Institutions
|
About Us
|
Help
|
Gaeilge
0
1000
Home
Browse
Advanced Search
Search History
Marked List
Statistics
A
A
A
Author(s)
Institution
Publication types
Funder
Year
Limited By:
Subject = Digital Communications and Networking;
36 items found
Sort by
Title
Author
Item type
Date
Institution
Peer review status
Language
Order
Ascending
Descending
25
50
100
per page
1
2
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Displaying Results 1 - 25 of 36 on page 1 of 2
Marked
Mark
A Bandwidth Aware Modification to the DSR Routing Protocol for Wireless Mesh Networks
(2009)
Ramadhan, Mustafa; Davis, Mark
A Bandwidth Aware Modification to the DSR Routing Protocol for Wireless Mesh Networks
(2009)
Ramadhan, Mustafa; Davis, Mark
Abstract:
This work proposes a bandwidth aware cross-layer modification to the DSR routing protocol. We include the Access Efficiency Factor (AEF) parameter in addition to the hop-count in the routing discovery mechanism. AEF is a measure to the local availability of bandwidth at a node. Employing the AEF as a metric in the routing discovery mechanism attempts to avoid routing through a congested area in the network. In this modification, we impose a limit on the hop-count in order to control the delay time in the network. The path selection procedure operates by finding a path with the highest minimum AEF value. We have utilized the OPNET modeler simulator to investigate the performance of the modified DSR protocol on a series of randomly generated network topologies of different hopcount limits. The simulator was run twice for each network topology. The first run implemented the standard DSR algorithm while the second implemented the modified DSR protocol. The average global throughput and ...
https://arrow.dit.ie/commcon/36
Marked
Mark
A Covert Encryption Method for Applications in Electronic Data Interchange
(2009)
Blackledge, Jonathan; Dubovitskiy, Dmitry
A Covert Encryption Method for Applications in Electronic Data Interchange
(2009)
Blackledge, Jonathan; Dubovitskiy, Dmitry
Abstract:
A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image. In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any bit; (ii) maximize diffusion in terms of key dependency so that a change in any bit of the key can effect any, and potentially all, bits of the cipher. In the work reported here, we consider an approach in which a binary or low-bit plaintext image is encrypted with a decimal integer or floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary ima...
https://arrow.dit.ie/engscheleart2/27
Marked
Mark
A Cross-Layer Modification to the DSR Routing Protocol in Wireless Mesh Networks
(2010)
Ramadhan, Mustafa
A Cross-Layer Modification to the DSR Routing Protocol in Wireless Mesh Networks
(2010)
Ramadhan, Mustafa
Abstract:
A cross-layer modification to the DSR routing protocol that finds high throughput paths in WMNs has been introduced in this work. The Access Efficiency Factor (AEF) has been introduced in this modification as a local congestion avoidance metric for the DSR routing mechanism as an alternative to the hop count (Hc) metric. In this modification, the selected path is identified by finding a path with the highest minimum AEF (max_min_AEF) value. The basis of this study is to compare the performance of the Hc and max_min_AEF as routing metrics for the DSR protocol in WMNs using the OPNET modeler. Performance comparisons between max_min_AEF, Metric Path (MP), and the well known ETT metrics are also carried out in this work. The results of this modification suggest that employing the max_min_AEF as a routing metric outperforms the Hc, ETT, and MP within the DSR protocol in WMNs in terms of throughput. This is because the max_min_AEF is based upon avoiding directing traffic through congested...
https://arrow.dit.ie/engdoc/33
Marked
Mark
A Wireless and Digital Electrode Bus Topology for Biopotential Measurement
(2012)
Nolan, Mark; Burke, Edward; Coyle, Eugene
A Wireless and Digital Electrode Bus Topology for Biopotential Measurement
(2012)
Nolan, Mark; Burke, Edward; Coyle, Eugene
Abstract:
The conventional biopotential measurement configuration utilises long lead wires which connect measuring electrodes to signal conditioning circuitry. The majority of bioelectric signals that are measured from the human body have a tiny signal amplitude (5µV-5mV range) and thus any interference that is induced on the lead wires can have a detrimental effect on the original signal. In this paper, we present an alternative configuration, in which digitisation occurs on the electrode, potentially providing enhanced signal measurement as well as significant benefits in terms of the simplification of the physical interconnections between electrodes. Multiple electrodes are combined to form a digital electrode bus. This proposed topology represents the next stage in the evolution of bioelectric measurement as, due to the decrease in cost and size of integrated circuits, more of the bioinstrumentation circuitry is shifted away from a base measurement station and into the electrode itself. T...
