Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailSecrecy sum-rate for orthogonal random beamforming with opportunistic scheduling
Krikidis, Ioannis; Ottersten, Björn UL

in IEEE Signal Processing Letters (2013), 2(20), 141-144

In this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi-user downlink scenario where each user is wiretapped by one eavesdropper. Two opportunistic scheduling techniques ... [more ▼]

In this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi-user downlink scenario where each user is wiretapped by one eavesdropper. Two opportunistic scheduling techniques that ensure confidentiality by exploiting multi-user diversity are investigated; the first technique (optimal) requires limited feedback of the effective signal-to-interference ratio (SIR) from all the users and the eavesdroppers while the second technique (suboptimal) incorporates SIR knowledge from only the legitimate users. By using extreme value theory, we derive the achievable SIR-based secrecy sum-rate and the associated scaling laws for both scheduling techniques. [less ▲]

Detailed reference viewed: 161 (0 UL)
Full Text
Peer Reviewed
See detailLe secret bancaire: l'entrée d'un principe au purgatoire
Tcheumalieu Fansi, Manuel Roland UL

in Banque et Droit (2015), (160), 4-15

La montée angoissante du phénomène du blanchiment des capitaux et du financement du terrorisme conjuguée avec les implications persistantes de la crise des subprimes dans tous les pays développés qui ... [more ▼]

La montée angoissante du phénomène du blanchiment des capitaux et du financement du terrorisme conjuguée avec les implications persistantes de la crise des subprimes dans tous les pays développés qui continuent de faire face à l’assèchement de leurs recettes budgétaires dans un contexte de scandales à répétition d’évasion et de fraude fiscales, la nécessité de protéger les circuits bancaires utilisés pour parfaire toutes ces infractions de nature transfrontière s’est imposée. À la faveur de cette lutte justifiée par l’intérêt général de chaque État et même de la communauté internationale, le respect du secret bancaire jadis pilier essentiel de la solidité de tout système bancaire et principe sacré des oasis et paradis bancaires ou des places offshore est désormais entré au purgatoire. Le banquier doit désormais au mépris du secret bancaire, confesser sous forme de délation aux destinataires institués, les moindres suspicions qui pèsent sur son client à l’occasion de chaque opération de banque. [less ▲]

Detailed reference viewed: 354 (15 UL)
Full Text
Peer Reviewed
See detailSecret, verifiable auctions from elections
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in Theoretical Computer Science (2018), 730

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailSecretion of the Phosphorylated Form of S100A9 from Neutrophils Is Essential for the Proinflammatory Functions of Extracellular S100A8/A9.
Schenten, Veronique; Plancon, Sebastien; Jung, Nicolas UL et al

in Frontiers in immunology (2018), 9

S100A8 and S100A9 are members of the S100 family of cytoplasmic EF-hand Ca(2+)-binding proteins and are abundantly expressed in the cytosol of neutrophils. In addition to their intracellular roles, S100A8 ... [more ▼]

S100A8 and S100A9 are members of the S100 family of cytoplasmic EF-hand Ca(2+)-binding proteins and are abundantly expressed in the cytosol of neutrophils. In addition to their intracellular roles, S100A8/A9 can be secreted in the extracellular environment and are considered as alarmins able to amplify the inflammatory response. The intracellular activity of S100A8/A9 was shown to be regulated by S100A9 phosphorylation, but the importance of this phosphorylation on the extracellular activity of S100A8/A9 has not yet been extensively studied. Our work focuses on the impact of the phosphorylation state of secreted S100A9 on the proinflammatory function of neutrophils. In a first step, we characterized the secretion of S100A8/A9 in different stimulatory conditions and investigated the phosphorylation state of secreted S100A9. Our results on neutrophil-like differentiated HL-60 (dHL-60) cells and purified human neutrophils showed a time-dependent secretion of S100A8/A9 when induced by phorbol 12-myristoyl 13-acetate and this secreted S100A9 was found in a phosphorylated form. Second, we evaluated the impact of this phosphorylation on proinflammatory cytokine expression and secretion in dHL-60 cells. Time course experiments with purified unphosphorylated or phosphorylated S100A8/A9 were performed and the expression and secretion levels of interleukin (IL)-1alpha, IL-1beta, IL-6, tumor necrosis factor alpha, CCL2, CCL3, CCL4, and CXCL8 were measured by real-time PCR and cytometry bead array, respectively. Our results demonstrate that only the phosphorylated form of the complex induces proinflammatory cytokine expression and secretion. For the first time, we provide evidence that S100A8/PhosphoS100A9 is inducing cytokine secretion through toll-like receptor 4 signaling. [less ▲]

Detailed reference viewed: 251 (37 UL)
Full Text
See detailLe secteur public
Pigeron-Piroth, Isabelle UL

in Economie et Statistique (2009), 34

En presence d'une main-d'ceuvre etrangere de plus en plus nombreuse et qualifiee, les Luxembourgeois constituent desormais moins de trois salaries sur dix dans leur propre pays. Parmi les fonctionnaires ... [more ▼]

