The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
Recently, the implementation of IoT technology development has been growing rapidly. One of IoT applications is smart home system. In this system, in-home hardwares are connected to the internet. Thus, residents can access them using any internet-connected devices, such as mobile phones. Since the main concern of the IoT system is communication, the design of an efficient and secure communication...
Nowadays, many requirements must be fulfilled in relation to the application of agrochemicals in different productive stages of the export fruit in Chile. Agronomists in charge of productive orchards should consult different sources of information before proceeding to apply a certain product. This is based on technical guides and protocols that are also modified from time to time, which implies a...
Facial expression recognition is a very important research field to understand human emotions. Many facial expression recognition systems have been proposed in the literature over the years. Some of these methods use neural network approaches with deep architectures to address the problem. Although it seems that the facial expression recognition problem has been solved, there is a large difference...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
We study the secure storage of the output of a data source on a public database. We consider a rather large class of data sources. In order to prevent unauthorized users from learning the output of the data source we make use of the output of a biometric source or a physical unclonable function (PUF). As we regard the output of the PUF source as a resource, we are interested in the smallest possible...
In this paper, we propose an access control architecture for IoT systems by developing a hybrid model with attributes, capabilities and role-based access control. We apply attributes for role-membership assignment and in permission evaluation, Membership of roles grants capabilities which are used to access specific services provided by things. This approach improves policy management for IoT systems...
In this work, the Curvelet transform is proposed as a fairly new feature extraction method for palmprint recognition. Particularly, a multiscale analysis has been performed at four levels, assessing and combining the features extracted at each level in order to find those which better represent the palmprint. Feature matching has been conducted by means of Euclidean distance and Support Vector Machines...
In the last decade, we have seen the emergence of the Bitcoin crypto-currency, where the Blockchain technology builds trust transaction after transaction through a validation process. Academics focused their research on security flaws or improvement, but we identify a lack of literature on how the validation of transaction and block proceeds. In fact, understanding the validation will help the conception...
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
At the Charles University, Faculty of Medicine, in Hradec Kralove, the Biophysics and Biostatics subject is implemented as a traditional combination, i.e. contact, educational method and e-learning. The e-learning is realized in the LMS Moodle in the “multicourses” called Biophysics and Biostatics — General Medicine and Biophysics and Biostatics — Dentistry. A process of teaching during the whole...
We propose a new method in rank level fusion for biometric identification. Our method is based on the pool adjacent violators (PAV) algorithm after the ranks have been transformed to the approximated scores. We then show that our method outperforms various approaches that commonly used in biometric rank level fusion on NIST BSSR1 multimodal database.
System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no connection to job information and do not utilize hardware performance monitoring (HPM) data. To increase the efficient use of HPC systems automatic and continuous performance monitoring of jobs is an essential component. It can help to identify pathological...
This paper describes presentation attack detection systems developed for the Automatic Speaker Verification Spoofing and Countermeasures Challenge (ASVspoof 2017). The submitted systems, using calibration and score fusion techniques, combine different sub-systems (up to 18), which are based on eight state of the art features and rely on Gaussian mixture models and feed-forward neural network classifiers...
A tele-monitoring system, based on a soft transducer network, developed by students of the Course "Measurements on Communications Network" (MRC), at the Department of Electrical Engineering and Information Technology, University of Naples Federico II, is presented. This project is the result of an innovative education approach for (i) overcoming specialization of single Courses on different...
In the last years, several papers on EEG-based biometric recognition systems have been published. Specifically, most of the proposed contributions focus on brain signals recorded in resting state conditions, with either closed or open eyes. A common assumption is that the acquired signals are quasi-stationarity. In this paper, we investigate such property in terms of discriminative capability, and...
Personal cloud storage services are gaining popularity, such as SkyDrive, iCloud, Dropbox, etc. All of them provide a certain amount of free storage space for individual users, while the free space is quite limit, and you should upgrade to a paid account to get extra space. Therefore, a new approach is proposed in this paper, that many free personal cloud storage accounts are integrated in order to...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational model using the sequence of games approach, and define honest-butcurious (semi-honest) security using a variation of the real/ideal paradigm in which, for each protocol party, an adversary chooses protocol inputs in an attempt to distinguish the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.