Search results for "Cryptography"
showing 10 items of 657 documents
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
2021
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …
Content Code Blurring: A New Approach to Content Extraction
2008
Most HTML documents on the world wide web contain far more than the article or text which forms their main content. Navigation menus, functional and design elements or commercial banners are typical examples of additional contents. Content extraction is the process of identifying the main content and/or removing the additional contents. We introduce content code blurring, a novel content extraction algorithm. As the main text content is typically a long, homogeneously formatted region in a web document, the aim is to identify exactly these regions in an iterative process. Comparing its performance with existing content extraction solutions we show thatfor most documents content code blurrin…
Towards semantic-based RSS merging
2009
Merging information can be of key importance in several XML-based applications. For instance, merging the RSS news from different sources and providers can be beneficial for end-users (journalists, economists, etc.) in various scenarios. In this work, we address this issue and mainly explore the relatedness relationships between RSS entities/ elements. To validate our approach, we also provide a set of experimental tests showing satisfactory results. © 2009 Springer-Verlag Berlin Heidelberg
Identifying lifetime as one of the key parameters responsible for the low brightness of lanthanide-based OLEDs.
2021
OLEDs based on lanthanide complexes have decisive optical advantages but are hampered by low brightness. Despite the efforts to optimize several parameters such as quantum yield and charge carrier mobility, there seems to be another key parameter that hinders their performances. Experimental data are therefore collected for mixed-ligand europium complexes with bathophenanthroline and different classes of anionic ligands and screened to identify the key parameter responsible for this situation, which turns out to be the long lifetime of their excited states. A broad literature search supports this conclusion, showing that lanthanide complexes are inferior to other classes of OLED emitters of…
Antecedents of the Barriers Toward the Adoption of Unified Payment Interface
2020
This study examines the influence of factors related to consumer resistance on the intention to continue using the Unified Payment Interface (UPI) for electronic payments. UPI facilitates advanced, peer-to-peer, immediate payment with seamless interoperability among banks in India. The study extends the innovation resistance theory by including two behavioral measures - privacy concerns and visibility - and two moderators - security concerns and word of mouth (WOM). It used cross-sectional data collected from 714 UPI users aged between 16 and 55 years to test the proposed research model. The findings suggest that privacy concerns and usage barrier are the two crucial factors to be addressed…
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
2013
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…
Detection and visualization of physical knots in macromolecules
2010
Abstract This manuscript provides a pedagogical introduction on how to determine and visualize simple physical knots occurring in polymers, proteins and DNA. We explain how the Alexander polynomial is computed and implemented in a simulation code, and how the structure can be simplified beforehand to save computer time. The concept of knottedness can also be extended in a statistical framework to chains which are not closed. The latter is exemplified by comparing statistics of knots in open random walks and closed random loops.
A knowledge-based exploratory framework to study quality of Italian mobile telecommunication services
2017
A novel two-step knowledge-based exploratory framework is proposed in this paper for studying quality of Italian Mobile Telecommunication Services (MTSs). Particularly, the Delphi technique is initially considered to finalize an overall quality structure of MTSs features, indicators and drivers, herein described on the basis of a comprehensive review of the fundamental references for the field, and also to select the key elements with reference to the Italian context. At the second step, selected key elements are prioritized via the Analytic Hierarchical Process (AHP) method according to viewpoints of the fundamental stakeholders for the sector. Furthermore, possible uncertainty and ambigui…
Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
2016
Integrated use of electronic health records (EHRs) seem both promising and necessary in improving the quality and delivery of health services. This allows healthcare providers access to information they require to provide rapid patient care. Of course, when sensitive information is shared among a group of people within or across organizations, enforceable security and privacy control over the information flow is a key aspect. In this study, an access control model for cooperative healthcare environments is presented. A work-based access control (WBAC) model is proposed by introducing the concept of team role and modifying the user-role assignment model from previous work. Verification indic…
APPROACHES TO IMPROVED INSTITUTIONAL MECHANISMS IN TRAINING LABOUR FORCE TO PROMOTE INNOVATION
2012
The paper deals with the approaches for satisfying the need for the training of modern labour force capable of implementing innovation. The focus of the research is the existing and potentially new institutional mechanisms for enhanced co-operation among the various key stakeholders. The authors’ assumption is that more co-operation between the higher education and research system on the one hand, and the vocational education system on the other hand, would have a beneficial influence on the overall labour force training at all levels to promote innovation. Therefore, the target group for the empirical study of the present research have been medium and high level public administrators in bo…