6 research outputs found

    Key predistribution scheme using finite fields and reed muller codes

    Full text link
    Resource constraint sensors of a Wireless Sensor Network (WSN) cannot afford the use of costly encryption techniques like public key while dealing with sensitive data. So symmetric key encryption techniques are preferred where it is essential to have the same cryptographic key between communicating parties. To this end, keys are preloaded into the nodes before deployment and are to be established once they get deployed in the target area. This entire process is called key predistribution. In this paper we propose one such scheme using unique factorization of polynomials over Finite Fields. To the best of our knowledge such an elegant use of Algebra is being done for the first time in WSN literature. The best part of the scheme is large number of node support with very small and uniform key ring per node. However the resiliency is not good. For this reason we use a special technique based on Reed Muller codes proposed recently by Sarkar, Saha and Chowdhury in 2010. The combined scheme has good resiliency with huge node support using very less keys per node.<br /

    High-Performance Modelling and Simulation for Big Data Applications

    Get PDF
    This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications

    High-Performance Modelling and Simulation for Big Data Applications

    Get PDF
    This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications

    Nuevos protocolos y esquemas de seguridad para redes ad-hoc móviles inalámbricas

    Get PDF
    De los múltiples criterios utilizados para clasificar las redes de comunicaciones, entre los que se incluyen su escala, su método de conexión, la topología que forman o los protocolos que utilizan, en los últimos años ha cobrado especial importancia el medio de transmisión. Cuando el cable tradicional se sustituye por transmisión a través del aire se habla de redes inalámbricas. En este caso la comunicación se lleva a cabo utilizando un medio no guiado, mediante ondas electromagnéticas, y haciendo uso de antenas. No cabe duda de que la tecnología inalámbrica está ocupando rápidamente las preferencias de todo tipo de usuarios. La telefonía móvil está cada vez más cerca de convertirse en un sistema de comunicación personal universal en el mundo occidental y, desde hace unos años, todo tipo de ordenadores están librándose también de sus ataduras cableadas. La introducción de nuevos escenarios abre la puerta a nuevos requisitos y dificultades que deben ser resueltas. Una de las principales, desde luego, consiste en una necesidad imperiosa de esquemas de protección robustos, que proporcionen un adecuado nivel de seguridad. Es fácil imaginar lo que podría suceder si un atacante pudiese suplantar, por ejemplo, al dueño de una casa, y abrir la puerta del garaje a distancia, reprogramar la nevera para realizar compras en su nombre o subir y bajar persianas a voluntad. Resulta obvio, por tanto, que la seguridad es uno de sus pilares básicos, sin el que resulta imposible el desarrollo de este tipo de redes. Sin embargo, seguridad es un concepto muy polifacético, más aún en redes tan complejas. En cualquier caso, los aspectos de privacidad y autenticación de la información deben formar parte indiscutiblemente de cualquier esquema que se proponga. Por otro lado, teniendo en cuenta las restricciones ya comentadas de unas reducidas capacidades de proceso y energía de los nodos que forman parte de las redes ad hoc, el diseño de nuevos algoritmos para la protección de la información se convierte en una tarea desafiante. Esta tesis surge, pues, de la necesidad clara de nuevos protocolos y mecanismos de seguridad para este tipo de redes

    Compendium of U.S. Copyright Office Practices, Third Edition

    Get PDF
    The Compendium of U.S. Copyright Office Practices, Third Edition (the “Compendium” or “Third Edition”) is the administrative manual of the Register of Copyrights concerning Title 17 of the United States Code and Chapter 37 of the Code of Federal Regulations. It provides instruction to agency staff regarding their statutory duties and provides expert guidance to copyright applicants, practitioners, scholars, the courts, and members of the general public regarding institutional practices and related principles of law. The Compendium documents and explains the many technical requirements, regulations, and legal interpretations of the U.S. Copyright Office with a primary focus on the registration of copyright claims, documentation of copyright ownership, and recordation of copyright documents, including assignments and licenses. It describes the wide range of services that the Office provides for searching, accessing, and retrieving information located in its extensive collection of copyright records and the associated fees for these services. The Compendium provides guidance regarding the contents and scope of particular registrations and records. And it seeks to educate applicants about a number of common mistakes, such as providing incorrect, ambiguous, or insufficient information, or making overbroad claims of authorship. The Compendium does not cover every principle of copyright law or detail every aspect of the Office’s administrative practices. The Office may, in exceptional circumstances, depart from its normal practices to ensure an outcome that is most appropriate. The Compendium does not override any existing statute or regulation. The policies and practices set forth in the Compendium do not in themselves have the force and effect of law and are not binding upon the Register of Copyrights or Copyright Office staff. However, the Compendium does explain the legal rationale and determinations of the Copyright Office, where applicable, including circumstances where there is no controlling judicial authority
    corecore