31 research outputs found

    On the security of pairing-free certificateless digital signature schemes using ECC

    Get PDF
    AbstractI cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner

    A Regulatory Model for Context-Aware Abstract Framework

    Get PDF
    Proceedings of: 23rd International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2010, Cordoba, Spain, June 1-4, 2010.This paper presents a general framework to define a context aware application and analyzes social guarantees to be considered to develop this kind of applications following legal assumptions as privacy, human rights, etc. We present a review of legal issues in biometric user identification where several legal aspects have been developed in European Union regulation and a general framework to define context aware applications. As main result, paper presents a legal framework to be taken into account in any context-based application to ensure a harmonious and coherent system for the protection of fundamental rights.This work was supported in part by Projects CICYT TIN2008-06742-C02-02/TSI, CICYT TEC2008-06732-C02-02/TEC, CAM CONTEXTS (S2009/TIC-1485) and DPS2008-07029- C02-02.Publicad

    Regulatory Model for AAL

    Get PDF
    Proceedings of: 6th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2011). Salamanca, April 6-8, 2011Abstract: In this work, authors define a set of principles that should be contained in context-aware applications (including biometric sensors) to accomplish the legal aspect in Europe and USA. Paper presents the necessity to consider legal aspect, related with pri-vacy or human rights, into the development of the incipient context based services. Clearly, context based services and Ambient Intelligence (and the most promising work area in Europe that is Ambient Assisted Living, ALL) needs a great effort in research new identification procedures.Publicad

    Supporting Multimedia Services in the Future Network with QoS-routing

    Get PDF
    The increasing demand for real-time multimedia applications for groups of users, together with the need for assuring high quality support for end-to-end content distribution is motivating the scientific community and industry to develop novel control, management and optimization mechanisms with Quality of Service (QoS) and Quality of Experience (QoE) support. In this context, this paper introduces Q-OSys (QoS-routing with Systematic Access), a distributed QoS-routing approach for enhancing future networks with autonomous mechanisms orchestrating admission control, per-class overprovisioning, IP Multicast and load-balancing to efficiently support multiuser multimedia sessions. Simulation experiments were carried to show the efficiency and impact of Q-OSys on network resources (bandwidth utilization and packet delay). Q-OSys is also evaluated from a user point-of-view, by measuring well-known objective and subjective QoE metrics, namely Peak Signal to Noise Ratio (PSNR), Structural Similarity (SSM) Video Quality Metric (VQM) and Mean Opinion Score (MOS)

    An Analysis and Design of the Redirection Schema in ForCES

    Get PDF
    The idea of Forwarding and Control Element Separation has widely accepted by next generation network researchers, the regain attention of IETF (The Internet Engineering Task Force) ForCES (Forwarding and Control Element Separation) is the best proof. An IP tunnel-based redirection schema was proposed to solve the problem of routing protocol messages interaction between ForCES router and the external merchant routers. The technology of network virtualization is introduced to map network interface from ForCES FE (Forwarding Element) to CE (Control Element) which collaborating with the redirect schema

    Platform Image Processing Applied to the Study of Retinal Vessels

    Get PDF
    Recent studies have found retinal vessel caliber to be related to the risk of hypertension, left ventricular hypertrophy, metabolic syndrome, stroke and others coronary artery diseases. The vascular system in the human retina is easily perceived in its natural living state by the use of a retinal camera. Nowadays, there is general experimental agreement on the analysis of the patterns of the retinal blood vessels in the normal human retina. The development of automated tools designed to improve performance and decrease interobserver variability, therefore, appears necessary. This paper presents a study focused on developing a technological platform specialized in assessing retinal vessel caliber and describing the relationship of the results obtained to cardiovascular risk

    Certificateless Proxy Signature from RSA

    Get PDF
    Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme from RSA and prove its security under the strongest security model where the Type I/II adversary is a super Type I/II adversary

    ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks

    Get PDF
    Software-defined networks (SDNs) have become a mechanism to separate the control plane and the data plane in the communication in networks. SDNs involve several challenges around their security and their confidentiality. Ideally, SDNs should incorporate autonomous and adaptive systems for controlling the routing to be able to isolate network resources that may be malfunctioning or whose security has been compromised with malware. The current work introduces a novel agent-based framework that simulates SDN isolation protocols by means of trust and reputation models. This way, SDN programmers may estimate the repercussions of certain isolation protocols based on trust models before actually deploying the protocol into the network

    Evalutionary algorithms for ship hull skinning approximation

    Get PDF
    Traditionally, the design process of a hull involves simulation using clay models. This must be done cautiously, accurately and efficiently in order to sustain the performance of ship. Presently, the current technology of Computer Aided Design, Manufacturing, Engineering and Computational Fluid Dynamic has enabled a 3D design and simulation of a hull be done at a lower cost and within a shorter period of time. Besides that, automated design tools allow the transformation of offset data in designing the hull be done automatically. One of the most common methods in constructing a hull from the offset data is the skinning method. Generally, the skinning method comprised of skinning interpolation and skinning approximation. Skinning interpolation constructs the surface perfectly but improper selection of parameterization methods may cause bumps, wiggles, or uneven surfaces on the generated surface. On the other hand, using the skinning surface approximation would mean that the surface can only be constructed closer to data points. Thus, the error between the generated surface and the data points must be minimized to increase the accuracy. Therefore, this study aims to solve the error minimization problem in order to produce a smoother and fairer surface by proposing Non Uniform Rational B-Spline surface using various evolutionary optimization algorithms, namely, Gravitational Search Algorithm, Particle Swarm Optimization and Genetic Algorithm. The proposed methods involve four procedures: extraction of offset data from line drawing plan; generation of control points; optimization of a surface; and validations of hull surfaces. Validation is done by analyzing the surface curvature and errors between the generated surface and the given data points. The experiments were implemented on both ship hull and free form models. The findings from the experiments are compared with interpolated skinning surface and conventional skinning surface approximation. The results show that the optimized skinning surfaces using the proposed methods yield a smaller error, less control points generation and feasible surfaces while maintaining the shape of the hull
    corecore