4,070 research outputs found

    Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping

    Get PDF
    We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem Sécurité. PACE v2 IM enjoys the following properties: patent-freeness3 (to the best of current knowledge in the field); full resistance to dictionary attacks, secrecy and forward secrecy in the security model agreed upon by the CEN TC224 WG16 group; optimal performances. The PACE v2 IM protocol is intended to provide an alternative to the German PACE v1 protocol, which is also the German PACE v2 Generic Mapping (GM) protocol, proposed by the German Federal Office for Information Security (BSI). In this document, we provide a description of PACE v2 IM, a description of the security requirements one expects from a password-based key establishment protocol in order to support secure applications, and a security proof of PACE v2 IM in the so-called Bellare-Pointcheval-Rogaway (BPR) security model

    Science and Technology Governance and Ethics - A Global Perspective from Europe, India and China

    Get PDF
    This book analyzes the possibilities for effective global governance of science in Europe, India and China. Authors from the three regions join forces to explore how ethical concerns over new technologies can be incorporated into global science and technology policies. The first chapter introduces the topic, offering a global perspective on embedding ethics in science and technology policy. Chapter Two compares the institutionalization of ethical debates in science, technology and innovation policy in three important regions: Europe, India and China. The third chapter explores public perceptions of science and technology in these same three regions. Chapter Four discusses public engagement in the governance of science and technology, and Chapter Five reviews science and technology governance and European values. The sixth chapter describes and analyzes values demonstrated in the constitution of the People’s Republic of China. Chapter Seven describes emerging evidence from India on the uses of science and technology for socio-economic development, and the quest for inclusive growth. In Chapter Eight, the authors propose a comparative framework for studying global ethics in science and technology. The following three chapters offer case studies and analysis of three emerging industries in India, China and Europe: new food technologies, nanotechnology and synthetic biology. Chapter 12 gathers all these threads for a comprehensive discussion on incorporating ethics into science and technology policy. The analysis is undertaken against the backdrop of different value systems and varying levels of public perception of risks and benefits. The book introduces a common analytical framework for the comparative discussion of ethics at the international level. The authors offer policy recommendations for effective collaboration among the three regions, to promote responsible governance in science and technology and a common analytical perspective in ethics

    Lightweight Transformer in Federated Setting for Human Activity Recognition

    Full text link
    Human activity recognition (HAR) is a machine learning task with applications in many domains including health care, but it has proven a challenging research problem. In health care, it is used mainly as an assistive technology for elder care, often used together with other related technologies such as the Internet of Things (IoT) because HAR can be achieved with the help of IoT devices such as smartphones, wearables, environmental and on-body sensors. Deep neural network techniques like convolutional neural networks (CNNs) and recurrent neural networks (RNNs) have been used for HAR, both in centralized and federated settings. However, these techniques have certain limitations: RNNs cannot be easily parallelized, CNNs have the limitation of sequence length, and both are computationally expensive. Moreover, the centralized approach has privacy concerns when facing sensitive applications such as healthcare. In this paper, to address some of the existing challenges facing HAR, we present a novel one-patch transformer based on inertial sensors that can combine the advantages of RNNs and CNNs without their major limitations. We designed a testbed to collect real-time human activity data and used the data to train and test the proposed transformer-based HAR classifier. We also propose TransFed: a federated learning-based HAR classifier using the proposed transformer to address privacy concerns. The experimental results showed that the proposed solution outperformed the state-of-the-art HAR classifiers based on CNNs and RNNs, in both federated and centralized settings. Moreover, the proposed HAR classifier is computationally inexpensive as it uses much fewer parameters than existing CNN/RNN-based classifiers.Comment: An updated version of this paper is coming soo

    Internet of Things (IoT) for Automated and Smart Applications

    Get PDF
    Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications
    • …
    corecore