Search results for "Crypt"

showing 10 items of 1111 documents

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Transcriptional regulation of COX-2: a key mechanism in the pathogenesis of nasal polyposis in aspirin-sensitive asthmatics?

2003

PathogenesisAspirinbusiness.industryMechanism (biology)ImmunologyImmunologyTranscriptional regulationKey (cryptography)Immunology and AllergyMedicinebusinessmedicine.drugAllergy
researchProduct

Seizure in isolated brain cryptococcoma: Case report and review of the literature

2021

Background: Central nervous system (CNS) cryptococcosis is an invasive fungal infection predominantly seen among immunosuppressed patients causing meningitis or meningoencephalitis. Rarely, cryptococcosis can affect immunologically competent hosts with the formation of localized CNS granulomatous reaction, known as cryptococcoma. Common symptoms of CNS cryptococcoma are headaches, consciousness or mental changes, focal deficits, and cranial nerve dysfunction. Rarely, seizures are the only presenting symptom. Case Description: We report the case of an immunocompetent patient with a solitary CNS cryptococcoma presenting with a long history of non-responsive generalized seizure who has been s…

Pathologymedicine.medical_specialtyCentral nervous systemCase ReportSeizure.03 medical and health sciences0302 clinical medicineCryptococcomaMedicine030212 general & internal medicineCranial nerve dysfunctionbusiness.industryMeningoencephalitisIsolated brainmedicine.diseaseSeizurePathophysiologymedicine.anatomical_structureCentral nervous systemCryptococcosisSurgeryNeurology (clinical)Headachesmedicine.symptombusinessMeningitis030217 neurology & neurosurgerySurgical Neurology International
researchProduct

An optimal code for patient identifiers.

2004

How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.

Patient Identification SystemsComputer scienceTransposition (telecommunications)Health Informaticscomputer.software_genreComputer Science ApplicationsIdentifierCode (cryptography)Data miningConstant-weight codeAlphabetError detection and correctionAlgorithmcomputerSoftwareAlgorithmsConfidentialityMathematicsComputer methods and programs in biomedicine
researchProduct

Key challenges for Latvian teachers in mainstream schools: a basis for preparing teachers for inclusion

2010

This paper analyses current research in Latvia to identify key issues related to inclusive education, special education and social pedagogy. A review of Latvian literature since 2004 was undertaken to determine what is known about special and inclusive education, how it is reflected in various research papers and how it related to the current situation in schools. Key findings suggest that teachers need to be better informed about the potential of inclusion. They need to be prepared to teach children with diverse educational needs in a changing educational landscape. Teacher education for inclusion is identified as a 21st-century priority in Latvia.

PedagogylanguageKey (cryptography)LatvianMainstreamSociologyKey issuesSpecial educationInclusion (education)language.human_languageTeacher educationEducationSocial pedagogyJournal of Research in Special Educational Needs
researchProduct

Correlation of oscillatory behaviour in Matlab using wavelets

2014

Here we present a novel computational signal processing approach for comparing two signals of equal length and sampling rate, suitable for application across widely varying areas within the geosciences. By performing a continuous wavelet transform (CWT) followed by Spearman?s rank correlation coefficient analysis, a graphical depiction of links between periodicities present in the two signals is generated via two or three dimensional images. In comparison with alternate approaches, e.g., wavelet coherence, this technique is simpler to implement and provides far clearer visual identification of the inter-series relationships. In particular, we report on a Matlab? code which executes this tec…

PeriodicityWavelet coherenceWaveletsMachine learningcomputer.software_genreSpearman's rank correlationCorrelationWaveletDe-noisingCode (cryptography)Computers in Earth SciencesMATLABContinuous wavelet transformRank correlationMathematicscomputer.programming_languageContinuous wavelet transformSignal processingbusiness.industryContinuous wavelet transform; De-noising; Oscillation; Periodicity; Spearman's rank correlation; WaveletsOscillationArtificial intelligencebusinessAlgorithmcomputerInformation SystemsComputers and Geosciences
researchProduct

Teaching GP to program like a human software developer

2019

Program synthesis is one of the relevant applications of GP with a strong impact on new fields such as genetic improvement. In order for synthesized code to be used in real-world software, the structure of the programs created by GP must be maintainable. We can teach GP how real-world software is built by learning the relevant properties of mined human-coded software - which can be easily accessed through repository hosting services such as GitHub. So combining program synthesis and repository mining is a logical step. In this paper, we analyze if GP can write programs with properties similar to code produced by human software developers. First, we compare the structure of functions generat…

Perplexitybusiness.industryProgramming languageComputer scienceInitializationGenetic programming0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesSoftware010201 computation theory & mathematicsGrammatical evolution0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processingLanguage modelbusinesscomputerProgram synthesisProceedings of the Genetic and Evolutionary Computation Conference
researchProduct