Search results for "software"
showing 10 items of 7396 documents
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
2020
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining
2021
This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…
On the Use of a GPU-Accelerated Mobile Device Processor for Sound Source Localization
2017
Abstract The growing interest to incorporate new features into mobile devices has increased the number of signal processing applications running over processors designed for mobile computing. A challenging signal processing field is acoustic source localization, which is attractive for applications such as automatic camera steering systems, human-machine interfaces, video gaming or audio surveillance. In this context, the emergence of systems-on-chip (SoC) that contain a small graphics accelerator (or GPU), contributes a notable increment of the computational capacity while partially retaining the appealing low-power consumption of embedded systems. This is the case, for example, of the Sam…
Bit-parallel approximate pattern matching: Kepler GPU versus Xeon Phi
2016
Advanced SIMD features on GPUs and Xeon Phis promote efficient long pattern search.A tiled approach to accelerating the Wu-Manber algorithm on GPUs has been proposed.Both the GPU and Xeon Phi yield two orders-of-magnitude speedup over one CPU core.The GPU-based version with tiling runs up to 2.9 × faster than the Xeon Phi version. Approximate pattern matching (APM) targets to find the occurrences of a pattern inside a subject text allowing a limited number of errors. It has been widely used in many application areas such as bioinformatics and information retrieval. Bit-parallel APM takes advantage of the intrinsic parallelism of bitwise operations inside a machine word. This approach typica…
Broker and Federation Based Cloud Networking Architecture for IaaS and NaaS QoS Guarantee
2016
International audience; Today, the Cloud networking aspect is a critical factor for adopting the Cloud computing approach. The main drawback of Cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). This paper presents a framework for resource allocation according to an end-to-end SLA established between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) in a Cloud networking environment. We focus on QoS parameters for Network as a Service (NaaS) and Infrastructure as a Service (IaaS) services. In addition, we propose algorithms for the best CSPs selection to allocate Vi…
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
Peer-to-Peer-Technologien — Einflüsse digitaler dezentraler Ressourcennutzung auf elektronische Märkte
2003
Peer-to-Peer-Systeme sind in jungerer Zeit hauptsachlich durch die verbreiteten und oft kritisierten Musiktauschborsen wie Napster1 oder Gnutella2 bekannt geworden. Oftmals wird „Peer-to-Peer“sogar mit dem Austausch von Musik- und Videodateien gleichgesetzt. Diese Reduzierung des Begriffs auf das blose Austauschen von Dateien (Filesharing) wird jedoch nicht dem Peer-to-Peer-Begriff und erst recht nicht dem Potenzial des Peer-to-Peer Computing gerecht. Filesharing darf insofern nur als eine spezielle Applikation gesehen werden, die sich mit Hilfe von Peer-to-Peer-Technologien bewaltigen lasst.
Language complexity in on-line health information retrieval
2020
The number of people searching for on-line health information has been steadily growing over the years so it is crucial to understand their specific requirements in order to help them finding easily and quickly the specific in-formation they are looking for. Although generic search engines are typically used by health information seekers as the starting point for searching information, they have been shown to be limited and unsatisfactory because they make generic searches, often overloading the user with the provided amount of results. Moreover, they are not able to provide specific information to different types of users. At the same time, specific search engines mostly work on medical li…
ULearn: Personalized Medical Learning on the Web for Patient Empowerment
2019
Abstract. Health literacy constitutes an important step towards patient empowerment and the Web is presently the biggest repository of medical information and, thus, the biggest medical resource to be used in the learning process. However, at present web medical information is mainly accessed through generic search engines that do not take into account the user specific needs and starting knowledge and so are not able to support learning activities tailored to the specific user requirements. This work presents “ULearn” a meta engine that supports access, understanding and learning on the Web in the medical domain based on specific user requirements and knowledge levels towards what we call …