Search results for "Telecommunication"

showing 10 items of 1769 documents

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Letter Throughput and Delay Analysis of the Ideal Window

1999

We consider the problem of random access communications over a time slotted channel with feedback of infinitely multiplicity at the beginning of each collision resolution interval (CRI), i.e., users know via instantaneous feedback the number of users involved in that collision. Once this is known, the resolution algorithm (CRA) operates with binary (successful / non successful, s/ns) feedback. The analysis of this simple full feedback sensing window random access algorithm, named ideal window stabilized ALOHA, (IWSA), algorithm, provides a throughput of 0.5052 packets/slot, Its delay is also analyzed and compared with similar algorithms.

Packet switchingAlohaNetwork packetComputer Science::Networking and Internet ArchitectureBinary numberCode rateElectrical and Electronic EngineeringCollisionAlgorithmTelecommunications networkRandom accessMathematicsEuropean Transactions on Telecommunications
researchProduct

A measurement of the photon structure function F-2(gamma) at an average Q(2) of 12 GeV2/c(4)

1995

The hadronic photon structure function F_{2}^{gamma} has been measured in the Q^{2} range from 4 to 30~GeV^2/c^{4} and down to x values of order 0.001, using data taken with the DELPHI detector at LEP between 1991 and 1993. A comparison is made with several F_{2}^{gamma} parameterizations with special emphasis on their low x behaviour. A result on the Q^{2} evolution of F_{2}^{gamma} is presented.

Particle physicsPhotonPhysics and Astronomy (miscellaneous)LEP; DELPHI; hadronic photon structureHadronMONTE-CARLO SIMULATIONStructure (category theory)01 natural sciencesC-4Partícules (Física nuclear)JET FRAGMENTATIONlaw.inventionQ2Nuclear physicsMONTE-CARLO SIMULATION; STRUCTURE-FUNCTION F2; JET FRAGMENTATION; E+E-PHYSICS; QCD; Q2; SCATTERING; ORDERlaw0103 physical sciencesRange (statistics)SCATTERINGhadronic photon structure010306 general physicsDELPHIQuantum chromodynamicsPhysicsE+E-PHYSICS010308 nuclear & particles physicsScatteringEmphasis (telecommunications)DetectorOrder (ring theory)ORDERLEPQCDLARGE ELECTRON POSITRON COLLIDERPhoton structure functionPARTICLE PHYSICS; LARGE ELECTRON POSITRON COLLIDER; DELPHIMass spectrumPARTICLE PHYSICSFísica nuclearSTRUCTURE-FUNCTION F2
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

An optimal code for patient identifiers.

2004

How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.

Patient Identification SystemsComputer scienceTransposition (telecommunications)Health Informaticscomputer.software_genreComputer Science ApplicationsIdentifierCode (cryptography)Data miningConstant-weight codeAlphabetError detection and correctionAlgorithmcomputerSoftwareAlgorithmsConfidentialityMathematicsComputer methods and programs in biomedicine
researchProduct

Mobile Banking and Payment System : A Conceptual Standpoint

2017

This study conceptualizes and proposes a well-regulated and designated mobile banking and payment system (MBPS) with the potential to strengthen the banking system, foster the regulatory framework, and to be integrated across various platforms and mobile devices. Unlike other mobile payment systems that lack convenience, scalability, and usability, the proposed MBPS contains several important functionalities and it has the potential to bring together hitherto unconnected industries—banking, Fintech and telecoms—to offer value-added services to their existing and potential customers. The ownership of the MBPS shall remain with the financial services sector including the banking and microfina…

Payment systempayment systemsManagement Information Systemslaw.inventionlaw0502 economics and businessSMS bankingMobile paymentmobile bankingPayment service providerta512MicrofinanceMobile bankingbusiness.industry05 social sciencesComputer Science ApplicationsCommercemaksujärjestelmätverkkopankitRetail banking050211 marketingbusinessTelecommunicationsMobile device050203 business & managementInternational Journal of E-Business Research
researchProduct

Irisin – ‘New Kid on the Block in energy regulation’?

2014

Pediatricsmedicine.medical_specialtyPhysiologybusiness.industryBioinformaticsBody Mass IndexFibronectinsBlock (telecommunications)medicineHumansObesityEnergy regulationbusinessEnergy Metabolismta315Acta Physiologica
researchProduct

An Experimental Characterization of Time of Arrival Accuracy for Time Synchronization of Medium Voltage Smart Grid Solutions

2019

The time synchronization of smart grid devices is a critical feature for the successful application of advanced grid monitoring and control techniques. Synchronization mechanisms based on the accurate estimation of the Time of Arrival (ToA) of network messages - sent over power line cables - are a promising solution to achieve synchronization tasks over distribution lines. In this paper, a chirp-based synchronization technique over the Medium Voltage (MV) grid has been proposed and characterized. Such approach has the benefit of not requiring the installation of a dedicated infrastructure, thanks to the exploitation of power distribution lines for the transmission of time synchronization da…

Performance EvaluationComputer scienceMedium Voltage Distribution GridGridTime of ArrivalPower (physics)Time of arrivalSmart gridTransmission (telecommunications)Time SynchronizationSynchronization (computer science)Electronic engineeringChirpSmart GridChirp modulationSettore ING-INF/07 - Misure Elettriche E ElettronicheVoltage2019 IEEE 10th International Workshop on Applied Measurements for Power Systems (AMPS)
researchProduct