technical challenges in analyzing these behaviors, and describe met…

Behavior Psychology Dataset Video analysis Speech Analysis AutismInter-action protocolsSocial and communicative behaviorInteraction protocol02 engineering and technologycomputer.software_genreAnnan data- och informationsvetenskapSession (web analytics)Activity recognitionTechnical challenges0202 electrical engineering electronic engineering information engineeringmedicineSocial behaviorAudio signal processingMultimediabusiness.industryDevelopmental disorders020207 software engineeringmedicine.diseaseSemi-structuredResearch questionsActivity recognitionProblem domainKey (cryptography)Autism020201 artificial intelligence & image processingArtificial intelligencePsychologybusinessOther Computer and Information SciencecomputerCognitive psychologySocial behavior2013 IEEE Conference on Computer Vision and Pattern Recognition
researchProduct

On Big Data: How should we make sense of them?

2020

The topic of Big Data is today extensively discussed, not only on the technical ground. This also depends on the fact that Big Data are frequently presented as allowing an epistemological paradigm shift in scientific research, which would be able to supersede the traditional hypothesis-driven method. In this piece, I critically scrutinize two key claims that are usually associated with this approach, namely, the fact that data speak for themselves, deflating the role of theories and models, and the primacy of correlation over causation. In so doing, I will also refer to a recent case history of data mining projects in the field of biomedicine, i.e. EXPOsOMICS. My intention is both to acknow…

Big DataValue (ethics)causalityMultidisciplinarydata-driven scienceComputer sciencebusiness.industryBig dataepistemologyopacity of algorithm.Data scienceend of theoryHistory and Philosophy of ScienceParadigm shiftKey (cryptography)CausationHeuristicsbusinessMètode Revista de difusió de la investigació
researchProduct

A new compact formulation for the discrete p-dispersion problem

2017

Abstract This paper addresses the discrete p -dispersion problem (PDP) which is about selecting  p facilities from a given set of candidates in such a way that the minimum distance between selected facilities is maximized. We propose a new compact formulation for this problem. In addition, we discuss two simple enhancements of the new formulation: Simple bounds on the optimal distance can be exploited to reduce the size and to increase the tightness of the model at a relatively low cost of additional computation time. Moreover, the new formulation can be further strengthened by adding valid inequalities. We present a computational study carried out over a set of large-scale test instances i…

Binary search algorithmMathematical optimization021103 operations researchInformation Systems and ManagementLine searchGeneral Computer Science0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchSolver01 natural sciencesIndustrial and Manufacturing EngineeringFacility location problemSet (abstract data type)010201 computation theory & mathematicsModeling and SimulationProgramming paradigmInteger programmingAlgorithmStandard model (cryptography)MathematicsEuropean Journal of Operational Research
researchProduct

Distribution and seasonal dynamics of Cryptomonads in Sicilian water bodies

2003

Several species with a relevant ecological importance belong to Cryptophyta. Nevertheless, species-level identification from microscopic observations is problematic, lacking recent taxonomic keys. In this study we report our observations on distribution and seasonal dynamics of Cryptomonads in 33 Sicilian water bodies, as well as the main taxonomical problems we encountered. Species of the genera Cryptomonas and Plagioselmis are the most common in the examined water bodies. Their biomass seasonal trends usually show a peak in late winter and early spring. In advanced spring, and also in summer, due to the higher grazing pressure, the Cryptomonads biomass reaches its lowest values. Moreover,…

Biomass (ecology)CryptomonasEcologyPhytoplanktonmedicinePlagioselmisCryptophytaBiologySeasonalitymedicine.diseaseBloombiology.organism_classificationGrazing pressure
researchProduct