The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represent...
详细信息
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing technology that behaves in the manner it is supposed to. Along with researching techniques of effectively securing the communication, other aspects that also deserve to receive attention are authentication, authorization and accounting. One security aspect that has been the most intensely researched in the past from the three, is authentication. From the various methods used in verifying the identity of users, one more recent one is biometrics that can significantly heighten the safety and security of a system. However, authenticating the user into an information system may not be entirely safe all the time. The aim of this paper is to present an overview of the different plausible methods of combining cryptography related concepts and biometrics techniques. This additional attachment of cryptography has proven to make the process of gaining access to an information system much more secure. The problem tackled in this paper will be presented from a two way perspective: on one hand, it will be discussed how biometrics can make use of cryptography-specific solutions in order to enhance its powers and, on the other hand, it will be presented how cryptography aspects can use the specific biometric data of a user to generate encryption keys that are much harder to decipher or to obtain. After this methods are presented, the theoretical basis for measuring performance of a biometric system will be presented and a survey on current performance results on fuzzy vault techniques will be enumerated and described.
The non-binary(NB) Irregular Repeat Accumulate(IRA) codes, as a subclass of NB LDPC codes, potentially have an excellent error-correcting performance. They are also known to provide linear complexity of encoding, but ...
详细信息
The non-binary(NB) Irregular Repeat Accumulate(IRA) codes, as a subclass of NB LDPC codes, potentially have an excellent error-correcting performance. They are also known to provide linear complexity of encoding, but the basic encoding method with the serial rate-1 accumulator significantly limits the encoder throughput. Then the objective of the research presented in this paper is to develop an encoding method pro- viding significantly increased throughput of an NB-IRA encoder altogether with a flexible code construction methods for the structured(S-NB-IRA) codes eligible for the proposed encoding method. For this purpose, we reformulate the classic encoding algorithm to fit into the partial parallel encoder architecture. We propose the S-NB-IRA encoder block diagram and show that its estimated throughput is proportional to the submatrix size of the parity check matrix, which guarantees a wide complexity- throughput tradeoff. Then, in order to facilitate the S-NB-IRA coding systems design, we present a computer search algorithm for the construction of good S-NB-IRA codes. The algorithm aims at optimizing the code graph topology along with selecting an appropriate non-binary elements in the parity check matrix. Numerical results show that the constructed S-NB-IRA codes significantly outperform the binary IRA and S-IRA codes, while their performance is similar to the best unstructured NB-LDPC codes.
More than 50% of the motorcycle accidents are fatal for the rider. 70% of those are due to the time needed for the emergency service to arrive at the accident. This leads us to a necessity in finding a device able to ...
详细信息
The aim of the paper is to develop a model of the ignition system for combustion engines with spark ignition described by two-port network equations. The mathematical calculations based on generalized parameters of a ...
详细信息
Gaussian process regression is a machine learning approach which has been shown its power for estimation of unknown functions. However, Gaussian processes suffer from high computational complexity, as in a basic form ...
详细信息
Purpose - The main aim of this study was a preparation development of dopant solution (DS) which can be deposited by a spray-on method and subsequently allows obtaining the no emitter layer with surface resistance in ...
详细信息
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Theref...
详细信息
ISBN:
(纸本)9781509054442
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Therefore, Linux's kernel security has a lot of impact on IT&C industry. This paper presents an audit solution over the Linux kernel in order to discover security vulnerabilities. Therefore, fuzzing campaigns are performed through system calls. This choice was made due to the fact that system calls are the natural way user space communicates with the kernel space and a real life scenario can be reproduced.
In this paper, we consider the robustness of a basic model of a dynamical distribution network. In the first problem, i.e., optimal weight allocation, we minimize the H∞- norm of the dynamical distribution network su...
详细信息
In unmanned aerial vehicle (UAV) networks, directional modulation (DM) is adopted to improve the secrecy rate (SR) performance. Alice, a ground base station, behaves as a control center, and Bob is a UAV of flying alo...
详细信息
Systems are often controlled using feedback loops. Fault diagnosis schemes are usually designed assuming that there is no feedback loop. Therefore fault diagnosis methods need to accommodate for the feedback loop. One...
详细信息
Systems are often controlled using feedback loops. Fault diagnosis schemes are usually designed assuming that there is no feedback loop. Therefore fault diagnosis methods need to accommodate for the feedback loop. One such method is active fault diagnosis based on a fault signature system. This method is derived using the YJBK parametrisation, named after Youla, Jabr, Bongiorno and Kucera. It uses the derived fault signature system to determine the detectability of possible faults in the system. Deriving the fault signature system requires knowledge about the controller. This paper demonstrates the possibility of estimating the detectability of faults in the fault signature system using a gap-metric. The gap-metric has the advantage of only requiring knowledge about the plant. By using the gap-metric it is possible to estimate the detectability of faults without using information about the controller.
暂无评论