Search results for "Crypt"
showing 10 items of 1111 documents
Fingerprint Traits and RSA Algorithm Fusion Technique
2012
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…
Homomorphic Approach to RF-Inhomogeneity Removal Based on Gabor Filter
2007
In this paper a bias correction algorithm for magnetic resonance imaging (MRI) is presented. The magnetic resonance (MR) images affected by this artifact, also called RF-inhomogeneity, exhibit irregular spatial brightness variations caused by magnetic field inhomogeneity. Here we present an original algorithm based on E2D - HUM, already proposed by some of the authors, where a modified Gabor filter is introduced in the elaboration chain to provide directional capabilities to suppress the artifact. The process of restoration doesn't care about the structure of the image and it has been applied to MR images of different parts of body like knee, abdomen, pelvis and brain. A comparison with oth…
Modular Middleware for Gestural Data and Devices Management
2017
In the last few years, the use of gestural data has become a key enabler for human-computer interaction (HCI) applications. The growing diffusion of low-cost acquisition devices has thus led to the development of a class of middleware aimed at ensuring a fast and easy integration of such devices within the actual HCI applications. The purpose of this paper is to present a modular middleware for gestural data and devices management. First, we describe a brief review of the state of the art of similar middleware. Then, we discuss the proposed architecture and the motivation behind its design choices. Finally, we present a use case aimed at demonstrating the potential uses as well as the limit…
SecureBallot: A secure open source e-Voting system
2021
Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…
A Hybrid Framework for Soft Real-Time WSN Simulation
2009
The design of a wireless sensor network is a chal- lenging task due to its intrinsically application-specific nature. Although a typical choice for testing such kind of networks requires devising ad-hoc testbeds, this is often impractical as it depends on expensive, and hard to maintain deployment of nodes. On the other hand, simulation is a valuable option, as long as the actual functioning conditions are reliably modeled, and carefully replicated. The present work describes a framework for supporting the user in early design and testing of a wireless sensor network with an augmented version of TOSSIM, the de-facto standard for simulators, that allows merging actual and virtual nodes seaml…
Multi-Platform Agent Systems with Dynamic Reputation Policy Management
2011
Open, distributed multi-platform agent systems require new management approaches for resources and data secure access. In this paper a Jade-S based multi-platform agent system implementing dynamic reputation policy management is proposed. The implemented extension deals with biometrics, X-Security, DES cryptography and agent reputation. With more details, the proposed reputation management system helps to assess the agent's behavior and reliability, in order to select trusted agents. This is made possible by the knowledge that agents are able to acquire, over time, and that allows them to choose the best solution using own intelligence in total autonomy.
Understanding the Environment through Wireless Sensor Networks
2007
This paper presents a new cognitive architecture for extracting meaningful, high-level information from the environment, starting from the raw data collected by a Wireless Sensor Network. The proposed framework is capable of building rich internal representation of the sensed environment by means of intelligent data processing and correlation. Furthermore, our approach aims at integrating the connectionist, data-driven model with the symbolic one, that uses a high-level knowledge about the domain to drive the environment interpretation. To this aim, the framework exploits the notion of conceptual spaces, adopting a conceptual layer between the subsymbolic one, that processes sensory data, a…
Agent-Oriented Software Patterns for Rapid and Affordable Robot Programming
2010
Robotic systems are often quite complex to develop: they are huge, heavily constrained from the nonfunctional point of view and they implement challenging algorithms. The lack of integrated methods with reuse approaches leads robotic developers to reinvent the wheel each time a new project starts. This paper proposes to reuse the experience done when building robotic applications, by catching it into design patterns. These represent a general mean for (i) reusing proved solutions increasing the final quality, (ii) communicating the knowledge about a domain and (iii) reducing the development time and effort. Despite of this generality, the proposed repository of patterns is specific for mult…
A MAS metamodel-driven approach to process fragments selection
2009
The construction of ad-hoc design processes is more and more required today. In this paper we present our approach for the construction of a new design process following the Situational Method Engineering paradigm. We mainly focus on the selection and assembly activities on the base of what we consider a key element in agent design processes: the MAS metamodel. The paper presents an algorithm establishing a priority order in the realization (instantiation) of MAS metamodel elements by the fragments that will compose the new process.
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance
2023
Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of security attacks. One of the most effective analysis techniques is differential cryptanalysis, whose aim is to study how variations in the input propagate on the output. In this work we address the modeling of differential attacks to block cipher algorithms by defining a Bayesian framework that allows a probabilistic estimation of the secret key. In order to prove the validity of the proposed approach, we present as case study a differential att…