Search results for "cryptography"

showing 10 items of 657 documents

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

Physically-consistent parameterization in the modeling of solar photovoltaic devices

2011

This research tests the standard one-diode model of a crystalline-Si photovoltaic cell, focusing on the physical accuracy. In particular, the (apparent) shunt resistance and the diode ideality factor are studied. Current-voltage characteristics of illuminated crystalline-Si photovoltaic modules are analyzed, and some limits of applicability of the standard model are given. Typical values of the ideality factor for crystalline-Si devices are derived from own experimental data as well as from recently published literature. It is shown that the contribution of the apparent shunt resistance is only significant for cell voltages below about 0.45 V, and depends on irradiance. This result is consi…

business.industryPhotovoltaicsComputer sciencePower electronicsPhotovoltaic systemSemiconductor device modelingElectrical engineeringElectronic engineeringIrradiancebusinessDiodeStandard model (cryptography)Voltage2011 IEEE Trondheim PowerTech
researchProduct

Key drivers of internet banking services use

2009

PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…

business.industryProduct involvementUsabilitySample (statistics)Library and Information SciencesComputer securitycomputer.software_genreStructural equation modelingComputer Science ApplicationsRisk perceptionFormative assessmentKey (cryptography)The InternetMarketingbusinesscomputerInformation SystemsOnline Information Review
researchProduct

New client puzzle approach for DoS resistance in ad hoc Networks

2010

In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.

business.industryWireless ad hoc networkComputer scienceServerMathematicsofComputing_GENERALCryptographyDenial-of-service attackComputational problemLatency (engineering)businessQA76Computer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Contractual satisfaction: drivers and implication for theory

2014

The aim of inter-firm relations is to achieve each firm’s objectives. The achievement of these objectives is reflected in firms’ satisfaction. Satisfaction as a concept can be studied at different levels and contractual relations is one such level. Most studies on inter-firm satisfaction have looked at the general level of satisfaction, whose drivers are complex to account for. This study aims to investigate contractual satisfaction from the perspective of some of its key drivers. The main finding suggests that, while ongoing term specificity, contingent adaptability, reputation and trust have a positive influence on contractual satisfaction, opportunism has a negative one.

business.industrymedia_common.quotation_subjectPerspective (graphical)Public relationsGeneral Business Management and AccountingAdaptabilityTerm (time)MicroeconomicsGeneral levelOpportunismKey (cryptography)businessGeneral Economics Econometrics and FinanceReputationmedia_commonInternational Journal of Economics and Business Research
researchProduct

Key analytical features of mycotoxins

2014

chemistry.chemical_compoundchemistryComputer scienceKey (cryptography)Biochemical engineeringMycotoxinMycotoxins and their Implications in Food Safety
researchProduct

Creative interpretation in web design experience

2017

Insight into how people mentally represent, and thus, make sense of visual designs is the key to understanding how people interact with technological devices. This paper presents a study in which participants were asked to write their interpretations of two webpage design examples, based on what they thought they would say and what would remain as a thought. The data comprised 80 3E templates (N = 40), a template allowing participants to express experiences through writing and drawing. Inductive data analysis through a phenomenological lens revealed that supposed mental and verbal representations concentrated on the following design properties: colors, themes, interface layout and quality, …

cognitionkognitioComputer sciencemedia_common.quotation_subjectinvolvementArts and Humanities (miscellaneous)Human–computer interactionWeb designluovuus0501 psychology and cognitive sciences050107 human factorscreativitymedia_commonmental representationosallistuminenCognitive scienceta113Interpretation (philosophy)05 social sciences050301 educationCognitionCreativityComputer Graphics and Computer-Aided Designvisual web designMental representationKey (cryptography)visuaalinen suunnittelu0503 education
researchProduct

The Key Concepts of Ethics of Artificial Intelligence

2018

The growing influence and decision-making capacities of Autonomous systems and Artificial Intelligence in our lives force us to consider the values embedded in these systems. But how ethics should be implemented into these systems? In this study, the solution is seen on philosophical conceptualization as a framework to form practical implementation model for ethics of AI. To take the first steps on conceptualization main concepts used on the field needs to be identified. A keyword based Systematic Mapping Study (SMS) on the keywords used in AI and ethics was conducted to help in identifying, defying and comparing main concepts used in current AI ethics discourse. Out of 1062 papers retrieve…

databasesComputer science02 engineering and technologysystematiikkatekoäly0603 philosophy ethics and religionField (computer science)technological innovation0202 electrical engineering electronic engineering information engineeringtietokannatsystematicsautonomous automobilesta113Conceptualizationsystematiikka (biologia)06 humanities and the artsAi ethicsartificial intelligenceethicsEthics of artificial intelligenceFocus (linguistics)innovaatiotKey (cryptography)020201 artificial intelligence & image processingEngineering ethics060301 applied ethicsSystematic mappingetiikka
researchProduct

Towards a Framework for Cross-Sector Collaboration: Implementing a Resilience Information Portal

2017

Municipalities play an integral part in the strive for resilient societies. A resilient municipality is not only prepared for short-term shocks such as natural disasters but also more successful in mastering long-term stresses such as profound in-creases or decreases of population. Backed by a large-scale research project we have developed a Resilience Information Portal (RIP). It serves as an artefact to support cross-sector collaboration within a municipality. The core challenges in implementing such a portal reside not in the technological work, though. Rather, it needs to be implemented in the communication and IT strategy of a municipality and be tailored to the processes. In this arti…

education.field_of_studyKnowledge managementbusiness.industryProcess (engineering)05 social sciencesPopulationTechnology strategy020206 networking & telecommunications02 engineering and technology0506 political scienceWork (electrical)050602 political science & public administration0202 electrical engineering electronic engineering information engineeringInformation systemKey (cryptography)businesseducationNatural disasterResilience (network)
researchProduct

Efficient Power Allocation for Multi-Cell Uplink NOMA Network

2019

Digital technologies are rapidly shaping the modern concepts of urbanization. It is a key element of developing practical smart cities of the future. In fact, they are the catalyst for the increasing networking of all areas of life in a smart city. Recent development in the domain of communication technologies has opened new avenues to realize the concept of smart cities. One of such communication technology is non-orthogonal multiple access (NOMA) for future cellular communications. This article, therefore, focuses on the interference management of uplink cellular NOMA systems. Specifically, we propose a power optimization technique for NOMA to improve the sum-rate in a multi-cell environm…

energiatehokkuusComputer science5G-tekniikkamatkaviestinverkot02 engineering and technologyNomaoptimointi0203 mechanical engineeringSmart cityTelecommunications link0202 electrical engineering electronic engineering information engineeringmedicineMulti-cellSmart citybusiness.industryPower optimization020206 networking & telecommunications020302 automobile design & engineeringNakagami distributionmedicine.diseasePower optimizationCellular communicationNon-orthogonal multiple access (NOMA)Key (cryptography)älytekniikkaNakagami-mbusinessComputer networkCommunication channel2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)
researchProduct