Search results for "Encryption"

showing 10 items of 94 documents

New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing

2012

Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…

Theoretical computer science[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processingbusiness.industry[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingSortingimage progressive transmissionImage processingimage encryption[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingMathematical morphologyEncryptionimage watermarkingimage compressionImage (mathematics)multi-variables function representation[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingKolmogorov superposition theoremMedian filterbusinessDigital watermarkingAlgorithm[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImage compressionMathematics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Evaluation of a hash-compress-encrypt pipeline for storage system applications

2015

Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.

UnixDatabaseComputer sciencebusiness.industryHash functionData securityCryptographycomputer.software_genreEncryptionPipeline (software)Pipeline transportEmbedded systemComputer data storagebusinesscomputer2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
researchProduct

Investigation of data encryption impact on broadcasting visible light communications

2014

Este trabajo investiga el impacto de la encriptación y desencriptación de datos en un sistema de comunicaciones de luz visible (VLC) de difusión en interiores incrustado en la capa física. Se ha implementado el cifrado RSA para proporcionar una transmisión de datos segura en la capa física. El artículo muestra el rendimiento de la tasa de error de bits (BER) para los sistemas VLC seguros y no seguros (8 y 12 bits) para velocidades de datos de 2 y 12 Mbps. Para una BER de 10e-4 mostramos que hay penalizaciones de potencia de 2-4 dB con las VLC seguras. También se investiga el impacto de la longitud de la clave en la propagación del error y la penalización de potencia. EU Cost Action IC1101 T…

VLCUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicacionesBERbusiness.industryComputer sciencedecryptionPhysical layerVisible light communicationpower penaltyEncryptionUNESCO::MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones [UNESCO]Broadcasting (networking)RSABroadcast communication networkBit error rate:MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación [UNESCO]businessComputer hardwareencryptionKey sizeComputer networkData transmission
researchProduct

Privacy-preserving scheme for mobile ad hoc networks

2011

This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.

Vehicular ad hoc networkComputer scienceWireless ad hoc networkbusiness.industryMobile computingCryptographyMobile ad hoc networkEncryptionQA76Optimized Link State Routing ProtocolSecurity associationReputation systemComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Cryptography and SecurityComputer network2011 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Adopting XML for Large-Scale Information

2011

This book has presented many different ways to encode information in XML format and the purposes for doing so. In this concluding chapter we consider problems related to managing XML information assets and the methods available to address those problems. Approaches for persistently storing XML data can be divided into file storage and database storage, and the research community has been especially active in designing new solutions for XML databases. However, adoption of XML often means massive migration procedures from some legacy data into the XML format; examples of migration cases are given. While describing the ­problems related to adopting XML, we give examples of the kinds of data fo…

XML EncryptionComputer scienceEfficient XML InterchangeXML SignatureXML validationcomputer.file_formatcomputer.software_genreXML frameworkWorld Wide WebXML databaseXML Schema EditorStreaming XMLComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcomputer
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Why Use XML?

2011

Since its inception a decade ago, XML has become a standard ­technology for software engineers, all Web browsers are able to parse and show XML ­documents, and huge XML data resources are available from the Internet. Many of the documents are in XHTML, but other XML applications are quite common as well. XML has also become a format that is increasingly common in the files of local disks. This success would not have been possible without collaborative efforts throughout the Web community. Such world-wide collaborative development has included standards, software applications, and case implementations that can serve as models when developing new solutions. In this chapter we consider what ki…

XML frameworkWorld Wide WebXML EncryptionComputer scienceXML Schema EditorStreaming XMLEfficient XML InterchangeComputingMethodologies_DOCUMENTANDTEXTPROCESSINGXML SignatureXML BaseXML validationcomputer.file_formatcomputer
researchProduct