修车大队一品楼qm论坛51一品茶楼论坛,栖凤楼品茶全国楼凤app软件 ,栖凤阁全国论坛入口,广州百花丛bhc论坛杭州百花坊妃子阁

oe1(光电查) - 科学论文

5 条数据
?? 中文(中国)
  • Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications

    摘要: Smart cameras are key sensors in Internet of Things (IoT) applications and often capture highly sensitive information. Therefore, security and privacy protection is a key concern. This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step. We deploy signcryption to efficiently protect sensitive data onboard the cameras and secure the data transfer from multiple cameras to multiple monitoring devices. Our multi-sender/multi-receiver approach provides integrity, authenticity, and confidentiality of data with decryption fairness for multiple receivers throughout the entire lifetime of the data. It further provides public verifiability and forward secrecy of data. Our certificateless multi-receiver aggregate-signcryption protection has been implemented for a smart camera IoT scenario, and the runtime and communication effort has been compared with single-sender/single-receiver and multi-sender/single-receiver setups.

    关键词: elliptic-curve signcryption,resource efficiency,smart cameras,Internet of Things,multi-receiver aggregate-signcryption,data security

    更新于2025-09-19 17:15:36

  • [IEEE 2019 34th Symposium on Microelectronics Technology and Devices (SBMicro) - Sao Paulo, Brazil (2019.8.26-2019.8.30)] 2019 34th Symposium on Microelectronics Technology and Devices (SBMicro) - Analysis and measurement of the non-linear refractive index of SiO <sub/>x</sub> N <sub/>y</sub> using pedestal waveguides

    摘要: Incidents involving data breaches are ever-present in the media since several years. In order to overcome this threat, organizations apply enterprise content-aware data leakage prevention (DLP) solutions to monitor and control data access and usage. However, this paper argues that current solutions are not able to reliably protect information assets. The analyses of data breaches reported in 2014 reveal a significant number of data leakage incidents that are not within the focus of the DLP solutions. Furthermore, these analyses indicate that the classification of the provided data breach records is not qualified for detailed investigations. Therefore, advanced criteria for characterizing data leakage incidents are introduced, and the reported records are extended. The resulting analyses illustrate that DLP and information leakage prevention (ILP) demand various information security (IS) measures to be established in order to reduce the risk of technologically based data breaches. Furthermore, the effectiveness of DLP and information leakage prevention (ILP) measures is significantly influenced by non-technological aspects, such as the human factor. Therefore, this paper presents a concept for establishing DLP and ILP within the scope of IS.

    关键词: information leakage prevention,information exposure,data security,Security,data leakage prevention,information security

    更新于2025-09-19 17:13:59

  • Fast and precise global maximum power point tracking techniques for photovoltaic system

    摘要: Incidents involving data breaches are ever-present in the media since several years. In order to overcome this threat, organizations apply enterprise content-aware data leakage prevention (DLP) solutions to monitor and control data access and usage. However, this paper argues that current solutions are not able to reliably protect information assets. The analyses of data breaches reported in 2014 reveal a significant number of data leakage incidents that are not within the focus of the DLP solutions. Furthermore, these analyses indicate that the classification of the provided data breach records is not qualified for detailed investigations. Therefore, advanced criteria for characterizing data leakage incidents are introduced, and the reported records are extended. The resulting analyses illustrate that DLP and information leakage prevention (ILP) demand various information security (IS) measures to be established in order to reduce the risk of technologically based data breaches. Furthermore, the effectiveness of DLP and information leakage prevention (ILP) measures is significantly influenced by non-technological aspects, such as the human factor. Therefore, this paper presents a concept for establishing DLP and ILP within the scope of IS.

    关键词: information leakage prevention,information exposure,data security,Security,data leakage prevention,information security

    更新于2025-09-19 17:13:59

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Towards High-Efficiency Triple-Junction Bifacial III-V Nanowire-on-Silicon Solar Cells: Design Approaches Enabling the Concept

    摘要: Incidents involving data breaches are ever-present in the media since several years. In order to overcome this threat, organizations apply enterprise content-aware data leakage prevention (DLP) solutions to monitor and control data access and usage. However, this paper argues that current solutions are not able to reliably protect information assets. The analyses of data breaches reported in 2014 reveal a significant number of data leakage incidents that are not within the focus of the DLP solutions. Furthermore, these analyses indicate that the classification of the provided data breach records is not qualified for detailed investigations. Therefore, advanced criteria for characterizing data leakage incidents are introduced, and the reported records are extended. The resulting analyses illustrate that DLP and information leakage prevention (ILP) demand various information security (IS) measures to be established in order to reduce the risk of technologically based data breaches. Furthermore, the effectiveness of DLP and information leakage prevention (ILP) measures is significantly influenced by non-technological aspects, such as the human factor. Therefore, this paper presents a concept for establishing DLP and ILP within the scope of IS.

    关键词: information leakage prevention,information exposure,data security,Security,data leakage prevention,information security

    更新于2025-09-19 17:13:59

  • [IEEE 2018 Global Internet of Things Summit (GIoTS) - Bilbao, Spain (2018.6.4-2018.6.7)] 2018 Global Internet of Things Summit (GIoTS) - Aggregate-Signcryption for Securing Smart Camera IoT Applications

    摘要: Smart cameras are considered as key sensors in Internet of Things (IoT) applications ranging from home to city scales. Since these cameras often capture highly sensitive information, security is a major concern. An elliptic curve (EC) based signcryption achieves resource-ef?ciency by performing data encryption and signing in a single step. In this work, we present aggregate-signcryption which extends the EC-based signcryption approach to a cluster-based multi-camera setup. The signcrypted data from the smart cameras within a cluster is aggregated on a speci?c node called cluster head. Aggregate-signcryption reduces the communication overhead and requires fewer steps for the unsigncryption as compared to individual signcryption.

    关键词: Data Security,Internet of Things,Aggregate-signcryption,Smart cameras

    更新于2025-09-10 09:29:36