3,114 research outputs found
An Efficiently Searchable Encrypted Data Structure for Range Queries
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable
encryption, such as deterministic and order-preserving encryption. These
plaintext guessing attacks have been further improved in subsequent work, e.g.
by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen
our understanding of the implications of security models. In this paper we
present an efficiently searchable, encrypted data structure that is provably
secure against these and even more powerful chosen plaintext attacks. Our data
structure supports logarithmic-time search with linear space complexity. The
indices of our data structure can be used to search by standard comparisons and
hence allow easy retrofitting to existing database management systems. We
implemented our scheme and show that its search time overhead is only 10
milliseconds compared to non-secure search
Deep Learning Based Caching for Self-Driving Car in Multi-access Edge Computing
Once self-driving car becomes a reality and passengers are no longer worry
about it, they will need to find new ways of entertainment. However, retrieving
entertainment contents at the Data Center (DC) can hinder content delivery
service due to high delay of car-to-DC communication. To address these
challenges, we propose a deep learning based caching for self-driving car, by
using Deep Learning approaches deployed on the Multi-access Edge Computing
(MEC) structure. First, at DC, Multi-Layer Perceptron (MLP) is used to predict
the probabilities of contents to be requested in specific areas. To reduce the
car-DC delay, MLP outputs are logged into MEC servers attached to roadside
units. Second, in order to cache entertainment contents stylized for car
passengers' features such as age and gender, Convolutional Neural Network (CNN)
is used to predict age and gender of passengers. Third, each car requests MLP
output from MEC server and compares its CNN and MLP outputs by using k-means
and binary classification. Through this, the self-driving car can identify the
contents need to be downloaded from the MEC server and cached. Finally, we
formulate deep learning based caching in the self-driving car that enhances
entertainment services as an optimization problem whose goal is to minimize
content downloading delay. To solve the formulated problem, a Block Successive
Majorization-Minimization (BS-MM) technique is applied. The simulation results
show that the accuracy of our prediction for the contents need to be cached in
the areas of the self-driving car is achieved at 98.04% and our approach can
minimize delay
Etude préliminaire des parasites des bananes séchées en provenance de la Côte d'Afrique
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol
Englisch: In this paper we study the paillier cryptosystem and derive form it
to new schemes. First we transform the signature of paillier in a Blind
signature. Secondly we propose a three-pass protocol wich use the homomorphic
property instead of the commutativity as the Shamir protocol does.
German: Basierend auf dem Kryptosystem von Paillier und dem damit
eingef\"uhrten Problem der zusammengesetzten Residuenklasse werden in diesem
Artikel zwei kryptographische Verfahren vorgeschlagen. Zun\"achst wird die
Signatur von Paillier in ein blindes Signaturverfahren umgewandelt. Des
Weiteren wird mit der homomorphen Eigenschaft des Kryptosystems von Paillier
ein sogenanntes Three-Pass-Protocol - auch No-Key-Protocol genannt -
entwickelt.Comment: 10 page
From time uncertainties to climate-smart agriculture in the Sudano-Sahelian zone of Cameroon. [P2]
In the Sudano-Sahelian zone of Cameroon, the acceleration of drying of landscape has created uncertainty of agricultural practices too related to natural data. The cropping season depends on the climate which is subject to increasingly strong intra annual variability. Farmers' over-reliance on climate results in two major consequences for regional agriculture: replanting in a context of fragility of the seed sector and lower production levels. Public action regarding climate change (erratic rainfall, floods, drought, high temperatures), in the Sudano-Sahelian zone is mainly focused on the preservation of fragile areas (protected areas, reforestation, reducing pressure on the firewood through the promotion of improved stoves). This action is largely supported by international cooperation, and is not compatible with public policies (agriculture, food, land). Also farmers' adaptation strategies to climate change are disconnected from the objectives of innovation and research policies (agricultural intensification, agroecology). The proposed reflection raises the question of the relationship between public policy and farmers' strategies to strengthen the adoption of climate-smart practices that reduce uncertainties. This communication summarizes the results of twenty years of direct observation and field surveys of farmers' perceptions of climate change and environmental degradation. It aims to assess the strategies that farmers have adopted to cope with the new climate and to suggest recommendations for more climatologically smart agricultural practices. (Texte intégral
- …