Search results for "ENCR"
showing 10 items of 121 documents
Neural networks for the diagnostics of gas turbine engines
1996
The paper describes the activities carried out for developing and testing Back Propagation Neural Networks (BPNN) for the gas turbine engine diagnostics. One of the aims of this study was to analyze the problems encountered during training using large number of patterns. Each pattern contains information about the engine thermodynamic behaviour when there is a fault in progress. Moreover the research studied different architectures of BPNN for testing their capability to recognize patterns even when information is noised. The results showed that it is possible to set-up and optimize suitable and robust Neural Networks useful for gas turbine diagnostics. The methods of Gas Path Analysis furn…
Toll-quality digital secraphone
2002
This paper describes the design and performance of a secraphone that, when plugged between any conventional telephone set and the public telephone network, protects the speech information travelling through the PSTN. The device has a transparent operating mode that does not alter the signal and a secure mode, accessed upon request of any of the speakers, that encrypts the speech with digital techniques, assuring privacy against unwanted listeners. At the transmission branch, voice is sampled, coded with a CELP scheme at 9600 bps (with a slow mode at 7200 bps), encrypted with a proprietary algorithm and interfaced to the line with a V.32 modem chip set. The keys for encryption are establishe…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
Encriptación óptica empleando llaves Weierstrass-Mandelbrot
2013
[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…
Logical Key Hierarchy for Group Management in Distributed Online Social Networks
2016
Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …
MEDiSN
2010
Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high quality care. At the same time, there is a growing concern about hospitals' ability to provide effective care during disaster events. For these reasons, tools that automate patient monitoring have the potential to greatly improve efficiency and quality of health care. Towards this goal, we have developed MEDiSN , a wireless sensor network for monitoring patients' physiological data in hospitals and during disaster events. MEDiSN comprises Physiological Monitors (PMs), which are custom-built, patient-worn motes that sample, encrypt, and sign physiological data and Relay Po…
FPGA/LST-SW Encryption Module Implementation for Satellite Remote Sensing Secure Systems
2020
The need for security of data transmitted from satellites to the ground has increased. Therefore, the need for secure onboard systems is in great demand, particularly in satellite remote sensing missions. This paper describes an approach for a secure Field Programmable Gate Arrays (FPGA) implementation of the Land Surface Temperature Split Window (LST-SW) algorithm, with objective to meat real-time requirements, area optimization and achieved higher Throughput goals to be sufficient for a secure remote sensing satellite applications and missions. The system is designed using VHDL (VHSIC Hardware Description Language) in a Highlevel design method. The experimental results demonstrate that th…
An improvement of NFC-SEC with signed exchanges for an e-prescription-based application
2013
International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…
Fractional Fourier transform dual random phase encoding of time-varying signals
2008
Optical techniques have shown great potential in the field of information security to encode high-security images. Among several established methods, a double-random phase encryption technique (DRPE) for encoding a primary image into stationary white noise was developed by using the analogy between Fresnel diffraction patterns and the fractional Fourier transform (FrFT-DRPE). In this case, additional keys are obtained through the knowledge of the fractional orders of the FrFTs. In this work we propose an encoding setup for time-varying signals, mainly for short-haul fiber optics link applications, that can be considered as the temporal analogue of the spatial FrFT-DRPE. The behavior of the …