Search results for "cryptography"

showing 10 items of 657 documents

Brauer correspondent blocks with one simple module

2019

One of the main problems in representation theory is to understand the exact relationship between Brauer corresponding blocks of finite groups. The case where the local correspondent has a unique simple module seems key. We characterize this situation for the principal p-blocks where p is odd.

20C20 20C15MatemáticasApplied MathematicsGeneral Mathematics010102 general mathematicsPrincipal (computer security)MathematicsofComputing_GENERAL01 natural sciencesRepresentation theoryAlgebra0103 physical sciencesKey (cryptography)FOS: Mathematics010307 mathematical physics0101 mathematicsRepresentation Theory (math.RT)Simple moduleMathematics - Representation TheoryMathematics
researchProduct

Optical-data storage-readout technique based on fractal encrypting masks

2009

We propose the use of fractal structured diffractive masks as keys in secure storage-readout systems. A joint transform correlator based on a photorefractive crystal in the Fourier domain is implemented to perform encryption and decryption. We discuss the advantages of encrypting information using this kind of deterministic keys in comparison to conventional random phase masks. Preliminary experimental results are presented to demonstrate the effectiveness of the proposed system.

3D optical data storageComputer sciencebusiness.industryOptical storageDiffraction efficiencyEncryptionAtomic and Molecular Physics and OpticsFractalOpticsEncoding (memory)Computer data storagebusinessJoint (audio engineering)Computer Science::Cryptography and SecurityOptics Letters
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

Prescribers’ opinions to identify competitive groups: a comparative analysis in the pharmaceutical industry

2020

A firm must identify its key competitors (those that belong to the same competitive group), especially when operating in highly competitive industries, such as drug products. Experts who prescribe products to the final consumer play a crucial role in identifying the key competitors of a firm. In this context, the present paper aimed to determine if significant differences exist between two groups of prescribers (commercial and social) regarding the competitive structure that both groups identify using subjective information obtained through (i) categorization methods and (ii) evaluation methods.A sample of 104 prescribers related to the sale of cosmetic pharmaceuticals was interviewed (53 c…

AdultMaleDrug IndustryHealth PersonnelInterviews as Topic03 medical and health sciences0302 clinical medicinePhysiciansCluster AnalysisHumansPharmacology (medical)030212 general & internal medicineMarketingAgedPharmaceutical industryEconomic Competitionbusiness.industry030503 health policy & servicesHealth PolicyGeneral MedicineCompetitor analysisMiddle AgedCategorizationKey (cryptography)FemaleBusiness0305 other medical scienceExpert Review of Pharmacoeconomics & Outcomes Research
researchProduct

Pseudonyms for Cancer Registries

1996

AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…

Advanced and Specialized NursingInformation privacyeducation.field_of_studybusiness.industryPopulationHealth InformaticsCryptographyPseudonymComputer securitycomputer.software_genreHealth informaticsData flow diagramHealth Information ManagementSynonym (database)MedicinebusinesseducationcomputerRequirements analysisMethods of Information in Medicine
researchProduct

InCREDulity in Artificial Societies

2021

This paper describes an artificial society in which the simulated agents behave and interact based on a computational architecture informed by insights from one of the leading social psychological theories in the scientific study of secularization and religion: “credibility-enhancing displays” (or CREDs) theory. After introducing the key elements of the theory and outlining the computational architecture of our CRED model, we present some of our initial simulation results. These efforts are intended to advance the quest within social simulation for more authentic artificial societies and more plausible human-like agents with complex interactive and interpretative capacities.

Agent-based modelCognitive scienceComputational architectureComputer scienceArtificial societySecularizationKey (cryptography)Scientific studySocial simulation
researchProduct

Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

2019

AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.

Algebra and Number TheoryApplied Mathematics020206 networking & telecommunicationsEuler's totient function0102 computer and information sciences02 engineering and technologyAutomorphism01 natural sciencesOctonionOctavian totient functionQuaternion cryptographyAlgebraOctonion cryptographysymbols.namesakeOctonion RSA algorithm010201 computation theory & mathematicsTheory of computation0202 electrical engineering electronic engineering information engineeringsymbolsCryptosystemNon-associative cryptographyOctonion algebraMathematicsApplicable Algebra in Engineering, Communication and Computing
researchProduct

2-Brauer correspondent blocks with one simple module

2017

Abstract One of the main problems in representation theory is to understand the exact relationship between Brauer corresponding blocks of finite groups. The case where the local correspondent has a unique simple module seems key. We study this situation for 2-blocks.

AlgebraAlgebra and Number Theory010102 general mathematics0103 physical sciencesCharacter theoryBlock theoryKey (cryptography)010307 mathematical physics0101 mathematics01 natural sciencesRepresentation theorySimple moduleMathematicsJournal of Algebra
researchProduct

(p,q)-Summing Sequences of Operators

2003

Abstract unavailable at this time... Mathematics Subject Classification (2000): 47B10. Key words: Summing operators, vector-valued multipliers. Quaestiones Mathematicae 26(2003), 441–452

AlgebraDiscrete mathematicsMathematics (miscellaneous)Mathematics Subject ClassificationKey (cryptography)MathematicsQuaestiones Mathematicae
researchProduct