Search results for "Cryptography"
showing 10 items of 657 documents
Dynamics and Limits of Regulatory Privatization: Reorganizing audit oversight in Russia
2019
Accounting and auditing are often cited as key sites where business regulation has been privatized, globalized and neoliberalized. Yet, these sites have also undergone a legitimacy crisis in recent years, marked by a shift from self-regulation to increased public oversight. This paper investigates these developments by reference to the evolution of a public/private audit oversight regime (audit of the auditors) in Russia. We show how, in the early stages of post-Soviet reforms, old state-administered forms of financial oversight were replaced with market-oriented arrangements (peer reviews) offered by newly founded private professional accountancy associations as a service to their members.…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
Transcriptional regulation of COX-2: a key mechanism in the pathogenesis of nasal polyposis in aspirin-sensitive asthmatics?
2003
An optimal code for patient identifiers.
2004
How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.
Key challenges for Latvian teachers in mainstream schools: a basis for preparing teachers for inclusion
2010
This paper analyses current research in Latvia to identify key issues related to inclusive education, special education and social pedagogy. A review of Latvian literature since 2004 was undertaken to determine what is known about special and inclusive education, how it is reflected in various research papers and how it related to the current situation in schools. Key findings suggest that teachers need to be better informed about the potential of inclusion. They need to be prepared to teach children with diverse educational needs in a changing educational landscape. Teacher education for inclusion is identified as a 21st-century priority in Latvia.
Correlation of oscillatory behaviour in Matlab using wavelets
2014
Here we present a novel computational signal processing approach for comparing two signals of equal length and sampling rate, suitable for application across widely varying areas within the geosciences. By performing a continuous wavelet transform (CWT) followed by Spearman?s rank correlation coefficient analysis, a graphical depiction of links between periodicities present in the two signals is generated via two or three dimensional images. In comparison with alternate approaches, e.g., wavelet coherence, this technique is simpler to implement and provides far clearer visual identification of the inter-series relationships. In particular, we report on a Matlab? code which executes this tec…
Teaching GP to program like a human software developer
2019
Program synthesis is one of the relevant applications of GP with a strong impact on new fields such as genetic improvement. In order for synthesized code to be used in real-world software, the structure of the programs created by GP must be maintainable. We can teach GP how real-world software is built by learning the relevant properties of mined human-coded software - which can be easily accessed through repository hosting services such as GitHub. So combining program synthesis and repository mining is a logical step. In this paper, we analyze if GP can write programs with properties similar to code produced by human software developers. First, we compare the structure of functions generat…
Breakdown of the Kratky-Porod Wormlike Chain Model for Semiflexible Polymers in Two Dimensions
2011
By large-scale Monte Carlo simulations of semiflexible polymers in $d=2$ dimensions the applicability of the Kratky-Porod model is tested. This model is widely used as "standard model" for describing conformations and force versus extension curves of stiff polymers. It is shown that semiflexible polymers in $d=2$ show a crossover from hard rods to self-avoiding walks, the intermediate Gaussian regime (implied by the Kratky-Porod model) is completely absent. Hence the latter can also describe force versus extension curves only if the contour length is only a few times larger than the persistence length. Consequences for experiments on biopolymers at interfaces are briefly discussed.
On-chip quantum frequency combs for complex photon state generation (Conference Presentation)
2020
A key challenge in today’s quantum science is the realization of large-scale complex non-classical systems to enable e.g. ultra-secure communications, quantum-enhanced measurements, and computations faster than classical approaches. Optical frequency combs represent a powerful approach towards this, since they provide a very high number of temporal and frequency modes which can result in large-scale quantum systems. Here, we discuss the recent progress on the realization of integrated quantum frequency combs and reveal how their use in combination with on-chip and fiber-optic telecommunications components can enable quantum state control with new functionalities, yielding unprecedented capa…