92 research outputs found

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8

    Making DNSSEC Future Proof

    Get PDF

    Design and semantics of form and movement : DeSForM 2008

    Get PDF

    Design and semantics of form and movement : DeSForM 2008

    Get PDF

    Essays on the impact of information technology on identity

    Get PDF
    Depuis quelques années maintenant, les technologies de l'information (TI) ne sont plus l'apanage des spécialistes et des experts. De plus en plus, des acteurs de divers secteurs intègrent les TI pour accomplir leur travail. Seulement voilà, pour s'adapter à leur environnement, les individus sont appelés à développer des nouvelles habilités, instaurer des nouvelles pratiques ou reléguer d'autres au second plan. Auquel cas, l'identité de ces acteurs, c'est-à-dire la façon dont ils se définissent et se décrivent eu égard à leur travail pourrait en être potentiellement affectée. Dès lors, il n'est pas encore clair comment les individus s'adaptent aux défis que posent les TI à leur identité, ni comment ils s'efforcent à définir ou redéfinir leur soi en réponse aux changements, parfois substantiels, induits par les TI. La thèse constitue une étape pour combler ce vide. Son objectif est de développer une théorie qui explique comment les individus s'adaptent aux défis posés par les TI à leur identité. Nous avons donc défini quatre stratégies, à savoir : 1) agir sur la situation (acting on situation); 2) ajuster le sens de soi (adjusting the self); 3) pratiques cathartiques (cathartic practices), et 4) distanciation (distancing coping). Nous avons suggéré que ces quatre stratégies mènent à l'une des quatre types d'identité : 1) identité renforcée (reinforced identity) 2) identité redéfinie (redefined identity) 3) identité ambivalente (ambivalent identity) 4) et l'anti-identité (anti-identity). La théorie est validée par une étude de terrain menée auprès des professionnels de la santé, à savoir, des médecins et des infirmièr(e)s dont les pratiques cliniques ont connu des changements substantiels induits par des systèmes de dossiers patients électroniques. En somme, l'étude contribue à la littérature en offrant à point singulier pour examiner comment l'identité est construite dans le processus d'interaction avec les technologies de l'information qui, en retour, affectent certains comportements eu égard les TI tels que l'utilisation, l'appropriation et la résistance. La thèse contribue aussi au niveau pratique en offrant des outils singuliers aux gestionnaires, particulièrement du secteur de la santé, pour réussir l'introduction des systèmes de dossiers patients électroniques.\ud _____________________________________________________________________________

    Progressively communicating rich telemetry from autonomous underwater vehicles via relays

    Get PDF
    Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the Massachusetts Institute of Technology and the Woods Hole Oceanographic Institution June 2012As analysis of imagery and environmental data plays a greater role in mission construction and execution, there is an increasing need for autonomous marine vehicles to transmit this data to the surface. Without access to the data acquired by a vehicle, surface operators cannot fully understand the state of the mission. Communicating imagery and high-resolution sensor readings to surface observers remains a significant challenge – as a result, current telemetry from free-roaming autonomous marine vehicles remains limited to ‘heartbeat’ status messages, with minimal scientific data available until after recovery. Increasing the challenge, longdistance communication may require relaying data across multiple acoustic hops between vehicles, yet fixed infrastructure is not always appropriate or possible. In this thesis I present an analysis of the unique considerations facing telemetry systems for free-roaming Autonomous Underwater Vehicles (AUVs) used in exploration. These considerations include high-cost vehicle nodes with persistent storage and significant computation capabilities, combined with human surface operators monitoring each node. I then propose mechanisms for interactive, progressive communication of data across multiple acoustic hops. These mechanisms include wavelet-based embedded coding methods, and a novel image compression scheme based on texture classification and synthesis. The specific characteristics of underwater communication channels, including high latency, intermittent communication, the lack of instantaneous end-to-end connectivity, and a broadcast medium, inform these proposals. Human feedback is incorporated by allowing operators to identify segments of data thatwarrant higher quality refinement, ensuring efficient use of limited throughput. I then analyze the performance of these mechanisms relative to current practices. Finally, I present CAPTURE, a telemetry architecture that builds on this analysis. CAPTURE draws on advances in compression and delay tolerant networking to enable progressive transmission of scientific data, including imagery, across multiple acoustic hops. In concert with a physical layer, CAPTURE provides an endto- end networking solution for communicating science data from autonomous marine vehicles. Automatically selected imagery, sonar, and time-series sensor data are progressively transmitted across multiple hops to surface operators. Human operators can request arbitrarily high-quality refinement of any resource, up to an error-free reconstruction. The components of this system are then demonstrated through three field trials in diverse environments on SeaBED, OceanServer and Bluefin AUVs, each in different software architectures.Thanks to the National Science Foundation, and the National Oceanic and Atmospheric Administration for their funding of my education and this work

    Proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET 2013)

    Get PDF
    "This book contains the proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET) 2013 which was held on 16.-17.September 2013 in Paphos (Cyprus) in conjunction with the EC-TEL conference. The workshop and hence the proceedings are divided in two parts: on Day 1 the EuroPLOT project and its results are introduced, with papers about the specific case studies and their evaluation. On Day 2, peer-reviewed papers are presented which address specific topics and issues going beyond the EuroPLOT scope. This workshop is one of the deliverables (D 2.6) of the EuroPLOT project, which has been funded from November 2010 – October 2013 by the Education, Audiovisual and Culture Executive Agency (EACEA) of the European Commission through the Lifelong Learning Programme (LLL) by grant #511633. The purpose of this project was to develop and evaluate Persuasive Learning Objects and Technologies (PLOTS), based on ideas of BJ Fogg. The purpose of this workshop is to summarize the findings obtained during this project and disseminate them to an interested audience. Furthermore, it shall foster discussions about the future of persuasive technology and design in the context of learning, education and teaching. The international community working in this area of research is relatively small. Nevertheless, we have received a number of high-quality submissions which went through a peer-review process before being selected for presentation and publication. We hope that the information found in this book is useful to the reader and that more interest in this novel approach of persuasive design for teaching/education/learning is stimulated. We are very grateful to the organisers of EC-TEL 2013 for allowing to host IWEPLET 2013 within their organisational facilities which helped us a lot in preparing this event. I am also very grateful to everyone in the EuroPLOT team for collaborating so effectively in these three years towards creating excellent outputs, and for being such a nice group with a very positive spirit also beyond work. And finally I would like to thank the EACEA for providing the financial resources for the EuroPLOT project and for being very helpful when needed. This funding made it possible to organise the IWEPLET workshop without charging a fee from the participants.
    • …
    corecore