Search results for "secrecy"
showing 10 items of 22 documents
Who sent the e-mail?
2003
In mid October 2001, a number of lecturers at the University of Valencia received insulting, threatening and anonymous electronic mails. An investigation about this fact is only permitted under very restricted conditions, stipulated by the Spanish law of the Secrecy of Communications. Only one judicial authority is able to lift these restrictions and authorize information to be checked in order to obtain enough evidence to unveil who was responsible for the messages. The authors propose in this paper a study for quantifying the weight of certain evidence with a view to show to the judge that the relevance of the said weight would justify such a measure.
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
SecureBallot: A secure open source e-Voting system
2021
Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…
Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems
2019
Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near user) to act as a relay between the source and the user experiencing poor channel (far user). This paper considers the link security aspect of energy harvesting cooperative NOMA users. In particular, the near user applies the decode-and-forward (DF) protocol for relaying the message of the source no…
Practicing Ballot Secrecy : Postal Voting and the Witness Requirement at the 2019 Finnish Elections
2021
Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…
Zasięg korporacyjnego upoważnienia aplikanta do zastępstwa
2023
Upoważnienie aplikanta do zastępstwa funkcjonuje od dawna. Jako że ma charakter tylko albo aż upoważnienia korporacyjnego, stąd też na tym tle jest ono różnie postrzegane. Do tego dochodzą dylematy w zakresie pełnienia przez profesjonalnego pełnomocnika funkcji kuratora, a także kwestia udzielenia upoważnienia do zastępstwa dla aplikanta czy nawet substytucji procesowej dla innego profesjonalnego pełnomocnika w osobie adwokata lub radcy prawnego. Wielość wątków z uwagi na szerokie spektrum aktywności aplikanta, co wiązać należy z odbywaną przez niego aplikacją adwokacką albo radcowską, pociąga za sobą konieczność umiejscowienia go w szeroko rozumianym wymiarze sprawiedliwości jako osoby qua…
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
2012
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs
2011
How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.
Managing skunkworks to achieve ambidexterity: The Robinson Crusoe effect
2021
Abstract Literature on ambidexterity emphasizes the need for both exploration and exploitation. Large firms usually choose to implement structural ambidexterity to separate both activities. We here focus on an extreme case of such structural partitioning implemented as a secret skunkworks project in a large French automotive company. A qualitative survey using both primary and secondary data shows that the major basic and initial characteristics of a skunkworks (i.e. secrecy, urgency, and autonomy) created favorable conditions for the technological exploration. However, exploitation failed due to precisely those same characteristics coupled with the fact that the project did not respond to …
Michelin : du culte du secret à la transparence?
2015
Transparency the ultimate virtue of society, the guarantee of truth (?), between right and duty, is often expressed in opposition to secret or even lie. Organizations are faced with and often trapped between these extremes. The Michelin Corporation that will serve as the basis for our analysis is often presented as the Corporation of secrecy. As a real myth in our collective consciousness, it illustrates the dual relationship between transparency and secrecy, which appeared to have been successful given its longevity and ranking among the largest French leading companies in terms of CSR. From the materiality of objects and spaces to intangible rhetoric, the Group comprehensive communication…