Search results for "ENCR"

showing 10 items of 121 documents

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Optical-data storage-readout technique based on fractal encrypting masks

2009

We propose the use of fractal structured diffractive masks as keys in secure storage-readout systems. A joint transform correlator based on a photorefractive crystal in the Fourier domain is implemented to perform encryption and decryption. We discuss the advantages of encrypting information using this kind of deterministic keys in comparison to conventional random phase masks. Preliminary experimental results are presented to demonstrate the effectiveness of the proposed system.

3D optical data storageComputer sciencebusiness.industryOptical storageDiffraction efficiencyEncryptionAtomic and Molecular Physics and OpticsFractalOpticsEncoding (memory)Computer data storagebusinessJoint (audio engineering)Computer Science::Cryptography and SecurityOptics Letters
researchProduct

Towards optimal clinical and epidemiological registration of haematological malignancies: Guidelines for recording progressions, transformations and …

2015

AbstractHaematological malignancies (HM) represent over 6% of the total cancer incidence in Europe and affect all ages, ranging between 45% of all cancers in children and 7% in the elderly. Thirty per cent of childhood cancer deaths are due to HM, 8% in the elderly. Their registration presents specific challenges, mainly because HM may transform or progress in the course of the disease into other types of HM. In the context of cancer registration decisions have to be made about classifying subsequent notifications on the same patient as the same tumour (progression), a transformation or a new tumour registration. Allocation of incidence date and method of diagnosis must also be standardised…

AdultMaleCancer ResearchPediatricsmedicine.medical_specialtyTransformationsAdolescentContext (language use)Cancer registrationDiseaseCancer registrationMedical RecordsYoung AdultENCREpidemiologymedicineHumansRegistriesMortalityMedical diagnosisEurocourseChildEarly Detection of CancerAgedAged 80 and overbusiness.industryIncidence (epidemiology)Infant NewbornInfantCancerMiddle Agedmedicine.disease3. Good healthSurgeryCell Transformation NeoplasticOncologyCancer incidenceChild PreschoolHematologic NeoplasmsEpidemiological MonitoringDisease ProgressionFemalebusinessHaematologyEuropean Journal of Cancer
researchProduct

Volumetric Bias Correction

2007

This paper presents a method to suppress the bias artifact, also known as RF-inhomogeneity, in Magnetic Resonance Imaging (MRI). This artifact produces illumination variations due to magnetic field fluctuations of the device. In the latest years many works have been devoted to face this problem. In this work we present the 3D version of a new approach to bias correction, which is called Exponential Entropy Driven Homomorphic Unsharp Masking (E2D-HUM). This technique has been already presented by some of the authors for the 2D case only. The description of the whole method is detailed, and some experimental results are reported.

Artifact (error)business.industryComputer scienceEntropy drivenHomomorphic encryptionBias artifact Rf-inhomogeneity MRIExponential functionMagnetic fieldFace (geometry)Bias correctionComputer visionArtificial intelligencebusinessUnsharp masking
researchProduct

An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders

2020

In recent years, deep learning-based encrypted traffic classification has proven to be effective; especially, using neural networks to extract features from raw traffic to classify encrypted traffic. However, most of the neural networks need a fixed-sized input, so that the raw traffic need to be trimmed. This will cause the loss of some information; for example, we do not know the number of packets in a session. To solve these problems, a framework, which implements both a convolutional neural network (CNN) and a stacked autoencoder (SAE), is proposed in this paper. This framework uses a CNN to extract high-level features from raw network traffic and uses an SAE to encode the 26 statistica…

Artificial neural networkbusiness.industryNetwork packetComputer scienceDeep learningFeature extraction020206 networking & telecommunicationsPattern recognition02 engineering and technologyEncryptionAutoencoderConvolutional neural networkTraffic classification0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusiness2020 IEEE 6th International Conference on Computer and Communications (ICCC)
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Optical security and encryption with totally incoherent light

2001

We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.

AuthenticationHigh securitybusiness.industryComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical securityEncryptionAtomic and Molecular Physics and OpticsOptical encryptionDiffractive lensOpticsComputer Science::MultimediabusinessOptical processorComputer Science::DatabasesComputer Science::Cryptography and SecurityOptics Letters
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Green composites based on biodegradable polymers and anchovy (Engraulis Encrasicolus) waste suitable for 3D printing applications

2022

Every day large amounts of fish waste are produced and grossly discarded in markets around the world causing environmental and hygiene issue. The use of these scraps for the production of materials with higher added value can definitely contributed to solve this problem. In this work, 10% and 20% of anchovy fishbone powder (EE), obtained by market waste, were microbiological and mechanical tested and subsequently added to polylactic acid (PLA) and to a commercial blend of biodegradable co-polyesters (Mater-Bi®). Rheological characterization suggests the potential printability of all prepared composites filaments. 10% EE filled composites showed outstanding printability. Morphological analys…

B. Mechanical propertiesE. 3D printingEngraulis encrasicolusC. Material modellingA. Bio compositesSettore ICAR/13 - Disegno IndustrialeGeneral EngineeringCeramics and CompositesD. Scanning electron microscopy (SEM)Composites Science and Technology
researchProduct