https://arrow.dit.ie/teapotcon/28
Marked
Mark
Adaptive OFDM for Wireless Interconnect in Confined Enclosures
(2013)
Sipal, Vit; Gelabert, Javier; Stevens, Christopher J.; Allen, Ben; Edwards, David
Adaptive OFDM for Wireless Interconnect in Confined Enclosures
(2013)
Sipal, Vit; Gelabert, Javier; Stevens, Christopher J.; Allen, Ben; Edwards, David
Abstract:
This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.
https://arrow.dit.ie/ahfrcart/47
Marked
Mark
An Adaptive Packet Aggregation Algorithm (AAM) for Wireless Networks
(2013)
Deng, Jianhua
An Adaptive Packet Aggregation Algorithm (AAM) for Wireless Networks
(2013)
Deng, Jianhua
Abstract:
Packet aggregation algorithms are used to improve the throughput performance by combining a number of packets into a single transmission unit in order to reduce the overhead associated with each transmission within a packet-based communications network. However, the throughput improvement is also accompanied by a delay increase. The biggest drawback of a significant number of the proposed packet aggregation algorithms is that they tend to only optimize a single metric, i.e. either to maximize throughput or to minimize delay. They do not permit an optimal trade-off between maximizing throughput and minimizing delay. Therefore, these algorithms cannot achieve the optimal network performance for mixed traffic loads containing a number of different types of applications which may have very different network performance requirements. In this thesis an adaptive packet aggregation algorithm called the Adaptive Aggregation Mechanism (AAM) is proposed which achieves an aggregation trade-off ...
https://arrow.dit.ie/engdoc/64
Marked
Mark
An Autonomous Channel Selection Algorithm for WLANs
(2013)
Deng, Fuhu
An Autonomous Channel Selection Algorithm for WLANs
(2013)
Deng, Fuhu
Abstract:
IEEE 802.11 wireless devices need to select a channel in order to transmit their packets. However, as a result of the contention-based nature of the IEEE 802.11 CSMA/CA MAC mechanism, the capacity experienced by a station is not fixed. When a station cannot win a sufficient number of transmission opportunities to satisfy its traffic load, it will become saturated. If the saturation condition persists, more and more packets are stored in the transmit queue and congestion occurs. Congestion leads to high packet delay and may ultimately result in catastrophic packet loss when the transmit queue’s capacity is exceeded. In this thesis, we propose an autonomous channel selection algorithm with neighbour forcing (NF) to minimize the incidence of congestion on all stations using the channels. All stations reassign the channels based on the local monitoring information. This station will change the channel once it finds a channel that has sufficient available bandwidth to satisfy its traffic...
https://arrow.dit.ie/engdoc/65
Marked
Mark
An Experimental Analysis of the Call Capacity of IEEE 802.11b Wireless Local Area Networks for VoIP Telephony
(2006)
Keegan, Brian; Davis, Mark
An Experimental Analysis of the Call Capacity of IEEE 802.11b Wireless Local Area Networks for VoIP Telephony
(2006)
Keegan, Brian; Davis, Mark
Abstract:
In this paper we present the results from an experimental study of the call capacity of an IEEE 802.11b network when using VoIP telephony. Experiments include increasing the number of VoIP users in a wireless test-bed and increasing the level of background traffic until network saturation occurs. The experiments allow us to perform an analysis of the access point (AP) buffer dynamics. Results show that the network is capable of supporting up to 16 VoIP stations (STAs). Due to the operation of the IEEE 802.11 medium access control (MAC) mechanism, the AP acts as a bottleneck for all traffic destined for wireless STAs, in that significant delays can be incurred by VoIP packets which can lead to a poor perceived QoS by users. Consequently the performance of the AP downlink is the critical component in determining VoIP call capacity. We also show that large peak loads occur during periods of double-talk effectively reducing the capacity of the network.
https://arrow.dit.ie/commcon/3
Marked
Mark
An XML Framework for the Structured Data Exchange Between Medical Devices
(2015)
Neuhaus, Ulrich; Walsh, Paul
An XML Framework for the Structured Data Exchange Between Medical Devices
(2015)
Neuhaus, Ulrich; Walsh, Paul
Abstract:
This paper describes an XML framework for the exchange of data between medical devices and software systems. XML technologies offer an extensible data format, which is easy to both create and process and simplifies the exchange of data. Different XML standards are defined within the framework in order to provide a practical solution for both device manufacturers and software developers. The structure and benefits of XML documents are discussed and an XML framework for ophthalmology is described.
https://arrow.dit.ie/itbj/vol3/iss2/8
Marked
Mark
Antennas for Portable Communications in the UWB and GPS Spectra.
(2008)
Ruvio, Giuseppe
Antennas for Portable Communications in the UWB and GPS Spectra.
