Search results for "cryptography"
showing 10 items of 657 documents
Efficient distributed average consensus in wireless sensor networks
2020
International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…
Understanding the determinants of the magnitude of entity-level risk and account-level risk key audit matters: The case of the United Kingdom
2019
Abstract This study was conducted to analyse the influence of auditor and client characteristics on the magnitude and type of key audit matters (KAM) disclosed in the audit reports of the FTSE 100 companies in the UK during the period 2013–2016. A recently introduced standard requires auditors to reveal the main risks faced by the client and to describe how these are addressed in the audit. Our results show that Deloitte, EY and KPMG tend to report fewer entity-level-risk KAM (ELRKAM) than PwC, while KPMG and BDO report fewer account-level-risk KAM (ALRKAM) than PwC. In general, auditors of companies that pay higher audit services fees present more ELRKAM and fewer ALRKAM. Our findings also…
Las cuestiones clave de auditoría esperadas en España: ¿son los auditores previsibles?
2019
La modificación del contenido del informe de auditoria responde a la aplicación de la exigencia impuesta por el art. 5 de la Ley de Auditoria y concretada por la NIA-ES 701 “Cuestiones clave de auditoria” (CCA) (ICAC, 2016). Como novedad se exige al auditor que, atendiendo a su juicio profesional, muestre en el informe los riesgos más significativos de la auditoría de la empresa y las respuestas a esos riesgos. Debido a que dentro del entorno europeo, el Reino Unido ya viene informando de dichos riesgos desde 2013 y que en España todavía no disponemos de los mismos, hemos planteado esta investigación. El objetivo es pronosticar el nivel de CCA que previsiblemente nos encontraremos en España…
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
Q-Chem 2.0: a high-performanceab initio electronic structure program package
2000
ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
2019
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…
Predicting mobile apps spread: An epidemiological random network modeling approach
2017
[EN] The mobile applications business is a really big market, growing constantly. In app marketing, a key issue is to predict future app installations. The influence of the peers seems to be very relevant when downloading apps. Therefore, the study of the evolution of mobile apps spread may be approached using a proper network model that considers the influence of peers. Influence of peers and other social contagions have been successfully described using models of epidemiological type. Hence, in this paper we propose an epidemiological random network model with realistic parameters to predict the evolution of downloads of apps. With this model, we are able to predict the behavior of an app…
Decoding Children's Social Behavior
2013
We introduce a new problem domain for activity recognition: the analysis of children's social and communicative behaviors based on video and audio data. We specifically target interactions between children aged 1-2 years and an adult. Such interactions arise naturally in the diagnosis and treatment of developmental disorders such as autism. We introduce a new publicly-available dataset containing over 160 sessions of a 3-5 minute child-adult interaction. In each session, the adult examiner followed a semi-structured play interaction protocol which was designed to elicit a broad range of social behaviors. We identify the key technical challenges in analyzing these behaviors, and describe met…
On Big Data: How should we make sense of them?
2020
The topic of Big Data is today extensively discussed, not only on the technical ground. This also depends on the fact that Big Data are frequently presented as allowing an epistemological paradigm shift in scientific research, which would be able to supersede the traditional hypothesis-driven method. In this piece, I critically scrutinize two key claims that are usually associated with this approach, namely, the fact that data speak for themselves, deflating the role of theories and models, and the primacy of correlation over causation. In so doing, I will also refer to a recent case history of data mining projects in the field of biomedicine, i.e. EXPOsOMICS. My intention is both to acknow…