Search results for "cryptography"

showing 10 items of 657 documents

Efficient distributed average consensus in wireless sensor networks

2020

International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…

AtomicitySpeedupComputer Networks and CommunicationsSynchronization networksComputer sciencebusiness.industry020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumptionLoad balancing (computing)[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Consensus[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Distributed algorithm0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputer Communications
researchProduct

Understanding the determinants of the magnitude of entity-level risk and account-level risk key audit matters: The case of the United Kingdom

2019

Abstract This study was conducted to analyse the influence of auditor and client characteristics on the magnitude and type of key audit matters (KAM) disclosed in the audit reports of the FTSE 100 companies in the UK during the period 2013–2016. A recently introduced standard requires auditors to reveal the main risks faced by the client and to describe how these are addressed in the audit. Our results show that Deloitte, EY and KPMG tend to report fewer entity-level-risk KAM (ELRKAM) than PwC, while KPMG and BDO report fewer account-level-risk KAM (ALRKAM) than PwC. In general, auditors of companies that pay higher audit services fees present more ELRKAM and fewer ALRKAM. Our findings also…

Auditor's reportbusiness.industryAccountingKey (cryptography)AccountingAuditbusinessThe British Accounting Review
researchProduct

Las cuestiones clave de auditoría esperadas en España: ¿son los auditores previsibles?

2019

La modificación del contenido del informe de auditoria responde a la aplicación de la exigencia impuesta por el art. 5 de la Ley de Auditoria y concretada por la NIA-ES 701 “Cuestiones clave de auditoria” (CCA) (ICAC, 2016). Como novedad se exige al auditor que, atendiendo a su juicio profesional, muestre en el informe los riesgos más significativos de la auditoría de la empresa y las respuestas a esos riesgos. Debido a que dentro del entorno europeo, el Reino Unido ya viene informando de dichos riesgos desde 2013 y que en España todavía no disponemos de los mismos, hemos planteado esta investigación. El objetivo es pronosticar el nivel de CCA que previsiblemente nos encontraremos en España…

Auditor's reportbusiness.industryEspañaAuditingAccountingSample (statistics)AuditAudit reportSpainOrder (exchange)AccountingKey (cryptography)NIA 701ISA 701Informe de auditoríaAuditoríaUKBusinessCuestiones clave de auditoríaKey Audit MattersReino UnidoRevista de Contabilidad
researchProduct

Optical security and encryption with totally incoherent light

2001

We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.

AuthenticationHigh securitybusiness.industryComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical securityEncryptionAtomic and Molecular Physics and OpticsOptical encryptionDiffractive lensOpticsComputer Science::MultimediabusinessOptical processorComputer Science::DatabasesComputer Science::Cryptography and SecurityOptics Letters
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Q-Chem 2.0: a high-performanceab initio electronic structure program package

2000

ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…

Basis (linear algebra)Computer programProgramming languageComputer sciencePrincipal (computer security)Theoretical modelsAb initioGeneral ChemistryElectronic structurecomputer.software_genreComputational scienceComputational MathematicsKey (cryptography)Density functional theorycomputerJournal of Computational Chemistry
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Predicting mobile apps spread: An epidemiological random network modeling approach

2017

[EN] The mobile applications business is a really big market, growing constantly. In app marketing, a key issue is to predict future app installations. The influence of the peers seems to be very relevant when downloading apps. Therefore, the study of the evolution of mobile apps spread may be approached using a proper network model that considers the influence of peers. Influence of peers and other social contagions have been successfully described using models of epidemiological type. Hence, in this paper we propose an epidemiological random network model with realistic parameters to predict the evolution of downloads of apps. With this model, we are able to predict the behavior of an app…

Behavior over timeRandom graph050103 clinical psychologyComputer scienceeducation05 social sciencesMobile appsMechanical engineeringEpidemiological random network050109 social psychologyComputer Graphics and Computer-Aided DesignData scienceRandom network modelTerm (time)UploadModeling and Simulationmental disordersKey (cryptography)0501 psychology and cognitive sciencesMobile app spreadPredictionMATEMATICA APLICADASoftwareNetwork modelSIMULATION
researchProduct

Decoding Children's Social Behavior

2013

We introduce a new problem domain for activity recognition: the analysis of children's social and communicative behaviors based on video and audio data. We specifically target interactions between children aged 1-2 years and an adult. Such interactions arise naturally in the diagnosis and treatment of developmental disorders such as autism. We introduce a new publicly-available dataset containing over 160 sessions of a 3-5 minute child-adult interaction. In each session, the adult examiner followed a semi-structured play interaction protocol which was designed to elicit a broad range of social behaviors. We identify the key technical challenges in analyzing these behaviors, and describe met…

Behavior Psychology Dataset Video analysis Speech Analysis AutismInter-action protocolsSocial and communicative behaviorInteraction protocol02 engineering and technologycomputer.software_genreAnnan data- och informationsvetenskapSession (web analytics)Activity recognitionTechnical challenges0202 electrical engineering electronic engineering information engineeringmedicineSocial behaviorAudio signal processingMultimediabusiness.industryDevelopmental disorders020207 software engineeringmedicine.diseaseSemi-structuredResearch questionsActivity recognitionProblem domainKey (cryptography)Autism020201 artificial intelligence & image processingArtificial intelligencePsychologybusinessOther Computer and Information SciencecomputerCognitive psychologySocial behavior2013 IEEE Conference on Computer Vision and Pattern Recognition
researchProduct

On Big Data: How should we make sense of them?

2020

The topic of Big Data is today extensively discussed, not only on the technical ground. This also depends on the fact that Big Data are frequently presented as allowing an epistemological paradigm shift in scientific research, which would be able to supersede the traditional hypothesis-driven method. In this piece, I critically scrutinize two key claims that are usually associated with this approach, namely, the fact that data speak for themselves, deflating the role of theories and models, and the primacy of correlation over causation. In so doing, I will also refer to a recent case history of data mining projects in the field of biomedicine, i.e. EXPOsOMICS. My intention is both to acknow…

Big DataValue (ethics)causalityMultidisciplinarydata-driven scienceComputer sciencebusiness.industryBig dataepistemologyopacity of algorithm.Data scienceend of theoryHistory and Philosophy of ScienceParadigm shiftKey (cryptography)CausationHeuristicsbusinessMètode Revista de difusió de la investigació
researchProduct