(2008)
Ruvio, Giuseppe
Abstract:
The thesis describes a study of antennas for solutions in emerging systems. An account of the fundamental principles of these antennas is given together with an outline of the basic electromagnetic theory on which the designs are based. While the main focus is on antennas for Ultra Wideband (UWB) systems, some additional work was carried out on enhancing performance of circularly polarised antennas for satellite navigation systems. The study focussed on the design of highly efficient broadband antennas with particular requirements for size compactness, gain stability, phase-linearity, and the use of low-cost materials. These requirements are particularly important for UWB system antennas that operate in the Federal Communications Commission (FCC) allocated frequency range 3.1-10.6GHz. Very compact solutions were produced in the form of small semi-planar monopole antennas with broad bandwidth impedance and stable radiation properties that showed independence from groundplane dimensio...
https://arrow.dit.ie/engdoc/15
Marked
Mark
Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images
(2011)
Blackledge, Jonathan; Al-Rawi, AbdulRahman
Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images
(2011)
Blackledge, Jonathan; Al-Rawi, AbdulRahman
Abstract:
Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submit...
https://arrow.dit.ie/engscheleart2/45
Marked
Mark
Be Aware with a Honeypot
(2017)
Meyer, Stephen; Smyth, Ivan; Cummins, Mark; Keane, Anthony
Be Aware with a Honeypot
(2017)
Meyer, Stephen; Smyth, Ivan; Cummins, Mark; Keane, Anthony
Abstract:
The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the majority of scans and vulnerability attacks that were used and investigate the processes that targeted vulnerable ports and access points on the network.
https://arrow.dit.ie/itbj/vol8/iss2/2
Marked
Mark
BIM+Blockchain: A Solution to the Trust Problem in Collaboration?
(2017)
Mathews, Malachy; Robles, Dan; Bowe, Brian
BIM+Blockchain: A Solution to the Trust Problem in Collaboration?
(2017)
Mathews, Malachy; Robles, Dan; Bowe, Brian
Abstract:
This paper provides an overview of historic and current organizational limitations emerging in the Architecture, Engineering, Construction, Building Owner / Operations (AECOO) Industry. It then provides an overview of new technologies that attempt to mitigate these limitations. However, these technologies, taken together, appear to be converging and creating entirely new organizational structures in the AEC industries. This may be characterized by the emergence of what is called the Network Effect and it’s related calculus. This paper culminates with an introduction to Blockchain Technology (BT) and it’s integration with the emergence of groundbreaking technologies such as Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML) and Financial / Insurance products. To illustrate this process, we use choose Building Information Modelling (BIM) technology as our model network database for the AECOO industry. Interaction with the BIM database is an activity that gen...
https://arrow.dit.ie/bescharcon/26
Marked
Mark
Digital content preservation across domain verticals
(2010)
Maad, Soha; Dimitrov, Borislav D
Digital content preservation across domain verticals
(2010)
Maad, Soha; Dimitrov, Borislav D
Abstract:
<p>This article is available at http://www.informatics.org.cn. The work is partially supported by the Health Research Board of Ireland through the HRB Centre for Primary Care Research under Grant HRC/2007/1.</p>
<p>The authors present a novel approach to develop scalable systems and services for preserving digital content generated from various application domains. The aim is to deliver an integrative scalable approach for digital content preservation across domain verticals. This would involve consolidating approaches for modeling document workflow, preserving the integrity of heterogeneous data, and developing robust and scalable tools for digital preservation ensuring interoperability across domains verticals. The authors consider various application domains including: healthcare, public, business and finance, media and performing art, and education. The authors focus on specific case studies of digital content preservation across the considered domain vert...
https://epubs.rcsi.ie/gpart/5
Marked
Mark
E-Fraud Prevention based on the Self-Authentication of E-Documents
(2010)
Blackledge, Jonathan; Coyle, Eugene
E-Fraud Prevention based on the Self-Authentication of E-Documents
(2010)
Blackledge, Jonathan; Coyle, Eugene
Abstract:
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been designed to operate with 24-bit colour images. The approach has a variety of applications and in this paper, we focus on the authentication and self-authentication of e-documents (letters and certificates, for example) that are communicated over the Internet and are thereby vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.).
https://arrow.dit.ie/engscheleart/150
Marked
Mark
EgoViz – a Mobile Based Spatial Interaction System
(2009)
Gardiner, Keith; Yin, Junjun; Carswell, James
EgoViz – a Mobile Based Spatial Interaction System
(2009)
Gardiner, Keith; Yin, Junjun; Carswell, James
Abstract:
This paper describes research carried out in the area of mobile spatial interaction and the development of a mobile (i.e. on-device) version of a simulated web-based 2D directional query processor. The TellMe application integrates location (from GPS, GSM, WiFi) and orientation (from digital compass/tilt sensors) sensing technologies into an enhanced spatial query processing module capable of exploiting a mobile device’s position and orientation for querying real-world 3D spatial datasets. This paper outlines the technique used to combine these technologies and the architecture needed to deploy them on a sensor enabled smartphone (i.e. Nokia 6210 Navigator). With all these sensor technologies now available on one device, it is possible to employ a personal query system that can work effectively in any environment using location and orientation as primary parameters for directional queries. In doing so, novel approaches for determining a user’s query space in 3 dimensions based on li...
