Search results for "ENCR"
showing 10 items of 121 documents
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Optical-data storage-readout technique based on fractal encrypting masks
2009
We propose the use of fractal structured diffractive masks as keys in secure storage-readout systems. A joint transform correlator based on a photorefractive crystal in the Fourier domain is implemented to perform encryption and decryption. We discuss the advantages of encrypting information using this kind of deterministic keys in comparison to conventional random phase masks. Preliminary experimental results are presented to demonstrate the effectiveness of the proposed system.
Towards optimal clinical and epidemiological registration of haematological malignancies: Guidelines for recording progressions, transformations and …
2015
AbstractHaematological malignancies (HM) represent over 6% of the total cancer incidence in Europe and affect all ages, ranging between 45% of all cancers in children and 7% in the elderly. Thirty per cent of childhood cancer deaths are due to HM, 8% in the elderly. Their registration presents specific challenges, mainly because HM may transform or progress in the course of the disease into other types of HM. In the context of cancer registration decisions have to be made about classifying subsequent notifications on the same patient as the same tumour (progression), a transformation or a new tumour registration. Allocation of incidence date and method of diagnosis must also be standardised…
Volumetric Bias Correction
2007
This paper presents a method to suppress the bias artifact, also known as RF-inhomogeneity, in Magnetic Resonance Imaging (MRI). This artifact produces illumination variations due to magnetic field fluctuations of the device. In the latest years many works have been devoted to face this problem. In this work we present the 3D version of a new approach to bias correction, which is called Exponential Entropy Driven Homomorphic Unsharp Masking (E2D-HUM). This technique has been already presented by some of the authors for the 2D case only. The description of the whole method is detailed, and some experimental results are reported.
An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders
2020
In recent years, deep learning-based encrypted traffic classification has proven to be effective; especially, using neural networks to extract features from raw traffic to classify encrypted traffic. However, most of the neural networks need a fixed-sized input, so that the raw traffic need to be trimmed. This will cause the loss of some information; for example, we do not know the number of packets in a session. To solve these problems, a framework, which implements both a convolutional neural network (CNN) and a stacked autoencoder (SAE), is proposed in this paper. This framework uses a CNN to extract high-level features from raw network traffic and uses an SAE to encode the 26 statistica…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
2014
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
Green composites based on biodegradable polymers and anchovy (Engraulis Encrasicolus) waste suitable for 3D printing applications
2022
Every day large amounts of fish waste are produced and grossly discarded in markets around the world causing environmental and hygiene issue. The use of these scraps for the production of materials with higher added value can definitely contributed to solve this problem. In this work, 10% and 20% of anchovy fishbone powder (EE), obtained by market waste, were microbiological and mechanical tested and subsequently added to polylactic acid (PLA) and to a commercial blend of biodegradable co-polyesters (Mater-Bi®). Rheological characterization suggests the potential printability of all prepared composites filaments. 10% EE filled composites showed outstanding printability. Morphological analys…