Search results for "ENCR"

showing 10 items of 121 documents

Investigation of data encryption impact on broadcasting visible light communications

2014

Este trabajo investiga el impacto de la encriptación y desencriptación de datos en un sistema de comunicaciones de luz visible (VLC) de difusión en interiores incrustado en la capa física. Se ha implementado el cifrado RSA para proporcionar una transmisión de datos segura en la capa física. El artículo muestra el rendimiento de la tasa de error de bits (BER) para los sistemas VLC seguros y no seguros (8 y 12 bits) para velocidades de datos de 2 y 12 Mbps. Para una BER de 10e-4 mostramos que hay penalizaciones de potencia de 2-4 dB con las VLC seguras. También se investiga el impacto de la longitud de la clave en la propagación del error y la penalización de potencia. EU Cost Action IC1101 T…

VLCUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicacionesBERbusiness.industryComputer sciencedecryptionPhysical layerVisible light communicationpower penaltyEncryptionUNESCO::MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones [UNESCO]Broadcasting (networking)RSABroadcast communication networkBit error rate:MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación [UNESCO]businessComputer hardwareencryptionKey sizeComputer networkData transmission
researchProduct

Privacy-preserving scheme for mobile ad hoc networks

2011

This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.

Vehicular ad hoc networkComputer scienceWireless ad hoc networkbusiness.industryMobile computingCryptographyMobile ad hoc networkEncryptionQA76Optimized Link State Routing ProtocolSecurity associationReputation systemComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Cryptography and SecurityComputer network2011 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Adopting XML for Large-Scale Information

2011

This book has presented many different ways to encode information in XML format and the purposes for doing so. In this concluding chapter we consider problems related to managing XML information assets and the methods available to address those problems. Approaches for persistently storing XML data can be divided into file storage and database storage, and the research community has been especially active in designing new solutions for XML databases. However, adoption of XML often means massive migration procedures from some legacy data into the XML format; examples of migration cases are given. While describing the ­problems related to adopting XML, we give examples of the kinds of data fo…

XML EncryptionComputer scienceEfficient XML InterchangeXML SignatureXML validationcomputer.file_formatcomputer.software_genreXML frameworkWorld Wide WebXML databaseXML Schema EditorStreaming XMLComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcomputer
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Why Use XML?

2011

Since its inception a decade ago, XML has become a standard ­technology for software engineers, all Web browsers are able to parse and show XML ­documents, and huge XML data resources are available from the Internet. Many of the documents are in XHTML, but other XML applications are quite common as well. XML has also become a format that is increasingly common in the files of local disks. This success would not have been possible without collaborative efforts throughout the Web community. Such world-wide collaborative development has included standards, software applications, and case implementations that can serve as models when developing new solutions. In this chapter we consider what ki…

XML frameworkWorld Wide WebXML EncryptionComputer scienceXML Schema EditorStreaming XMLEfficient XML InterchangeComputingMethodologies_DOCUMENTANDTEXTPROCESSINGXML SignatureXML BaseXML validationcomputer.file_formatcomputer
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Image Encryption/Decryption system based on an oscillatory cellular nonlinear network

2008

International audience

[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingimage encryption[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputingMilieux_MISCELLANEOUSnon linear dynamics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct