The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developers of cloud-scale applications face a difficult decision of which kind of storage to use, summarised by the CAP theorem. Currently the choice is between classical CP databases, which provide strong guarantees but are slow, expensive, and unavailable under partition, and NoSQL-style AP databases, which are fast and available, but too hard to program against. We present an alternative: Cure...
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability...
LTE-WLAN aggregation architecture, which is under discussion in the 3GPP Release-13, can be extended to LTE-WiGig aggregation provided the millimeter-wave (mm-wave) small cell discovery and beamforming (BF) mechanism can be redesigned for the application of this aggregation architecture. In this paper, we propose a novel macro-controlled BF protocol using mm-wave beam databases for LTE-WiGig aggregation...
This paper presents the first scalable, efficient, and reliable privacy-preserving fingerprint authentication based on minutiae representation. Our method is provably secure by leveraging the Yao's classic Garbled Circuit (GC) protocol. While the concept of using GC for secure fingerprint matching has been suggested earlier, to the best of our knowledge, no prior reliable method or implementation...
We introduce GenMatch, a novel set of techniques based on hardware synthesis, for achieving efficient and scalable privacy-preserving genetic testing. Processing and handling sensitive genome data require methodologies to thwart possible attacks and data theft scenarios. The GenMatch secure genome testing method utilizes Yao's Garbled Circuit (GC) protocol and creates a formulation of the matching...
The main aim of this paper is to provide open-source and open-hardware solution for home control automation systems. Final approach uses wireless communication, solar powered sensor array and simple scale-up system network and it is called HomeBeacon. System consists of one central station and multiple portable units providing the sensor array. As a control part, various action units can be implemented...
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information...
It considers at this stage to define the structure of reliability and safe future identification system and develop or adopt appropriate algorithms and security protocols to cover vulnerabilities and risks of information. The analysis applies to exploratory research and determined that the database is inconsistent. Finally, it is necessary to have established a system of identification, authentication,...
Benchmark datasets and their corresponding evaluation protocols are commonly used by the computer vision community, in a variety of application domains, to assess the performance of existing systems. Even though text detection and recognition in video has seen much progress in recent years, relatively little work has been done to propose standardized annotations and evaluation protocols especially...
With the evolution of networks, threats or attacks with the intention of disrupting service or stealing confidential data are increasing tremendously. Networks have to be monitored constantly and protected against attacks. In this paper, a new method to analyze network traffic using Big Data techniques is introduced. This approach detects anomalous activities being carried out and malicious data being...
The recent explosive growth in convolutional neural network (CNN) research has produced a variety of new architectures for deep learning. One intriguing new architecture is the bilinear CNN (B-CNN), which has shown dramatic performance gains on certain fine-grained recognition problems [15]. We apply this new CNN to the challenging new face recognition benchmark, the IARPA Janus Benchmark A (IJB-A)...
This paper investigates vulnerability of the dorsal hand-vein biometric systems to display based presentation attacks. The database collected for our experiments consists of624 real and 312 spoof images from left and right hands of 52 subjects, of which 32 are males and 20 are females. In order to assess the vulnerability of the system, we have created artefacts in a more realistic scenario assuming...
Brain computer interface based-on silent speech decoding from electroencephalography signal is one of the purposes of this article. Brain computer interface help the patients with locked-in syndrome to communicate with the world around them. In addition to the silent speech decoding from electroencephalography, also overt and semi-overt speech decoding from electroencephalography have been investigated...
Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems have proved to be flawless, though various approaches have been used to thwart network intrusion activities...
Power utilities, as a standard, adopt Supervisory Control and Data Acquisition (SCADA) systems for efficient power system operation, maintenance and development. The automation systems (viz. SCADA) need flexibility in design and its maintenance, for utilities to leverage maximum benefit apart from possibilities of being vendor locked. Over the years, various open communication protocols and platforms...
Smart Grid, Smart Metering, Electromobility and the regulation of the power network are keywords of the transition in energy policies. In the future, the power grid will be smart. Due to this the OTH Regensburg does research in this area based on different projects. This paper presents a data collection, analyzing and monitoring software for a reference Smart Grid. We discuss two possible architectures...
Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage,...
RFID (Radio Frequency Identification) is among the most emerging and tremendously growing technologies in the field of automatic identification. The technology is far better than its other contending systems such as Barcodes and magnetic tapes as it provides optimal communication link with non line of sight capability. Several researchers have proposed various ultralightweight RFID authentication...
The importance and reach of sensors networks grows every year, however, there are still many challenges that must be addressed. One of them, is the standardized interchange of information that enable interoperability between different networks and applications. To answer this challenge, the Open Geospatial Consortium (OGC) has created the Sensor Web Enablement (SWE) specification. SWE has given place...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.