Search results for "ENCR"
showing 10 items of 121 documents
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
2009
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…
Roadmap on 3D integral imaging: Sensing, processing, and display
2020
This Roadmap article on three-dimensional integral imaging provides an overview of some of the research activities in the field of integral imaging. The article discusses various aspects of the field including sensing of 3D scenes, processing of captured information, and 3D display and visualization of information. The paper consists of a series of 15 sections from the experts presenting various aspects of the field on sensing, processing, displays, augmented reality, microscopy, object recognition, and other applications. Each section represents the vision of its author to describe the progress, potential, vision, and challenging issues in this field.
Multiplexing of encrypted data using fractal masks
2012
In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.
Privacy violations in Riga open data public transport system
2016
Over the recent years public transportation systems around the world have been migrating to digital ticketing solutions. This paper investigates security and privacy aspects of the one such system implemented by Riga municipality called e-talons by analysing published open data containing ride registrations.
Privacy handling for critical information infrastructures
2013
This paper proposes an architecture and a methodology for privacy handling in Critical Information Infrastructures. Privacy is in this respect considered as both the risk of revealing person-sensitive information, for example from critical infrastructures in health institutions, but also to identify and avoid leakage of confidential information from the critical information infrastructures themselves. The architecture integrates privacy enhancing technologies into an enterprise service bus, which allows for policy-controlled authorisation, anonymisation and encryption of information in XML elements or attributes in messages on the service bus. The proposed methodology can be used to identif…
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
2021
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …
Frequency Determined Homomorphic Unsharp Masking Algorithm on Knee MR Images
2005
A very important artifact corrupting Magnetic Resonance (MR) Images is the RF inhomogeneity, also called Bias artifact. The visual effect produced by this kind of artifact is an illumination variation which afflicts this kind of medical images. In literature a lot of works oriented to the suppression of this artifact can be found. The approaches based on homomorphic filtering offer an easy way to perform bias correction but none of them can automatically determine the cut-off frequency. In this work we present a measure based on information theory in order to find the frequency mentioned above and this technique is applied to MR images of the knee which are hardly bias corrupted.
The role of topography and erosion in the development and architecture of shallow-water coral bioherms (Tortonian-Messinian, Cabo de Gata, SE Spain).
2009
23 pages; International audience; During the Miocene, Mediterranean shallow-water carbonates were rich in scleractinian corals, which thrive in various depositional settings. A Tortonian–Messinian bioherm belt developing in a heterozoan-dominated ramp was investigated along a 1.2 km continuous transect located in the Cabo de Gata region. The interval studied displays four depositional environments from mid-to-inner ramp, dominated by swell waves and storm energy, deposited as a single, large-scale depositional sequence during a 3rd to 4th order transgressive–regressive cycle. The bioherms grew in three phases, and were essentially composed of inplace primary frameworks. Three coral genera w…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…