Search results for "Telecommunication"
showing 10 items of 1769 documents
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
Letter Throughput and Delay Analysis of the Ideal Window
1999
We consider the problem of random access communications over a time slotted channel with feedback of infinitely multiplicity at the beginning of each collision resolution interval (CRI), i.e., users know via instantaneous feedback the number of users involved in that collision. Once this is known, the resolution algorithm (CRA) operates with binary (successful / non successful, s/ns) feedback. The analysis of this simple full feedback sensing window random access algorithm, named ideal window stabilized ALOHA, (IWSA), algorithm, provides a throughput of 0.5052 packets/slot, Its delay is also analyzed and compared with similar algorithms.
A measurement of the photon structure function F-2(gamma) at an average Q(2) of 12 GeV2/c(4)
1995
The hadronic photon structure function F_{2}^{gamma} has been measured in the Q^{2} range from 4 to 30~GeV^2/c^{4} and down to x values of order 0.001, using data taken with the DELPHI detector at LEP between 1991 and 1993. A comparison is made with several F_{2}^{gamma} parameterizations with special emphasis on their low x behaviour. A result on the Q^{2} evolution of F_{2}^{gamma} is presented.
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
An optimal code for patient identifiers.
2004
How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.
Mobile Banking and Payment System : A Conceptual Standpoint
2017
This study conceptualizes and proposes a well-regulated and designated mobile banking and payment system (MBPS) with the potential to strengthen the banking system, foster the regulatory framework, and to be integrated across various platforms and mobile devices. Unlike other mobile payment systems that lack convenience, scalability, and usability, the proposed MBPS contains several important functionalities and it has the potential to bring together hitherto unconnected industries—banking, Fintech and telecoms—to offer value-added services to their existing and potential customers. The ownership of the MBPS shall remain with the financial services sector including the banking and microfina…
Irisin – ‘New Kid on the Block in energy regulation’?
2014
An Experimental Characterization of Time of Arrival Accuracy for Time Synchronization of Medium Voltage Smart Grid Solutions
2019
The time synchronization of smart grid devices is a critical feature for the successful application of advanced grid monitoring and control techniques. Synchronization mechanisms based on the accurate estimation of the Time of Arrival (ToA) of network messages - sent over power line cables - are a promising solution to achieve synchronization tasks over distribution lines. In this paper, a chirp-based synchronization technique over the Medium Voltage (MV) grid has been proposed and characterized. Such approach has the benefit of not requiring the installation of a dedicated infrastructure, thanks to the exploitation of power distribution lines for the transmission of time synchronization da…