Search results for "Cryptography"

showing 10 items of 657 documents

Dynamics and Limits of Regulatory Privatization: Reorganizing audit oversight in Russia

2019

Accounting and auditing are often cited as key sites where business regulation has been privatized, globalized and neoliberalized. Yet, these sites have also undergone a legitimacy crisis in recent years, marked by a shift from self-regulation to increased public oversight. This paper investigates these developments by reference to the evolution of a public/private audit oversight regime (audit of the auditors) in Russia. We show how, in the early stages of post-Soviet reforms, old state-administered forms of financial oversight were replaced with market-oriented arrangements (peer reviews) offered by newly founded private professional accountancy associations as a service to their members.…

Organizational Behavior and Human Resource Managementbusiness.industryStrategy and ManagementInstitutional changeinstitutional change05 social sciencesregulationAccounting050201 accountingAuditprivatizationRussiaPeer reviewVDP::Samfunnsvitenskap: 200::Økonomi: 210Dynamics (music)Management of Technology and Innovation0502 economics and businessKey (cryptography)Business/dk/atira/pure/subjectarea/asjc/1400/1408/dk/atira/pure/subjectarea/asjc/1400/1407audit oversight/dk/atira/pure/subjectarea/asjc/1400/1405050203 business & managementLegitimacy
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

Transcriptional regulation of COX-2: a key mechanism in the pathogenesis of nasal polyposis in aspirin-sensitive asthmatics?

2003

PathogenesisAspirinbusiness.industryMechanism (biology)ImmunologyImmunologyTranscriptional regulationKey (cryptography)Immunology and AllergyMedicinebusinessmedicine.drugAllergy
researchProduct

An optimal code for patient identifiers.

2004

How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.

Patient Identification SystemsComputer scienceTransposition (telecommunications)Health Informaticscomputer.software_genreComputer Science ApplicationsIdentifierCode (cryptography)Data miningConstant-weight codeAlphabetError detection and correctionAlgorithmcomputerSoftwareAlgorithmsConfidentialityMathematicsComputer methods and programs in biomedicine
researchProduct

Key challenges for Latvian teachers in mainstream schools: a basis for preparing teachers for inclusion

2010

This paper analyses current research in Latvia to identify key issues related to inclusive education, special education and social pedagogy. A review of Latvian literature since 2004 was undertaken to determine what is known about special and inclusive education, how it is reflected in various research papers and how it related to the current situation in schools. Key findings suggest that teachers need to be better informed about the potential of inclusion. They need to be prepared to teach children with diverse educational needs in a changing educational landscape. Teacher education for inclusion is identified as a 21st-century priority in Latvia.

PedagogylanguageKey (cryptography)LatvianMainstreamSociologyKey issuesSpecial educationInclusion (education)language.human_languageTeacher educationEducationSocial pedagogyJournal of Research in Special Educational Needs
researchProduct

Correlation of oscillatory behaviour in Matlab using wavelets

2014

Here we present a novel computational signal processing approach for comparing two signals of equal length and sampling rate, suitable for application across widely varying areas within the geosciences. By performing a continuous wavelet transform (CWT) followed by Spearman?s rank correlation coefficient analysis, a graphical depiction of links between periodicities present in the two signals is generated via two or three dimensional images. In comparison with alternate approaches, e.g., wavelet coherence, this technique is simpler to implement and provides far clearer visual identification of the inter-series relationships. In particular, we report on a Matlab? code which executes this tec…

PeriodicityWavelet coherenceWaveletsMachine learningcomputer.software_genreSpearman's rank correlationCorrelationWaveletDe-noisingCode (cryptography)Computers in Earth SciencesMATLABContinuous wavelet transformRank correlationMathematicscomputer.programming_languageContinuous wavelet transformSignal processingbusiness.industryContinuous wavelet transform; De-noising; Oscillation; Periodicity; Spearman's rank correlation; WaveletsOscillationArtificial intelligencebusinessAlgorithmcomputerInformation SystemsComputers and Geosciences
researchProduct

Teaching GP to program like a human software developer

2019

Program synthesis is one of the relevant applications of GP with a strong impact on new fields such as genetic improvement. In order for synthesized code to be used in real-world software, the structure of the programs created by GP must be maintainable. We can teach GP how real-world software is built by learning the relevant properties of mined human-coded software - which can be easily accessed through repository hosting services such as GitHub. So combining program synthesis and repository mining is a logical step. In this paper, we analyze if GP can write programs with properties similar to code produced by human software developers. First, we compare the structure of functions generat…

Perplexitybusiness.industryProgramming languageComputer scienceInitializationGenetic programming0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesSoftware010201 computation theory & mathematicsGrammatical evolution0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processingLanguage modelbusinesscomputerProgram synthesisProceedings of the Genetic and Evolutionary Computation Conference
researchProduct

Breakdown of the Kratky-Porod Wormlike Chain Model for Semiflexible Polymers in Two Dimensions

2011

By large-scale Monte Carlo simulations of semiflexible polymers in $d=2$ dimensions the applicability of the Kratky-Porod model is tested. This model is widely used as "standard model" for describing conformations and force versus extension curves of stiff polymers. It is shown that semiflexible polymers in $d=2$ show a crossover from hard rods to self-avoiding walks, the intermediate Gaussian regime (implied by the Kratky-Porod model) is completely absent. Hence the latter can also describe force versus extension curves only if the contour length is only a few times larger than the persistence length. Consequences for experiments on biopolymers at interfaces are briefly discussed.

Persistence lengthchemistry.chemical_classificationPhysicsQuantitative Biology::BiomoleculesChain modelGaussianMonte Carlo methodCrossoverGeneral Physics and AstronomyFOS: Physical sciencesPolymerCondensed Matter - Soft Condensed MatterRodCondensed Matter::Soft Condensed Mattersymbols.namesakechemistrysymbolsSoft Condensed Matter (cond-mat.soft)Statistical physicsStandard model (cryptography)
researchProduct

On-chip quantum frequency combs for complex photon state generation (Conference Presentation)

2020

A key challenge in today’s quantum science is the realization of large-scale complex non-classical systems to enable e.g. ultra-secure communications, quantum-enhanced measurements, and computations faster than classical approaches. Optical frequency combs represent a powerful approach towards this, since they provide a very high number of temporal and frequency modes which can result in large-scale quantum systems. Here, we discuss the recent progress on the realization of integrated quantum frequency combs and reveal how their use in combination with on-chip and fiber-optic telecommunications components can enable quantum state control with new functionalities, yielding unprecedented capa…

PhotonQuantum stateComputer scienceComputationFrequency combs Quantum communications Quantum information Complex systems Control systems Four wave mixing ManufacturingElectronic engineeringKey (cryptography)Settore ING-INF/02 - Campi ElettromagneticiState (computer science)Quantum information scienceRealization (systems)QuantumLaser Resonators, Microresonators, and Beam Control XXII
researchProduct