The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Musculo—endinous transfers (MTTs) to treat massive irreparable rotator cuff tears have been proposed since the eighties (1) and are still the subject of considerable interest in the recent literature (2–29). A musculo—tendinous transfer is that procedure in which the tendon of insertion of a normal “donor” muscle with blood and nerve supply intact is divided and reinserted into a bony part or into...
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
This innovative demonstration shows strong authentication (without password) for OPENID, according to a plug and play paradigm, based on SSL smart cards. It presents two user experiences, a plug and play strong authentication with real OpenID WEB sites, and remote identity management by an original identity server compatible with SSL smart cards.
This paper describes a possible implementation for the innovative and highly secure networking architecture dedicated to the Internet of Things (IoT). We propose an infrastructure that works with a new type of tags, supporting the upcoming standard Host Identity Protocol (HIP). Our main concern is to ensure RFID tags privacy, while enabling things to things communications.
In this paper we introduce ASN.1 scripts, securely computing cryptographic keys-trees, in smart cards. Keys-trees are used by various protocols such as AKA or EAP that are going to be deployed in next generations of wireless networks (WLAN, WiMAX, EUTRAN..). They provide services such as fast re-authentication, handover management, or Mobile IP support. We propose a trusted computing architecture...
This paper introduces a new paradigm for strong authentication within the WEB2 landscape. We detail SSL smart cards working with dual SSL stacks. We describe the structure of a cheap client's platform, and we analyze its real time performances. We also take into account the impact of these infrastructures for WEB server's setup. Finally, we suggest solving scalability issues for credentials distribution,...
This demonstration shows a Web application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the Web site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.
This paper deals with a new communication paradigm named HIP-tags. It introduces a new type of RFID, which communicates with the Internet thanks to the host identifier protocol, recently defined by the IETF. A modified version of this protocol has been studied, and an experimental platform will be deployed by 2009.
Nowadays, the TLS protocol (transport layer security) is the de facto standard for securing transactions across the Internet. It provides end-to-end secure communications with one way or mutual authentication between two network nodes. However, this protocol suffers from serious vulnerabilities because classical software implementations are not trusted and allow the use of falsified credentials (e...
This paper describes an innovative and highly secure networking architecture, dedicated to the Internet of things (IoT). We propose an infrastructure that works with a new type of tags, supporting the recently standardized host identity protocol (HIP). Our main concern is to ensure RFID tags privacy, while enabling things to things communications.
This paper presents a new concept, called tandem, dedicated to smart cards that control TLS-based applications. The originality of this approach is to introduce a collaborative process between a smart card and its docking host. This technology enables the secure downloading of a huge amount of data, in untrustworthy computers. We present software paradigms and APIs that facilitate the practical deployment...
We present new regional petrologic, geochemical, Sr–Nd isotopic, and U–Pb geochronological data on the Turonian–Campanian mafic igneous rocks of Central Hispaniola that provide important clues on the development of the Caribbean island-arc. Central Hispaniola is made up of three main tectonic blocks—Jicomé, Jarabacoa and Bonao—that include four broad geochemical groups of Late Cretaceous mafic igneous...
In this paper we present an innovative collaborative technology, called TLS-Tandem, which increases trust for SSL-based applications. We introduce an architecture dealing with two SSL software stacks, running in tamper resistant devices such as smart cards and untrustworthy computers. We analyze performances observed with commercial smart cards, and describe an experimental platform enforcing security...
Session Initiation Protocol (SIP) is an application-layer signaling and control protocol for creating, modifying and terminating sessions including Internet telephone calls, multimedia distribution and multimedia conferences. Flexible, extensible and open, SIP has a complete security mechanism that allows security of both media and signaling. SIP RFC recommends the use of TLS or DTLS (Datagram TLS...
Securing data delivery is a challenging issue. In fact, we have to defend against control and data plane attacks. We propose an architecture that provide origin authentication and prefix validity as well as availability. This architecture can be incrementally deployed and doesn't require huge computational resources at routers.
This paper presents a highly secure Wi-Fi infrastructure, in which smart cards are used as EAP client and EAP server, respectively on client's terminal and RADIUS server. Although cheap and secure, this architecture is scalable, because hundreds of EAP smart cards may be deployed on the server side.
Humeral head retroversion is not well described with the literature controversial regarding accuracy of measurement methods and ranges of normal values. We therefore determined normal humeral head retroversion and assessed the measurement methods. We measured retroversion in 65 cadaveric humeri, including 52 paired specimens, using four methods: radiographic, computed tomography (CT) scan, computer-assisted,...
Located in the Cordillera Central of the Dominican Republic, the Late Cretaceous Tireo Fm (TF) records a major change of the magma sources in the Caribbean island arc. It comprises a >3 km thick sequence of arc-related volcanic and volcano-sedimentary rocks with variable geochemical characteristics. Combined detailed mapping, stratigraphy, geochemistry and U–Pb/Ar–Ar geochronology show that the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.