Search results for "Crypt"
showing 10 items of 1111 documents
Exploiting Correlation between Body Gestures and Spoken Sentences for Real-time Emotion Recognition
2017
Humans communicate their affective states through different media, both verbal and non-verbal, often used at the same time. The knowledge of the emotional state plays a key role to provide personalized and context-related information and services. This is the main reason why several algorithms have been proposed in the last few years for the automatic emotion recognition. In this work we exploit the correlation between one's affective state and the simultaneous body expressions in terms of speech and gestures. Here we propose a system for real-time emotion recognition from gestures. In a first step, the system builds a trusted dataset of association pairs (motion data -> emotion pattern), a…
Secure random number generation in wireless sensor networks
2011
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …
Simulation and anticipation as tools for coordinating with the future
2013
A key goal in designing an artificial intelligence capable of performing complex tasks is a mechanism that allows it to efficiently choose appropriate and relevant actions in a variety of situations and contexts. Nowhere is this more obvious than in the case of building a general intelligence, where the contextual choice and application of actions must be done in the presence of large numbers of alternatives, both subtly and obviously distinct from each other. We present a framework for action selection based on the concurrent activity of multiple forward and inverse models. A key characteristic of the proposed system is the use of simulation to choose an action: the system continuously sim…
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications
2020
Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…
Bayesian System for Differential Cryptanalysis of DES
2014
AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.
A Structural Approach to Infer Recurrent Relations in Data
2014
Extracting knowledge from a great amount of collected data has been a key problem in Artificial Intelligence during the last decades. In this context, the word "knowledge" refers to the non trivial new relations not easily deducible from the observation of the data. Several approaches have been used to accomplish this task, ranging from statistical to structural methods, often heavily dependent on the particular problem of interest. In this work we propose a system for knowledge extraction that exploits the power of an ontology approach. Ontology is used to describe, organise and discover new knowledge. To show the effectiveness of our system in extracting and generalising the knowledge emb…
A TRNG Exploiting Multi-Source Physical Data
2010
In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…
Retargeting Framework Based on Monte-carlo Sampling
2015
Advance in image technology and proliferation of acquisition devices like smartphones, digital cameras, etc., made the display of digital images ubiquitous. Many displays exist in the market, spanning within a large variety of resolutions and shapes. Thus, displaying content optimizing the available number of pixels has become a very important issue in the multimedia community, and the image retargeting problem is being widely faced. In this work, we propose an image retargeting framework based on monte-carlo sampling. We operate the non-homogeneous resizing as the composition of several simple atomic resizing functions. The shape of such atomic operator can be chosen within a set of tested…
Investigating Proactive Search Support in Conversations
2018
Conversations among people involve solving disputes, building common ground, and reinforce mutual beliefs and assumptions. Conversations often require external information that can support these human activities. In this paper, we study how a spoken conversation can be supported by a proactive search agent that listens to the conversation, detects entities mentioned in the conversation, and proactively retrieves and presents information related to the conversation. A total of 24 participants (12 pairs) were involved in informal conversations, using either the proactive search agent or a control condition that did not support conversational analysis or proactive information retrieval. Data c…
Verso l'euro digitale: la moneta legale nell'epoca della digitalizzazione
2022
The essay aims to evaluate the potential repercussions of the introduction of the new central bank digital currencies and, in particular, of the digital euro ECB’s project, on the concept of legal money in the European and domestic legal system. In the era of crypto-currency and cash crisis, a reasoning is started on the relationship between public and private and market dimensions within the monetary institution.