En presence d'une main-d'ceuvre etrangere de plus en plus nombreuse et qualifiee, les Luxembourgeois constituent desormais moins de trois salaries sur dix dans leur propre pays. Parmi les fonctionnaires et les salaries dont l'employeur est de droit public, ils sont pourtant surrepresentes. Ce constat a incite plusieurs analystes a parler d'un repli des Luxembourgeois dans un secteur refuge ou secteur "protege", sans qu'aucune definition precise du secteur, ni description chiffree de ce mouvement n'aient jamais ete donnees. La presente etude s'attache avant tout a exposer une definition du secteur public qui permette un suivi historique et des comparaisons dans le temps. La situation en 2008 sera decrite en detail et confrontee ensuite a celle de 1995. Par ailleurs, une analyse dynamique permettra d'identifier les mobilites professionnelles a destination du secteur public et au depart de celui-ci. [less ▲]

Detailed reference viewed: 111 (8 UL)
See detailThe Sectio Aurea in a Fugue by Darius Milhaud
Anders, Ursula UL

Presentation (2000, July 17)

Detailed reference viewed: 91 (4 UL)
See detailSection Introduction: Framing Activism
De Silva, Adrian UL

in Hashemi Yekani, Elahe; Kilian, Eveline; Michaelis, Beatrice (Eds.) Queer Futures: Reconsidering Normativity, Activism and the Political (2013)

Detailed reference viewed: 55 (6 UL)
Full Text
Peer Reviewed
See detailSecure and Distributed Assessment of Privacy-Preserving Releases of GWAS
Pascoal, Túlio UL; Decouchant, Jérémie; Volp, Marcus UL

in ACM/IFIP International Middleware Conference (2022, November)

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed ... [more ▼]

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results. However, these algorithms have limited applicability, since they still require a centralized instance to decide whether GWAS results can be safely disclosed, which is in violation to privacy regulations, such as GDPR. In this work, we introduce GenDPR, a distributed middleware that leverages Trusted Execution Environments (TEEs) to securely determine a subset of the potential GWAS statistics that can be safely released. GenDPR achieves the same accuracy as centralized solutions, but requires transferring significantly less data because TEEs only exchange intermediary results but no genomes. Additionally, GenDPR can be configured to tolerate all-but-one honest-but-curious federation members colluding with the aim to expose genomes of correct members. [less ▲]

Detailed reference viewed: 26 (8 UL)
Full Text
Peer Reviewed
See detailSecure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey
Schaffer, Peter UL; Farkas, Károly; Horváth, Ádám et al

in Computer Networks (2012), 56(11), 27262741

In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and ... [more ▼]

In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols. [less ▲]

Detailed reference viewed: 104 (0 UL)
Peer Reviewed
See detailSecure Architecture for Clusters and Grids
Varrette, Sébastien UL; Roch, J.-L.; Denneulin, Y. et al

in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004) (2004)

Detailed reference viewed: 65 (3 UL)
Peer Reviewed
See detailSecure architectures for clusters and grid computations
Varrette, Sébastien UL; Roch, Jean-Louis; Denneulin, Yves et al

in Proceedings de CRIS 2004 (2nd International Conference on Critical Infrastructures), Grenoble, France, Octobre 2004 (2004)

Detailed reference viewed: 64 (0 UL)
Full Text
Peer Reviewed
See detailSecure Auctions Without Cryptography
Dreier, J.; Jonker, Hugo UL; Lafourcade, P.

in 7th conference on Fun with Algorithms (FUN'14), Lipari Island, Sicily, Italy, July 1--3, 2014 (2014)

Detailed reference viewed: 88 (0 UL)
Full Text
Peer Reviewed
See detailA Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption
Arenas Correa, Monica Patricia UL; Bingol, Muhammed Ali; Demirci, Huseyin UL et al

in Lecture Notes in Computer Science (2022, October 06), 13503

Sometimes fingerprint-like features are found in a material. The exciting discovery poses new challenges on how to use the features to build an object authentication protocol that could tell customers and ... [more ▼]

Sometimes fingerprint-like features are found in a material. The exciting discovery poses new challenges on how to use the features to build an object authentication protocol that could tell customers and retailers equipped with a mobile device whether a good is authentic or fake. We are exactly in this situation with Cholesteric Spherical Reflectors (CSRs), tiny spheres of liquid crystals with which we can tag or coat objects. They are being proposed as a potential game-changer material in anti-counterfeiting due to their unique optical properties. In addition to the problem of processing images and extracting the minutiæ embedded in a CSR, one major challenge is designing cryptographically secure authentication protocols. The authentication procedure has to handle unstable input data; it has to measure the distance between some reference data stored at enrollment and noisy input provided at authentication. We propose a cryptographic authentication protocol that solves the problem, and that is secure against semi-honest and malicious adversaries. We prove that our design ensures data privacy even if enrolled data are leaked and even if servers and provers are actively curious. We implement and benchmark the protocol in Python using the Microsoft SEAL library through its Python wrapper PySEAL. [less ▲]

