Search results for "Cryptography"

showing 10 items of 657 documents

Analysis of a Station Black-Out transient in SMR by using the TRACE and RELAP5 code

2014

The present paper deals with the investigation of the evolution and consequences of a Station Black-Out (SBO) initiating event transient in the SPES3 facility [1]. This facility is an integral simulator of a small modular reactor being built at the SIET laboratories, in the framework of the R&D program on nuclear fission funded by the Italian Ministry of Economic Development and led by ENEA. The SBO transient will be simulated by using the RELAP5 and TRACE nodalizations of the SPES3 facility. Moreover, the analysis will contribute to study the differences on the code predictions considering the different modelling approach with one and/or three-dimensional components and to compare the capa…

HistoryEngineeringRELAP5business.industryEvent (computing)Nuclear engineeringNuclear fissionTRACESMRNuclear reactors -- Models -- ItalyComputer Science ApplicationsEducationSmall modular reactorNuclear fissionNuclear reactors -- Safety measuresCode (cryptography)Black outChristian ministryTransient (computer programming)businessSettore ING-IND/19 - Impianti NucleariSimulationTRACE (psycholinguistics)Journal of Physics: Conference Series
researchProduct

Error and Uncertainty Analysis of the Residual Stresses Computed by Using the Hole Drilling Method

2010

:  The hole-drilling method is one of the most used techniques for the experimental analysis of the residual stresses in mechanical components. For both through-thickness uniform and non-uniform residual stress distributions, its application is standardised by the ASTM E837-08. In accordance with the ASTM limitations, the analysis of uniform residual stresses, to which the present work deals with, leads in general to results with a maximum bias of about 10%. Unfortunately, in general the user does not have appropriate procedures to estimate the actual stress error; consequently, if one or more of the experimental influence parameters fall out of the corresponding standard limitations, the c…

Hole drilling methodEngineeringWork (thermodynamics)business.industryMechanical EngineeringStructural engineeringReliability engineeringStress (mechanics)Mechanics of MaterialsApproximation errorResidual stressCode (cryptography)MATLABbusinesscomputerUncertainty analysiscomputer.programming_languageStrain
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

2009

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

Homomorphic secret sharingbusiness.industryComputer scienceNode (networking)Distributed data storeHomomorphic encryptionCryptographybusinessEncryptionSecret sharingWireless sensor networkComputer network2009 2nd IFIP Wireless Days (WD)
researchProduct

Deep uncertainty in humanitarian logistics operations: decision-making challenges in responding to large-scale natural disasters

2019

Humanitarian logistics operations perform challenging tasks while responding to large-scale natural disasters. Decision makers at different stages of humanitarian operations exploit numerous problem-specific decision-making models or tools. When synchronising the outputs (decisions) from models into a unified solution, the situation becomes critical because of the lack of consensus on objectives and the availability of model alternatives with uncertainty in the models' key parameters and evaluation of the models' alternative outcomes. Thus, the operational environment becomes complex to respond urgently to humanitarian needs and makes the situation deeply uncertain. In this paper, we inspec…

Humanitarian LogisticsExploitEmergency managementComputer scienceProcess (engineering)business.industryStrategy and ManagementScale (chemistry)05 social sciences050301 educationRisk analysis (engineering)0502 economics and businessEmergency MedicineKey (cryptography)Robustness (economics)Natural disasterbusiness0503 education050203 business & managementInternational Journal of Emergency Management
researchProduct

Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…

2009

Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…

Identité du patient020205 medical informaticsEpidemiologyComputer scienceHash functionEncryptionCryptographyPatient identificationSécuritéDossier médical du patient02 engineering and technologyComputer securitycomputer.software_genreEncryptionPublic-key cryptography03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0302 clinical medicineAnonymized dataHashingChainage de données0202 electrical engineering electronic engineering information engineeringCryptographic hash functionDonnées anonymisées[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]030212 general & internal medicineChiffrementMulticenter studies[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]Secure Hash Algorithm[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industryUniversal hashingLinkageHachagePublic Health Environmental and Occupational Health16. Peace & justice3. Good health[SDV.SPEE] Life Sciences [q-bio]/Santé publique et épidémiologieEtudes multicentriquesSecurity[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologiebusinesscomputerPersonally identifiable information
researchProduct

