Search results for "ENCR"

showing 10 items of 121 documents

Microstructuration des dépôts imprimés par jet d'encre de la coalescence des nanoparticules d'argent vers la réalisation d'interconnexions de composa…

2012

Several challenges are still holding back the technological transfer of printed electronics to industry in spite of recent progresses. In this thesis work, the printing method of inks based on silver nanoparticles (=25 nm) was optimized according to its rheology and to the fluid/substrate interactions for the fabrication of electrical interconnections with a thickness of 500 nm. These lines were printed on silicon or flexible substrates and annealed either by conventional (oven or infrared) or selective methods (microwave) at temperatures comprised between 100 and 300 °C.A better understanding of the relationship between process and microstructure of these printed thin films, based on sever…

[SPI.OTHER]Engineering Sciences [physics]/OtherInkjet-printing[SPI.OTHER] Engineering Sciences [physics]/OtherResistivityPrinted electronicsJet d’encreCoalescenceNanoparticuleSelective sinteringNanoparticleÉlectronique impriméeInterconnectRecuit sélectifInterconnexionRésistivitéMicrostructure
researchProduct

THE BIO-PROTECTIVE ROLE OF A BIOLOGICAL ENCRUSTATION

2014

Benthic organisms can form a persistent biological layer that mediates processes of rock deterioration and limits the degradation of the underlying surface. In this study we investigated the bioprotective potential of barnacle encrustations against salt weathering processes, and discuss their possible role in enhancing the durability of coastal engineering structures

benthos encrustation weathering shore protection coastal engineering
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

AES/FPGA Encryption Module Integration for Satellite Remote Sensing Systems: LST-SW case

2020

Satellite remote sensing embedded systems need to be secure to protect data transmission between satellites and the ground station for any threat can affects the hardware of satellite and interception of data, in addition to unauthorized access to satellite system. This research proposes an approach for a secure integration of FPGA Encryption module based on the iterative looping architecture for remote sensing algorithm and especially for the LST-SW algorithm. The target hardware used in this paper is Virtex-5 XC5VLX50T FPGA from Xilinx. Hardware Description Language was used to design the complete system. The analysis of the proposed designed shows that this implementation can achieved a …

business.industryComputer scienceHardware description languageSatellite systemEncryptionSatellitebusinessField-programmable gate arrayThroughput (business)computerComputer hardwareData transmissionBlock (data storage)computer.programming_language2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)
researchProduct

Robustly correlated key‐medical image for DNA‐chaos based encryption

2021

Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…

business.industryComputer sciencePattern recognitionEncryptionImage (mathematics)CHAOS (operating system)QA76.75-76.765Signal ProcessingPhotographyKey (cryptography)Computer softwareComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringTR1-1050businessSoftwareIET Image Processing
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Engraulis encrasicolus larvae from two different environmental spawning areas of the Central Mediterranean Sea: first data on amino acid profiles and…

2020

Early life stages of marine fish populations may be strongly affected by environmental factors. Changes in the physical environment or the availability of food resources could lead to stress-related physiological responses affecting larval fitness, growth and survival. In the present study, we determined, for the first time, amino acid composition (AAC), lipid, and carbohydrate content, as well as alkaline phosphatase and peroxidase activities in larvae from the European anchovy Engraulis encrasicolus. Fishes were caught in two different spawning areas of the Strait of Sicily, characterized by different environmental conditions, including a coastal upwelling with a lower temperature (Advent…

chemistry.chemical_classificationLarvabiologySettore BIO/05 - ZoologiacarbohydratesMarine fishZoologycarbohydrates Engraulis encrasicolus larvae enzyme Eye Amino Acid composition habitat conditions lipidsbiology.organism_classificationengraulis encrasicolus larvaeEarly lifeAmino acidlipidsFood resourcesenzymeEngraulisMediterranean seachemistryhabitat conditionslcsh:ZoologyAnimal Science and Zoologysense organslcsh:QL1-991eye amino acid compositionThe European Zoological Journal
researchProduct

Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives

2015

A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security prob…

confidential datapublic cloudspilvipalveluttrustworthysalauscyber espionageluottamuksellisuusdata encryptiontietoturva
researchProduct

Ramses: A visual steganographic system

2007

data encryption non-photorealistic rendering
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct