Search results for "Crypt"
showing 10 items of 1111 documents
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Transcriptional regulation of COX-2: a key mechanism in the pathogenesis of nasal polyposis in aspirin-sensitive asthmatics?
2003
Seizure in isolated brain cryptococcoma: Case report and review of the literature
2021
Background: Central nervous system (CNS) cryptococcosis is an invasive fungal infection predominantly seen among immunosuppressed patients causing meningitis or meningoencephalitis. Rarely, cryptococcosis can affect immunologically competent hosts with the formation of localized CNS granulomatous reaction, known as cryptococcoma. Common symptoms of CNS cryptococcoma are headaches, consciousness or mental changes, focal deficits, and cranial nerve dysfunction. Rarely, seizures are the only presenting symptom. Case Description: We report the case of an immunocompetent patient with a solitary CNS cryptococcoma presenting with a long history of non-responsive generalized seizure who has been s…
An optimal code for patient identifiers.
2004
How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.
Key challenges for Latvian teachers in mainstream schools: a basis for preparing teachers for inclusion
2010
This paper analyses current research in Latvia to identify key issues related to inclusive education, special education and social pedagogy. A review of Latvian literature since 2004 was undertaken to determine what is known about special and inclusive education, how it is reflected in various research papers and how it related to the current situation in schools. Key findings suggest that teachers need to be better informed about the potential of inclusion. They need to be prepared to teach children with diverse educational needs in a changing educational landscape. Teacher education for inclusion is identified as a 21st-century priority in Latvia.
Correlation of oscillatory behaviour in Matlab using wavelets
2014
Here we present a novel computational signal processing approach for comparing two signals of equal length and sampling rate, suitable for application across widely varying areas within the geosciences. By performing a continuous wavelet transform (CWT) followed by Spearman?s rank correlation coefficient analysis, a graphical depiction of links between periodicities present in the two signals is generated via two or three dimensional images. In comparison with alternate approaches, e.g., wavelet coherence, this technique is simpler to implement and provides far clearer visual identification of the inter-series relationships. In particular, we report on a Matlab? code which executes this tec…
Teaching GP to program like a human software developer
2019
Program synthesis is one of the relevant applications of GP with a strong impact on new fields such as genetic improvement. In order for synthesized code to be used in real-world software, the structure of the programs created by GP must be maintainable. We can teach GP how real-world software is built by learning the relevant properties of mined human-coded software - which can be easily accessed through repository hosting services such as GitHub. So combining program synthesis and repository mining is a logical step. In this paper, we analyze if GP can write programs with properties similar to code produced by human software developers. First, we compare the structure of functions generat…