An interpolation-based data fusion scheme for enhancing the resolution of thermal image sequences

2014

In several human activities, such as agriculture and forest management, the monitoring of radiometric surface temperature is key. In particular both high spatial resolution and high acquisition rate are desirable but, due to the hardware limitations, these two characteristics are not met by the same sensor. The fusion of remotely sensed data acquired by sensors with different spatial and temporal resolution is a profitable choice to face this issue. When the real-time requirement is relaxed, the data sequence can be processed as a whole, allowing to improve the final result. Within this framework, we propose a novel batch sharpening strategy, relying on interpolation, data fusion and Bayesi…

Image fusionIrrigation ManagementSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industrySettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaComputer Science Applications1707 Computer Vision and Pattern RecognitionSharpeningSensor fusionBayesian SmoothingThermal SharpeningMultitemporal AnalysiTemporal resolutionFace (geometry)Key (cryptography)Settore AGR/08 - Idraulica Agraria E Sistemazioni Idraulico-ForestaliComputer visionArtificial intelligencebusinessMultisensor Data FusionEarth and Planetary Sciences (all)Settore ICAR/06 - Topografia E CartografiaSub-pixel resolutionInterpolation2014 IEEE Geoscience and Remote Sensing Symposium
researchProduct

Multiplexing of encrypted data using fractal masks

2012

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.

ImaginationImage EncryptionSystemComputer sciencemedia_common.quotation_subjectComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransformPhysics::OpticsStorageEncryptionMultiplexingCrosstalkSearch engineOpticsFractalElectronic engineeringDomainComputer Science::Information TheoryComputer Science::Cryptography and Securitymedia_commonbusiness.industryAtomic and Molecular Physics and OpticsOptical encryptionFISICA APLICADAPhotorefractive crystalOptical EncryptionbusinessTelecommunications
researchProduct

Collaboration and Decision Making in Crisis Situations

2016

[EN] Emergencies are critical situations that demand immediate action to avoid adverse consequences to life and property. Recent events around the world highlight the importance of the theme. A key challenge in Emergency Management is decision-making under time pressure, with an overload of unconfirmed, uncertain and conflicting information, including the management of many people, with distinct and possibly fluid roles, in different places. Collaboration in these settings is an interesting element, since emergency response generally involves multiple agencies and the public, which, having different views, protocols and priorities, must act in concert to handle the situation. In addition, a…

ImprovisationKnowledge managementProperty (philosophy)Emergency managementImprovisationComputer sciencebusiness.industry05 social sciences02 engineering and technologyEmergency managementTime constraints0506 political scienceGroup decision-makingCollaborative decision makingRisk analysis (engineering)Action (philosophy)Multidisciplinary approach020204 information systems050602 political science & public administration0202 electrical engineering electronic engineering information engineeringKey (cryptography)Element (criminal law)businessLENGUAJES Y SISTEMAS INFORMATICOS
researchProduct

Different ways of measuring performance in the service industries: application in Spanish small and medium-sized hotels

2008

There is no suitable unit of analysis for explaining the profitability and competitiveness of the company, as typically pointed out in the debate between the disciplines of economics and management. After a study of the possible variables, we opted for those of minimum cost output and productivity, using these two measurements to analyse their application to Spanish hotels. The subsequent objective was to attempt to identify general strategies that could be applied to any SME within service industries. In situations where time and resources are not readily available to create action plans for each of the different types of SME, there is a need for incentives that can be applied to the creat…

Incentivebusiness.industryManagement of Technology and InnovationStrategy and ManagementKey (cryptography)Profitability indexBusinessPolitical policyMarketingTertiary sector of the economyHospitality industryProductivityUnit of analysisThe Service Industries Journal
researchProduct