110,323 research outputs found
Track Extrapolation and Distribution for the CDF-II Trigger System
The CDF-II experiment is a multipurpose detector designed to study a wide
range of processes observed in the high energy proton-antiproton collisions
produced by the Fermilab Tevatron. With event rates greater than 1MHz, the
CDF-II trigger system is crucial for selecting interesting events for
subsequent analysis. This document provides an overview of the Track
Extrapolation System (XTRP), a component of the CDF-II trigger system. The XTRP
is a fully digital system that is utilized in the track-based selection of high
momentum lepton and heavy flavor signatures. The design of the XTRP system
includes five different custom boards utilizing discrete and FPGA technology
residing in a single VME crate. We describe the design, construction,
commissioning and operation of this system.Comment: 34 pages, 9 figures, submitted to Nucl.Inst.Meth.
Tanda Tangan Digital: Otoritas pada Arsip Elektronik
The Covid19 pandemic has triggered more massive and extensive use of electronic records due to the Work from Home policy. One of the keys in using electronic records is a digital signature as an authorization stamp for the electronic record. The concept of authentic digital signature and integrity is still unfamiliar to policymakers, which can lead to legality problems in the future. Digital signatures have three levels of validity from basic, advanced, to high. Not all levels produce electronic records that have legal force, so it is necessary to handle with extra concern to their use of digital signature in institutions or organizations. This writing aims to provide an overview of the concept of a digital signature that is authentic, accountable, and integrity. This writing uses a qualitative method. The result of this writing is that the digital signature must go through encryption and verification so that the digital signature has legal force and what its implementation of digital signature in several countries, including Indonesia
Body language, security and e-commerce
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBMâs Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
An Overview of Hash Based Signatures
Digital signatures are one of the most basic cryptographic building blocks which are utilized to provide attractive security features like authenticity, unforgeability, and undeniability. The security of existing state of the art digital signatures is based on hardness of number theoretic hardness assumptions like discrete logarithm and integer factorization. However, these hard problems are insecure and face a threat in the quantum world. In particular, quantum algorithms like Shorâs algorithm can be used to solve the above mentioned hardness problem in polynomial time. As an alternative, a new direction of research called post-quantum cryptography (PQC) is supposed to provide a new generation of quantum-resistant digital signatures. Hash based signature is one such candidate to provide post quantum secure digital signatures. Hash based signature schemes are a type of digital signature scheme that use hash functions as their central building block. They are efficient, flexible, and can be used in a variety of applications. In this document, we provide an overview of the hash based signatures. Our presentation of the topic covers a wide range of aspects that are not only comprehensible for readers without expertise in the subject matter, but also serve as a valuable resource for experts seeking reference material
Recommended from our members
Do social networking groups support online petitions?
This article is the post-print version of the final paper that has been accepted for publication and is forthcoming in Transforming Government: People, Process and Policy. Copyright @ Emerald Group Publishing LimitedEPetitioning has been emerging as arguably the most important eParticipation institutional activity. This paper aims to provide some insights into how ePetitions are perceived and supported by social networking sites. The connection between the UK governmentâs ePetitioning system and social networking groups linking to governmental petitions was investigated. Online data from Facebook were collected and analysed with respect to numbers of supporters compared to official signatures. The results indicate that although the process of signing an official petition is not more complex than joining a Facebook group, the membership of respective Facebook groups can be much higher. In particular, certain topics experienced very high support on Facebook which did not convert to signatures. The paper raises interesting questions about the potential uptake of citizen-government interactions in policy making mechanisms.The online research tool used for data collection in this paper was developed by Steven Sams who acknowledges support by the World Class University (WCU) program through the National Research Foundation of Korea. The program is funded by the Korean Ministry of Education, Science and Technology (No. 515-82-06574
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to
electronically signed, digital documents. Central element of the solution is an
electronic seal, embodied as an XML data structure, which attests to the
correctness of the translation and the authorisation of the translator. The
seal contains a digital signature binding together original and translated
document, thus enabling forensic inspection and therefore legal security in the
appropriation of the translation. Organisational aspects of possible
implementation variants of electronic authorised translations are discussed and
a realisation as a stand-alone web-service is presented.Comment: In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Afric
Enabling Practical IPsec authentication for the Internet
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov. 2006There is a strong consensus about the need for IPsec, although its use is not widespread for end-to-end communications. One of the main reasons for this is the difficulty for authenticating two end-hosts that do not share a secret or do not rely on a common Certification Authority. In this paper we propose a modification to IKE to use reverse DNS and DNSSEC (named DNSSEC-to-IKE) to provide end-to-end authentication to Internet hosts that do not share any secret, without requiring the deployment of a new infrastructure. We perform a comparative analysis in terms of requirements, provided security and performance with state-of-the-art IKE authentication methods and with a recent proposal for IPv6 based on CGA. We conclude that DNSSEC-to-IKE enables the use of IPsec in a broad range of scenarios in which it was not applicable, at the price of offering slightly less security and incurring in higher performance costs.Universidad de Montpellier IIPublicad
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing. Any malicious tampering to the data must be detected immediately. This paper introduces secure end-to-end data aggregation for AMI, a security protocol that allows the concentrators to securely aggregate the data collected from the smart meters, while enabling the utility back-end that receives the aggregated data to verify the integrity and data originality. Compromise of concentrators can be detected. The aggregated data is protected using Chameleon Signatures and then forwarded to the utility back-end for verification, accounting, and analysis. Using the Trapdoor Chameleon Hash Function, the smart meters can periodically send an evidence to the utility back-end, by computing an alternative message and a random value (m', r) such that m' consists of all previous energy usage measurements of the smart meter in a specified period of time.
By verifying that the Chameleon Hash Value of (m', r) and that the energy usage matches those aggregated by the concentrators, the utility back-end is convinced of the integrity and authenticity of the data from the smart meters. Any data anomaly between smart meters and concentrators can be detected, thus indicating potential compromise of concentrators
Recommended from our members
Online engagement from the grassroots: Reflecting on over a decade of ePetitioning experience in Europe and the UK
The official published verison of this chapter can be accessed from the link below - Copyright @ 2012 SpringerExtensive debate on Internet and formal politics has concentrated on whether authorities should focus their efforts on high-volume activities such petitioning or crowdsourcing. Those engagement tools seem to be consistent with the ambition of many networked citizens to influence policy making through ad hoc and mostly single-issue movements. Therefore, certain interesting questions emerge: can authorities organise their engagement activities to respond and act upon this call? Can citizens in-deed influence policy making in a few clicks? This chapter draws together material from different uses of ePetitioning tools in Europe, mainly focusing on the integrated UK experience at national and local level. The analysis suggests that those initiatives can provide valuable feedback to authorities and be effectively complemented by other forms of deeper engagement. Yet, political organisations should pay close attention on how the public views such exercises and be prepared to support partici-pants in different ways and on a regular basis
- âŠ