Search results for "Encryption"

showing 10 items of 94 documents

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

Bayesian System for Differential Cryptanalysis of DES

2014

AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNeural cryptographyTheoretical computer scienceDifferential cryptanalysisbusiness.industryBayesian probabilityBayesian networkCryptographyData_CODINGANDINFORMATIONTHEORYEncryptionDESlaw.inventionBayesian Networks;lawCryptographyBayesian NetworksPoint (geometry)Cryptanalysisbusinessdifferential cryptanalysiMathematicsdifferential cryptanalysisIERI Procedia
researchProduct

Cloud Computing e protezione dei dati nel web 3.0

2014

Il cloud computing è un ritrovato deputato all'archiviazione, elaborazione e uso di dati su computer remoti, grazie al quale gli utenti hanno a disposizione una potenza di elaborazione quasi illimitata, non sono tenuti ad investire grandi capitali per soddisfare le proprie esigenze e possono accedere ai loro dati ovunque sia disponibile una connessione Internet. Il presente scritto si propone di contribuire ad una migliore comprensione della nuova tecnologia e alla ricostruzione dell'attuale (invero scarno) quadro giuridico, ciò che può aiutare a superare i principali problemi posti dalla nuvola al diritto dei privati e riconducibili, primariamente, alla protezione dei dati, al diritto dei …

Settore IUS/14 - Diritto Dell'Unione EuropeaSettore IUS/01 - Diritto Privatocloud cloud computing data data protection privacy security encryption EU law european private law italian law comparative law cyberlaw ICT law technology information and communications technology law & technology
researchProduct

Optical encryption with compressive ghost imaging

2011

Ghost imaging (GI) is a novel technique where the optical information of an object is encoded in the correlation of the intensity fluctuations of a light source. Computational GI (CGI) is a variant of the standard procedure that uses a single bucket detector. Recently, we proposed to use CGI to encrypt and transmit the object information to a remote party [1]. The optical encryption scheme shows compressibility and robustness to eavesdropping attacks. The reconstruction algorithm provides a relative low quality images and requires high acquisitions times. A procedure to overcome such limitations is to combine CGI with compressive sampling (CS), an advanced signal processing theory that expl…

Signal processingLight intensityCompressed sensingbusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingReconstruction algorithmIterative reconstructionGhost imagingEncryptionbusinessAlgorithm2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
researchProduct

Progressive transmission of secured images with authentication using decompositions into monovariate functions

2014

International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…

Signal processing[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing01 natural sciencesImage encryption010309 optics[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0103 physical sciences0202 electrical engineering electronic engineering information engineeringComputer visionElectrical and Electronic EngineeringDigital watermarkingImage resolutionMathematicsSignal processingAuthenticationNetwork packetbusiness.industryWatermarkAtomic and Molecular Physics and OpticsComputer Science ApplicationsSpline (mathematics)Binary dataKolmogorov superposition theorem020201 artificial intelligence & image processingArtificial intelligencebusinessVisible watermarking[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

Optoelectronic Information Encryption with Incoherent Light

2005

Speckle patternOpticsComputer sciencebusiness.industryPhase maskOptoelectronicsbusinessEncryptionDigital holography
researchProduct

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

HOW SMART DOES AN AGENT NEED TO BE?

2005

The classic distributed computation is done by atoms, molecules or spins in vast numbers, each equipped with nothing more than the knowledge of their immediate neighborhood and the rules of statistical mechanics. These agents, 1023 or more, are able to form liquids and solids from gases, realize extremely complex ordered states, such as liquid crystals, and even decode encrypted messages. We will describe a study done for a sensor-array "challenge problem" in which we have based our approach on old-fashioned simulated annealing to accomplish target acquisition and tracking under the rules of statistical mechanics. We believe the many additional constraints that occur in the real problem ca…

Theoretical computer scienceComputer sciencebusiness.industryComputationDistributed computingMulti-agent systemGeneral Physics and AstronomyStatistical and Nonlinear PhysicsStatistical mechanicsEncryptionTarget acquisitionComputer Science ApplicationsNetwork managementComputational Theory and MathematicsSimulated annealingStochastic optimizationbusinessMathematical PhysicsInternational Journal of Modern Physics C
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct