Search results for "Cryptography"

showing 10 items of 657 documents

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Robustly correlated key‐medical image for DNA‐chaos based encryption

2021

Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…

business.industryComputer sciencePattern recognitionEncryptionImage (mathematics)CHAOS (operating system)QA76.75-76.765Signal ProcessingPhotographyKey (cryptography)Computer softwareComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringTR1-1050businessSoftwareIET Image Processing
researchProduct

The Influence of Requirements in Software Model Development in an Industrial Environment

2017

Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…

business.industryComputer scienceProcess (engineering)Level of detail (writing)020207 software engineering02 engineering and technologyElectronic mailSoftware0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingSoftware requirementsSoftware engineeringbusinessSoftware measurementNatural language2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
researchProduct

Experimental Characterization of Mobile Fading Channels Aiming the Design of Non-Wearable Fall Detection Radio Systems at 5.9 GHz

2016

One of the major concerns for the independent living of elderlies is a fall incident. To decrease human interaction errors and user privacy concerns of existing fall detection systems, a new generation of fall detection systems is emerging. The new trend is to design non-wearable devices that can monitor the physical activities of the home user using radio waves reflected off the body. This paper reports an in-home radio measurement campaign at 5.9 GHz, which has been conducted to study the impacts of different physical activities of the user, including fall incidents, on the channel transfer function (CTF) and the power delay profile (PDP) of indoor mobile radio channels. The home is equip…

business.industryComputer scienceReal-time computingElectrical engineeringWearable computer020206 networking & telecommunicationsDifferential (mechanical device)02 engineering and technology0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingFadingbusinessPower delay profileRadio waveCommunication channel
researchProduct

Hybrid descriptive-inferential method for key feature selection in prostate cancer radiomics

2021

In healthcare industry 4.0, a big role is played by radiomics. Radiomics concerns the extraction and analysis of quantitative information not visible to the naked eye, even by expert operators, from biomedical images. Radiomics involves the management of digital images as data matrices, with the aim of extracting a number of morphological and predictive variables, named features, using automatic or semi-automatic methods. Multidisciplinary methods as machine learning and deep learning are fully involved in this field. However, the large number of features requires efficient and effective core methods for their selection, in order to avoid bias or misinterpretations problems. In this work, t…

business.industryComputer sciencefeature selection image analysis prostate cancer radiomicsFeature selectionManagement Science and Operations Researchmedicine.diseaseMachine learningcomputer.software_genreprostate cancerGeneral Business Management and AccountingProstate cancerRadiomicsimage analysisradiomicsModeling and SimulationFeature selectionmedicineKey (cryptography)Artificial intelligencebusinesscomputer
researchProduct

The pathophysiology of acute heart failure: the key role of fluid accumulation

2008

business.industryHeart failureKey (cryptography)MedicineFluid accumulationCardiology and Cardiovascular MedicinebusinessBioinformaticsmedicine.diseasePathophysiology
researchProduct

Number transcoding in children: A functional analysis

1994

French-speaking second-grade children from France and Wallonia were asked to write down in the Arabic code, numbers orally presented at six successive one-month-spaced sessions. The evolution of the children's production (patterns of correct responses and errors) is analysed and tentatively interpreted through the model of number and calculation processing developed by McCloskey in adult neuropsychology. In order to evaluate their number production and comprehension mechanisms the children were furthermore submitted to other number processing tasks. It is tentatively concluded that the children's difficulties in the Arabic written task were localized at the level of the production of the Ar…

business.industryInformation processingNeuropsychologyCognitioncomputer.software_genreDevelopmental psychologyTask (project management)ComprehensionDevelopmental NeuroscienceDevelopmental and Educational PsychologyCode (cryptography)Cognitive developmentProduction (computer science)Artificial intelligencebusinessPsychologycomputerNatural language processingBritish Journal of Developmental Psychology
researchProduct

Key Drivers of Internet Banking Adoption

2008

The objective of this chapter is to provide students and managers with a holistic view into the different factors that influence online banking adoption and to use the study’s findings to develop strategies for managers on how to maximize the rate of Internet banking adoption. Research done with a sample size of 450 Spanish Internet users, has highlighted that Internet banking adoption is more likely in young, highly educated and high-income consumers. Internet affinity, online use experience and some perceived benefits are also key drivers of online financial services pur chase decision-making. Perceived financial, social and psychological risk negatively influences the use of online-banki…

business.industryInternet privacyKey (cryptography)The InternetBusinessInternet usersMarketingSociology of the Internet
researchProduct

Citizen’s Rights in European Environmental Law: Stock-Taking of Key Challenges and Current Developments in Relation to Public Access to Information, …

2012

The article aims to provide a short overview of the current situation regarding public access to information, participation and access to justice in Europe. The article briefly presents the role of the Aarhus Convention and its compliance mechanism in shaping the respective legal framework at both national level and EU level. On that basis it summarises some key challenges and implementation problems respectively in relation to public access to information, participation and access to justice.

business.industryManagement Monitoring Policy and LawInternational lawPublic relationsPublic administrationStock-takingAarhus ConventionCompliance (psychology)Environmental lawPolitical sciencePublic participationKey (cryptography)Justice (ethics)businessLawJournal for European Environmental & Planning Law
researchProduct

Development of the optical multiplexer board prototype for data acquisition in TileCal experiment

2005

The optical multiplexer board is one of the elements present in the read out chain of the tile calorimeter in ATLAS experiment. Due to radiation effects, two optical fibers with the same data come out from the front end boards to this board, which has to decide in real time which one carries good data and pass them to the read out driver motherboard for processing. This paper describes the design and tests of the first prototype, implemented as a 6U VME64x slave module, including both hardware and firmware aspects. In this last, algorithms for cyclic redundancy code checking are used to make the decision. Besides, the board may be used as a data injector for testing purposes of the read out…

business.industryMotherboardFirmwareComputer scienceATLAS experimentcomputer.software_genreMultiplexerFront and back endsData acquisitionEmbedded systemCyclic redundancy checkCode (cryptography)businesscomputerComputer hardware14th IEEE-NPSS Real Time Conference, 2005.
researchProduct