3,114 research outputs found

    An Efficiently Searchable Encrypted Data Structure for Range Queries

    Full text link
    At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an efficiently searchable, encrypted data structure that is provably secure against these and even more powerful chosen plaintext attacks. Our data structure supports logarithmic-time search with linear space complexity. The indices of our data structure can be used to search by standard comparisons and hence allow easy retrofitting to existing database management systems. We implemented our scheme and show that its search time overhead is only 10 milliseconds compared to non-secure search

    Deep Learning Based Caching for Self-Driving Car in Multi-access Edge Computing

    Full text link
    Once self-driving car becomes a reality and passengers are no longer worry about it, they will need to find new ways of entertainment. However, retrieving entertainment contents at the Data Center (DC) can hinder content delivery service due to high delay of car-to-DC communication. To address these challenges, we propose a deep learning based caching for self-driving car, by using Deep Learning approaches deployed on the Multi-access Edge Computing (MEC) structure. First, at DC, Multi-Layer Perceptron (MLP) is used to predict the probabilities of contents to be requested in specific areas. To reduce the car-DC delay, MLP outputs are logged into MEC servers attached to roadside units. Second, in order to cache entertainment contents stylized for car passengers' features such as age and gender, Convolutional Neural Network (CNN) is used to predict age and gender of passengers. Third, each car requests MLP output from MEC server and compares its CNN and MLP outputs by using k-means and binary classification. Through this, the self-driving car can identify the contents need to be downloaded from the MEC server and cached. Finally, we formulate deep learning based caching in the self-driving car that enhances entertainment services as an optimization problem whose goal is to minimize content downloading delay. To solve the formulated problem, a Block Successive Majorization-Minimization (BS-MM) technique is applied. The simulation results show that the accuracy of our prediction for the contents need to be cached in the areas of the self-driving car is achieved at 98.04% and our approach can minimize delay

    Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol

    Full text link
    Englisch: In this paper we study the paillier cryptosystem and derive form it to new schemes. First we transform the signature of paillier in a Blind signature. Secondly we propose a three-pass protocol wich use the homomorphic property instead of the commutativity as the Shamir protocol does. German: Basierend auf dem Kryptosystem von Paillier und dem damit eingef\"uhrten Problem der zusammengesetzten Residuenklasse werden in diesem Artikel zwei kryptographische Verfahren vorgeschlagen. Zun\"achst wird die Signatur von Paillier in ein blindes Signaturverfahren umgewandelt. Des Weiteren wird mit der homomorphen Eigenschaft des Kryptosystems von Paillier ein sogenanntes Three-Pass-Protocol - auch No-Key-Protocol genannt - entwickelt.Comment: 10 page

    La lutte en Guinée contre Zonocerus variegatus

    Full text link

    From time uncertainties to climate-smart agriculture in the Sudano-Sahelian zone of Cameroon. [P2]

    Full text link
    In the Sudano-Sahelian zone of Cameroon, the acceleration of drying of landscape has created uncertainty of agricultural practices too related to natural data. The cropping season depends on the climate which is subject to increasingly strong intra annual variability. Farmers' over-reliance on climate results in two major consequences for regional agriculture: replanting in a context of fragility of the seed sector and lower production levels. Public action regarding climate change (erratic rainfall, floods, drought, high temperatures), in the Sudano-Sahelian zone is mainly focused on the preservation of fragile areas (protected areas, reforestation, reducing pressure on the firewood through the promotion of improved stoves). This action is largely supported by international cooperation, and is not compatible with public policies (agriculture, food, land). Also farmers' adaptation strategies to climate change are disconnected from the objectives of innovation and research policies (agricultural intensification, agroecology). The proposed reflection raises the question of the relationship between public policy and farmers' strategies to strengthen the adoption of climate-smart practices that reduce uncertainties. This communication summarizes the results of twenty years of direct observation and field surveys of farmers' perceptions of climate change and environmental degradation. It aims to assess the strategies that farmers have adopted to cope with the new climate and to suggest recommendations for more climatologically smart agricultural practices. (Texte intégral
    corecore