Detailed reference viewed: 76 (22 UL)
Full Text
Peer Reviewed
See detailSecure backscatter-enabled NOMA system design in 6G era
Khan, Wali Ullah UL; Ali, Zain; Khan, Abd Ullah et al

in Internet Technology letters (2021)

The recent integration of backscatter communication (BC) with power-domain non-orthogonal multiple access (P-NOMA) has triggered significant research interest due to its applications in future sixth ... [more ▼]

The recent integration of backscatter communication (BC) with power-domain non-orthogonal multiple access (P-NOMA) has triggered significant research interest due to its applications in future sixth-generation (6G) wireless networks. However, the link security aspect of these networks has not been well investigated. This letter proposes a new optimization framework for improving the security of BC-enabled P-NOMA communication. Our system model takes into account the simultaneous operation of P-NOMA users and the backscatter tag (BT). Meanwhile, multiple non-colluding eavesdroppers (EDs) also try to target the signal of BT. Thus, the objective is to maximize the link security by finding the optimal reflection coefficient (RC) of the BT under the constraint of base station (BS) transmit power. Results demonstrate that the considered system with P-NOMA achieves high secrecy rate than the system using conventional orthogonal multiple access. [less ▲]

Full Text
Peer Reviewed
See detailSecure Conversion between Boolean and Arithmetic Masking of Any Order
Coron, Jean-Sébastien UL; Groszschädl, Johann UL; Vadnala, Praveen Kumar UL

in Batina, Lejla; Robshaw, Matthew (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings (2014, September)

Detailed reference viewed: 224 (12 UL)
Full Text
Peer Reviewed
See detailA Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G
Khowaja, Sunder Ali; Khuwaja, Parus; Dev, Kapal et al

in IEEE Transactions on Industrial Informatics (2022)

The use of aerial base stations, AI cloud, and satellite storage can help manage location, traffic, and specific application-based services for vehicular social networks. However, sharing of such data ... [more ▼]

The use of aerial base stations, AI cloud, and satellite storage can help manage location, traffic, and specific application-based services for vehicular social networks. However, sharing of such data makes the vehicular network vulnerable to data and privacy leakage. In this regard, this article proposes an efficient and secure data sharing scheme using community segmentation and a blockchain-based framework for vehicular social networks. The proposed work considers similarity matrices that employ the dynamics of structural similarity, modularity matrix, and data compatibility. These similarity matrices are then passed through stacked autoencoders that are trained to extract encoded embedding. A density-based clustering approach is then employed to find the community segments from the information distances between the encoded embeddings. A blockchain network based on the Hyperledger Fabric platform is also adopted to ensure data sharing security. Extensive experiments have been carried out to evaluate the proposed data-sharing framework in terms of the sum of squared error, sharing degree, time cost, computational complexity, throughput, and CPU utilization for proving its efficacy and applicability. The results show that the CSB framework achieves a higher degree of SD, lower computational complexity, and higher throughput. [less ▲]

Full Text
Peer Reviewed
See detailSecure Energy Efficiency Maximization in Cognitive Satellite-Terrestrial Networks
Lu, Weixin; An, Kang; Liang, Tao et al

in IEEE Systems Journal (2021), 15(2), 2382-2385

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for ... [more ▼]

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for the primary satellite network while satisfying the allowable signal-to-interference-plus-noise ratio requirements of the secondary and primary users along within the transmit power limitation of both satellite and the terrestrial base station. Owing to the nonconvexity and intractability of the original optimization problem, a beamforming scheme and associated transformation algorithms are proposed by jointly applying the Taylor approximation, fraction programming, and alternating search to cope with the implementation difficulty. The key is to convert the original optimization problem into a simple convex framework and obtain the optimal solution step by step. Finally, numerical simulations are given to verify the feasibility and practicability of the proposed optimization algorithms. [less ▲]

Detailed reference viewed: 66 (7 UL)
Full Text
Peer Reviewed
See detailA Secure Exam Protocol Without Trusted Parties
Bella, Giampaolo; Giustolisi, Rosario UL; Lenzini, Gabriele UL et al

in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

Detailed reference viewed: 350 (14 UL)
Full Text
Peer Reviewed
See detailSecure exams despite malicious management
Bella, Giampaolo; Giustolisi, Rosario UL; Lenzini, Gabriele UL

in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

Detailed reference viewed: 178 (8 UL)
Full Text
Peer Reviewed
See detailSecure M-PSK Communication via Directional Modulation
Kalantari, Ashkan UL; Soltanalian, Mojtaba; Maleki, Sina UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2016, March)

In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional ... [more ▼]

In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M-PSK symbol. Due to the difference between the channels of the legitimate receiver and the eavesdropper, the signals received by the eavesdropper generally encompass a phase component different than the actual symbols. As a result, the transceiver which employs directional modulation can impose a high symbol error rate on the eavesdropper without requiring to know the eavesdropper's channel. The optimal directional modulation beamformer is designed to minimize the consumed power subject to satisfying a specific resulting phase and minimal signal amplitude at each antenna of the legitimate receiver. The simulation results show that the directional modulation results in a much higher symbol error rate at the eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing precoding at the transmitter. [less ▲]

Detailed reference viewed: 205 (15 UL)