3,470 research outputs found
On Using Encryption Techniques to Enhance Sticky Policies Enforcement
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts. The sticky policy paradigm, proposed by Karjoth, Schunter, and Waidner, provides very useful inspiration on how we can protect sensitive personal data, but the enforcement is very weak. In this paper we provide an overview of the state of the art in enforcing sticky policies, especially the concept of sticky policy enforcement using encryption techniques including Public-Key Encryption (PKE), Identity-Based Encryption (IBE), Attribute-Based Encryption (ABE), and Proxy Re-Encryption (PRE). We provide detailed comparison results on the (dis)advantages of these enforcement mechanisms. As a result of the analysis, we provide a general framework for enhancing sticky policy enforcement using Type-based PRE (TPRE), which is an extension of general PRE
Range-Point Migration-Based Image Expansion Method Exploiting Fully Polarimetric Data for UWB Short-Range Radar
Ultrawideband radar with high-range resolution is a promising technology for use in short-range 3-D imaging applications, in which optical cameras are not applicable. One of the most efficient 3-D imaging methods is the range-point migration (RPM) method, which has a definite advantage for the synthetic aperture radar approach in terms of computational burden, high accuracy, and high spatial resolution. However, if an insufficient aperture size or angle is provided, these kinds of methods cannot reconstruct the whole target structure due to the absence of reflection signals from large part of target surface. To expand the 3-D image obtained by RPM, this paper proposes an image expansion method by incorporating the RPM feature and fully polarimetric data-based machine learning approach. Following ellipsoid-based scattering analysis and learning with a neural network, this method expresses the target image as an aggregation of parts of ellipsoids, which significantly expands the original image by the RPM method without sacrificing the reconstruction accuracy. The results of numerical simulation based on 3-D finite-difference time-domain analysis verify the effectiveness of our proposed method, in terms of image-expansion criteria
Photonic Crystal Nanobeam Cavity Strongly Coupled to the Feeding Waveguide
A deterministic design of an ultrahigh Q, wavelength scale mode volume
photonic crystal nanobeam cavity is proposed and experimentally demonstrated.
Using this approach, cavities with Q>10^6 and on-resonance transmission T>90%
are designed. The devices fabricated in Si and capped with low-index polymer,
have Q=80,000 and T=73%. This is, to the best of our knowledge, the highest
transmission measured in deterministically designed, wavelength scale high Q
cavities
Generalization of the Lee-O'Sullivan List Decoding for One-Point AG Codes
We generalize the list decoding algorithm for Hermitian codes proposed by Lee
and O'Sullivan based on Gr\"obner bases to general one-point AG codes, under an
assumption weaker than one used by Beelen and Brander. Our generalization
enables us to apply the fast algorithm to compute a Gr\"obner basis of a module
proposed by Lee and O'Sullivan, which was not possible in another
generalization by Lax.Comment: article.cls, 14 pages, no figure. The order of authors was changed.
To appear in Journal of Symbolic Computation. This is an extended journal
paper version of our earlier conference paper arXiv:1201.624
Valley current characterization of high current density resonant tunnelling diodes for terahertz-wave applications
We report valley current characterisation of high current density InGaAs/AlAs/InP resonant tunnelling diodes (RTDs) grown by metal-organic vapour phase epitaxy (MOVPE) for THz emission, with a view to investigate the origin of the valley current and optimize device performance. By applying a dual-pass fabrication technique, we are able to measure the RTD I-V characteristic for different perimeter/area ratios, which uniquely allows us to investigate the contribution of leakage current to the valley current and its effect on the PVCR from a single device. Temperature dependent (20 – 300 K) characteristics for a device are critically analysed and the effect of temperature on the maximum extractable power (PMAX) and the negative differential conductance (NDC) of the device is investigated. By performing theoretical modelling, we are able to explore the effect of typical variations in structural composition during the growth process on the tunnelling properties of the device, and hence the device performance
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
By extending the notion of minimum rank distance, this paper introduces two
new relative code parameters of a linear code C_1 of length n over a field
extension and its subcode C_2. One is called the relative
dimension/intersection profile (RDIP), and the other is called the relative
generalized rank weight (RGRW). We clarify their basic properties and the
relation between the RGRW and the minimum rank distance. As applications of the
RDIP and the RGRW, the security performance and the error correction capability
of secure network coding, guaranteed independently of the underlying network
code, are analyzed and clarified. We propose a construction of secure network
coding scheme, and analyze its security performance and error correction
capability as an example of applications of the RDIP and the RGRW. Silva and
Kschischang showed the existence of a secure network coding in which no part of
the secret message is revealed to the adversary even if any dim C_1-1 links are
wiretapped, which is guaranteed over any underlying network code. However, the
explicit construction of such a scheme remained an open problem. Our new
construction is just one instance of secure network coding that solves this
open problem.Comment: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE
Transactions on Information Theor
List Decoding Algorithm based on Voting in Groebner Bases for General One-Point AG Codes
We generalize the unique decoding algorithm for one-point AG codes over the
Miura-Kamiya Cab curves proposed by Lee, Bras-Amor\'os and O'Sullivan (2012) to
general one-point AG codes, without any assumption. We also extend their unique
decoding algorithm to list decoding, modify it so that it can be used with the
Feng-Rao improved code construction, prove equality between its error
correcting capability and half the minimum distance lower bound by Andersen and
Geil (2008) that has not been done in the original proposal except for
one-point Hermitian codes, remove the unnecessary computational steps so that
it can run faster, and analyze its computational complexity in terms of
multiplications and divisions in the finite field. As a unique decoding
algorithm, the proposed one is empirically and theoretically as fast as the BMS
algorithm for one-point Hermitian codes. As a list decoding algorithm,
extensive experiments suggest that it can be much faster for many moderate
size/usual inputs than the algorithm by Beelen and Brander (2010). It should be
noted that as a list decoding algorithm the proposed method seems to have
exponential worst-case computational complexity while the previous proposals
(Beelen and Brander, 2010; Guruswami and Sudan, 1999) have polynomial ones, and
that the proposed method is expected to be slower than the previous proposals
for very large/special inputs.Comment: Accepted for publication in J. Symbolic Computation. LaTeX2e
article.cls, 42 pages, 4 tables, no figures. Ver. 6 added an illustrative
example of the algorithm executio
Vernier Ring Based Pre-bond Through Silicon Vias Test in 3D ICs
Defects in TSV will lead to variations in the propagation delay of the net connected to the faulty TSV. A non-invasive Vernier Ring based method for TSV pre-bond testing is proposed to detect resistive open and leakage faults. TSVs are used as capacitive loads of their driving gates, then time interval compared with the fault-free TSVs will be detected. The time interval can be detected with picosecond level resolution, and digitized into a digital code to compare with an expected value of fault-free. Experiments on fault detection are presented through HSPICE simulations using realistic models for a 45 nm CMOS technology. The results show the effectiveness in the detection of time interval 10 ps, resistive open defects 0.2 kΩ above and equivalent leakage resistance less than 18 MΩ. Compared with existing methods, detection precision, area overhead, and test time are effectively improved, furthermore, the fault degree can be digitalized into digital code
High capacity data embedding schemes for digital media
High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen
- …