Search results for "Cryptography"
showing 10 items of 657 documents
Comments on “Failure, Identity Loss and Living Information Systems” by P. Kanellis, M. Lycett, and R.J. Paul
2000
Information system (IS) failure is a pervasive phenomenon. Like the paper’s introduction, common sense and statistics show information system failure is common and also important, because huge amounts of human effort and economic resources are spent without much gain. The issue of failure is also related to FRISCO report and the theme of the conference in two ways. First our concepts and ideas about information system and the nature of information system development can affect either positively or negatively our intellectual and technical capabilities to influence the likelihood of IS failure. Second, because information system definition forms one key concept and focus of the FRISCO report…
A Dynamic Viewpoint to Design Performance Management Systems in Academic Institutions: Theory and Practice
2014
This article illustrates how to design and apply Performance Management systems in academic institutions by identifying and modeling those factors affecting academic performance through a dynamic performance management view. Particularly, combining performance management with System Dynamics modeling may allow academic decision-makers to better identify key performance drivers for pursuing a sustainable performance improvement in universities. In the second section of the article, a number of examples based on empirical findings from a field project aimed at designing a dynamic performance management model for the University of Palermo (Italy) are discussed.
Privacy Preserving Client/Vertical-Servers Classification
2019
We present a novel client/vertical-servers architecture for hybrid multi-party classification problem. The model consists of clients whose attributes are distributed on multiple servers and remain secret during training and testing. Our solution builds privacy-preserving random forests and completes them with a special private set intersection protocol that provides a central commodity server with anonymous conditional statistics. Subsequently, the private set intersection protocol can be used to privately classify the queries of new clients using the commodity server’s statistics. The proviso is that the commodity server must not collude with other parties. In cases where this restriction …
Improved Magic Ink Signatures Using Hints
1999
We introduce two improvements to the recently proposed so called magic ink DSS signatures. A first improvement is that we reduce the overhead for tracing without noticeably increasing any other cost. The tracing cost is linear in the number of generated signatures in the original proposal; our improved version reduces this to a logarithmic cost in the common case. A second improvement is that we introduce a method for determining whether forged currency is in circulation, without affecting the privacy of honest users. Our improvements rely on our introducing a so called hint value. This is an encryption of the signature transcript received, submitted by the signature receiver. Part of the p…
Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks
2020
International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…
"Table 4" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."
2006
Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.
Molecular topology as a novel approach for drug discovery
2012
Molecular topology (MT) has emerged in recent years as a powerful approach for the in silico generation of new drugs. One key part of MT is that, in the process of drug design/discovery, there is no need for an explicit knowledge of a drug's mechanism of action unlike other drug discovery methods.In this review, the authors introduce the topic by explaining briefly the most common methodology used today in drug design/discovery and address the most important concepts of MT and the methodology followed (QSAR equations, LDA, etc.). Furthermore, the significant results achieved, from this approach, are outlined and discussed.The results outlined herein can be explained by considering that MT r…
A single photon source based on NV centers in diamond nanocrystals
2009
The development of reliable devices to generate single photons is crucial for applications in quantum cryptography, as well as for fundamental quantum optics experiments. Due to their extremely high photostability at room temperature, optically active defects in solids, the so called color centers, are among the most promising candidates. Single NV(nitrogen-vacancy) centers in diamond have been demonstrated to be able to generate single photons and have already shown advantages compared to attenuated laser pulses in a quantum cryptography experiment [1]. The nitrogen-vacancy center (NV center) in diamond consists of a substitutional nitrogen atom and an adjacent vacancy. This complex exhibi…
Activating remote entanglement in a quantum network by local counting of identical particles
2019
Quantum information and communication processing within quantum networks usually employs identical particles. Despite this, the physical role of quantum statistical nature of particles in large-scale networks remains elusive. Here, we show that just the indistinguishability of fermions makes it possible a new mechanism of entanglement transfer in many-node quantum networks. This process activates remote entanglement among distant sites, which do not share a common past, by only locally counting identical particles and classical communication. These results constitute the key achievement of the present technique and open the way to a more stable multistage transfer of nonlocal quantum correl…
"Table 10" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in PbPb collisions versus Nch at low KT3.