Search results for "Cryptography"
showing 10 items of 657 documents
Analysis of a Station Black-Out transient in SMR by using the TRACE and RELAP5 code
2014
The present paper deals with the investigation of the evolution and consequences of a Station Black-Out (SBO) initiating event transient in the SPES3 facility [1]. This facility is an integral simulator of a small modular reactor being built at the SIET laboratories, in the framework of the R&D program on nuclear fission funded by the Italian Ministry of Economic Development and led by ENEA. The SBO transient will be simulated by using the RELAP5 and TRACE nodalizations of the SPES3 facility. Moreover, the analysis will contribute to study the differences on the code predictions considering the different modelling approach with one and/or three-dimensional components and to compare the capa…
Error and Uncertainty Analysis of the Residual Stresses Computed by Using the Hole Drilling Method
2010
: The hole-drilling method is one of the most used techniques for the experimental analysis of the residual stresses in mechanical components. For both through-thickness uniform and non-uniform residual stress distributions, its application is standardised by the ASTM E837-08. In accordance with the ASTM limitations, the analysis of uniform residual stresses, to which the present work deals with, leads in general to results with a maximum bias of about 10%. Unfortunately, in general the user does not have appropriate procedures to estimate the actual stress error; consequently, if one or more of the experimental influence parameters fall out of the corresponding standard limitations, the c…
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
2009
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
2009
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…
Deep uncertainty in humanitarian logistics operations: decision-making challenges in responding to large-scale natural disasters
2019
Humanitarian logistics operations perform challenging tasks while responding to large-scale natural disasters. Decision makers at different stages of humanitarian operations exploit numerous problem-specific decision-making models or tools. When synchronising the outputs (decisions) from models into a unified solution, the situation becomes critical because of the lack of consensus on objectives and the availability of model alternatives with uncertainty in the models' key parameters and evaluation of the models' alternative outcomes. Thus, the operational environment becomes complex to respond urgently to humanitarian needs and makes the situation deeply uncertain. In this paper, we inspec…
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…
An interpolation-based data fusion scheme for enhancing the resolution of thermal image sequences
2014
In several human activities, such as agriculture and forest management, the monitoring of radiometric surface temperature is key. In particular both high spatial resolution and high acquisition rate are desirable but, due to the hardware limitations, these two characteristics are not met by the same sensor. The fusion of remotely sensed data acquired by sensors with different spatial and temporal resolution is a profitable choice to face this issue. When the real-time requirement is relaxed, the data sequence can be processed as a whole, allowing to improve the final result. Within this framework, we propose a novel batch sharpening strategy, relying on interpolation, data fusion and Bayesi…
Multiplexing of encrypted data using fractal masks
2012
In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.
Collaboration and Decision Making in Crisis Situations
2016
[EN] Emergencies are critical situations that demand immediate action to avoid adverse consequences to life and property. Recent events around the world highlight the importance of the theme. A key challenge in Emergency Management is decision-making under time pressure, with an overload of unconfirmed, uncertain and conflicting information, including the management of many people, with distinct and possibly fluid roles, in different places. Collaboration in these settings is an interesting element, since emergency response generally involves multiple agencies and the public, which, having different views, protocols and priorities, must act in concert to handle the situation. In addition, a…
Different ways of measuring performance in the service industries: application in Spanish small and medium-sized hotels
2008
There is no suitable unit of analysis for explaining the profitability and competitiveness of the company, as typically pointed out in the debate between the disciplines of economics and management. After a study of the possible variables, we opted for those of minimum cost output and productivity, using these two measurements to analyse their application to Spanish hotels. The subsequent objective was to attempt to identify general strategies that could be applied to any SME within service industries. In situations where time and resources are not readily available to create action plans for each of the different types of SME, there is a need for incentives that can be applied to the creat…