Search results for "secrecy"

showing 10 items of 22 documents

Who sent the e-mail?

2003

In mid October 2001, a number of lecturers at the University of Valencia received insulting, threatening and anonymous electronic mails. An investigation about this fact is only permitted under very restricted conditions, stipulated by the Spanish law of the Secrecy of Communications. Only one judicial authority is able to lift these restrictions and authorize information to be checked in order to obtain enough evidence to unveil who was responsible for the messages. The authors propose in this paper a study for quantifying the weight of certain evidence with a view to show to the judge that the relevance of the said weight would justify such a measure.

PhilosophyEngineeringOrder (business)business.industryLawJudicial authoritySecrecyRelevance (law)Statistics Probability and UncertaintybusinessLawLaw, Probability and Risk
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems

2019

Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near user) to act as a relay between the source and the user experiencing poor channel (far user). This paper considers the link security aspect of energy harvesting cooperative NOMA users. In particular, the near user applies the decode-and-forward (DF) protocol for relaying the message of the source no…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer scienceDecode-and-forward (DF)050801 communication & media studies5G-tekniikkalaw.inventionNonorthogonal multiple access (NOMA)NomaComputer Science - Networking and Internet Architecturelangaton tiedonsiirto0508 media and communicationsoptimointiRelaylawRobustness (computer science)0502 economics and businessSecrecymedicineFOS: Electrical engineering electronic engineering information engineeringElectrical Engineering and Systems Science - Signal ProcessingtietoturvaNetworking and Internet Architecture (cs.NI)business.industryDeep learningPower-splitting05 social sciencesDeep learningmedicine.diseasekoneoppiminen050211 marketingArtificial intelligencebusinessDecoding methodsEfficient energy useComputer networkCommunication channel
researchProduct

Practicing Ballot Secrecy : Postal Voting and the Witness Requirement at the 2019 Finnish Elections

2021

Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…

asuminen ulkomaillaexternal votersPublic AdministrationSociology and Political Sciencenon-resident citizenspostal votingennakkoäänestysvaalilakivotingPolitical Science and International Relations5171 Political Scienceäänestäminenelectoral practicesSafety Researchballot secrecyvaalitFinland
researchProduct

Zasięg korporacyjnego upoważnienia aplikanta do zastępstwa

2023

Upoważnienie aplikanta do zastępstwa funkcjonuje od dawna. Jako że ma charakter tylko albo aż upoważnienia korporacyjnego, stąd też na tym tle jest ono różnie postrzegane. Do tego dochodzą dylematy w zakresie pełnienia przez profesjonalnego pełnomocnika funkcji kuratora, a także kwestia udzielenia upoważnienia do zastępstwa dla aplikanta czy nawet substytucji procesowej dla innego profesjonalnego pełnomocnika w osobie adwokata lub radcy prawnego. Wielość wątków z uwagi na szerokie spektrum aktywności aplikanta, co wiązać należy z odbywaną przez niego aplikacją adwokacką albo radcowską, pociąga za sobą konieczność umiejscowienia go w szeroko rozumianym wymiarze sprawiedliwości jako osoby qua…

authorisation to defendtrainee advocatekorporacje prawniczeprofesjonalny pełnomocnik procesowyurgent legal actionsubstitution power of attorneyprofessional litigation representativekuratorpełnomocnictwo substytucyjnedefence attorneypower of attorney to represent in court proceedingsguardian ad litemupoważnienie do obronynagła czynność procesowatrainee attorneyat lawadvocateattorney-at-lawadwokatpełnomocnictwo procesoweradca prawnydefence secrecytajemnica obrończalaw corporationsobrońcaupoważnienie korporacyjne do zastępstwaaplikant radcowskicorporate mandate for representationaplikant adwokackiPalestra
researchProduct

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

Managing skunkworks to achieve ambidexterity: The Robinson Crusoe effect

2021

Abstract Literature on ambidexterity emphasizes the need for both exploration and exploitation. Large firms usually choose to implement structural ambidexterity to separate both activities. We here focus on an extreme case of such structural partitioning implemented as a secret skunkworks project in a large French automotive company. A qualitative survey using both primary and secondary data shows that the major basic and initial characteristics of a skunkworks (i.e. secrecy, urgency, and autonomy) created favorable conditions for the technological exploration. However, exploitation failed due to precisely those same characteristics coupled with the fact that the project did not respond to …

business.industryStrategy and Managementmedia_common.quotation_subject05 social sciencesAutomotive industrySkunkworks projectQualitative surveySupply and demand0502 economics and businessSecrecy050211 marketingBusiness050203 business & managementAutonomyIndustrial organizationmedia_commonAmbidexterityEuropean Management Journal
researchProduct

Michelin : du culte du secret à la transparence?

2015

Transparency the ultimate virtue of society, the guarantee of truth (?), between right and duty, is often expressed in opposition to secret or even lie. Organizations are faced with and often trapped between these extremes. The Michelin Corporation that will serve as the basis for our analysis is often presented as the Corporation of secrecy. As a real myth in our collective consciousness, it illustrates the dual relationship between transparency and secrecy, which appeared to have been successful given its longevity and ranking among the largest French leading companies in terms of CSR. From the materiality of objects and spaces to intangible rhetoric, the Group comprehensive communication…

transparency[SHS.INFO]Humanities and Social Sciences/Library and information sciencessecrettransparenceethics[SHS.INFO] Humanities and Social Sciences/Library and information sciencessecrecyaestheticstechnologyéthiqueCSResthétiquetechnologieRSE
researchProduct