https://arrow.dit.ie/dmcart/36
Marked
Mark
Embedded Systems in a Mobile Distributed IP Network
(2015)
Gildea, Conor; Barber, Declan
Embedded Systems in a Mobile Distributed IP Network
(2015)
Gildea, Conor; Barber, Declan
Abstract:
This paper describes an approach to the internetworking of mobile IP sensor nodes in a converged network environment. This preliminary investigation of sensory network models is driven by a joint applied research project between ITB and Teagasc (Grange) which seeks to establish the feasibility of the real-time remote monitoring of animal welfare while in transit between Ireland, Europe and the Middle East. The paper examines traditional system architectures, messaging paradigms and protocols with a view to establishing how the trend towards convergence in telecommunications and the emergence of new Internet Protocols could support the creation of new modes of operation for sensory networks.
https://arrow.dit.ie/itbj/vol4/iss2/8
Marked
Mark
GlobalCom
(2015)
Barber, Declan; Gildea, Conor; Byrne, Gavin
GlobalCom
(2015)
Barber, Declan; Gildea, Conor; Byrne, Gavin
Abstract:
The objective of this developed application is to provide a company with a means of communicating with its employees no matter where they are physically located and what communication resources they may have at any particular time. The core focus of this application is to provide a Unified Messaging System using synchronous and asynchronous forms.
https://arrow.dit.ie/itbj/vol3/iss2/4
Marked
Mark
Investigating Text Message Classification Using Case-based Reasoning
(2007)
Healy, Matt
Investigating Text Message Classification Using Case-based Reasoning
(2007)
Healy, Matt
Abstract:
Text classification is the categorization of text into a predefined set of categories. Text classification is becoming increasingly important given the large volume of text stored electronically e.g. email, digital libraries and the World Wide Web (WWW). These documents represent a massive amount of information that can be accessed easily. To gain benefit from using this information requires organisation. One way of organising it automatically is to use text classification. A number of well known machine learning techniques have been used in text classification including Naïve Bayes, Support Vector Machines and Decision Trees, and the less commonly used are k-Nearest Neighbour, Neural Networks and Genetic Algorithms. One aspect of text classification is general message classification, the ability to correctly classify text messages containing text of different lengths. There are many applications that would benefit from this. An example of such applications are, personal emailing fi...
https://arrow.dit.ie/scienmas/32
Marked
Mark
Longer Than a Telephone Wire - Voice Firewalls to Counter Ubiquitous Lie Detection
(2015)
Reynolds, Carl; Smith, Matt; Woodman, Mark
Longer Than a Telephone Wire - Voice Firewalls to Counter Ubiquitous Lie Detection
(2015)
Reynolds, Carl; Smith, Matt; Woodman, Mark
Abstract:
Mobile computing and communication devices are open to surreptitious privacy attacks using emotion detection techniques; largely utilising work carried out in the area of voice stress analysis (VSA). This paper extends some work in the area of removing emotion cues in the voice, specifically focusing on lie detection and presents the results of a pilot study indicating that the use of mobile phones in situations of stress is common and that awareness of VSA is low. Existing strategies for the removal or modification of emotion cues, based on models of synthesis are considered and weaknesses are identified.
https://arrow.dit.ie/itbj/vol3/iss2/7
Marked
Mark
Measuring and Monitoring Speech Quality for Voice over IP with POLQA, ViSQOL and P.563
(2015)
Hines, Andrew; Gillen, Eoin; Harte, Naomi
Measuring and Monitoring Speech Quality for Voice over IP with POLQA, ViSQOL and P.563
(2015)
Hines, Andrew; Gillen, Eoin; Harte, Naomi
Abstract:
There are many types of degradation which can occur in Voice over IP (VoIP) calls. Of interest in this work are degradations which occur independently of the codec, hardware or network in use. Specifically, their effect on the subjective and objec- tive quality of the speech is examined. Since no dataset suit- able for this purpose exists, a new dataset (TCD-VoIP) has been created and has been made publicly available. The dataset con- tains speech clips suffering from a range of common call qual- ity degradations, as well as a set of subjective opinion scores on the clips from 24 listeners. The performances of three ob- jective quality metrics: POLQA, ViSQOL and P.563, have been evaluated using the dataset. The results show that full reference metrics are capable of accurately predicting a variety of com- mon VoIP degradations. They also highlight the outstanding need for a wideband, single-ended, no-reference metric to mon- itor accurately speech quality for degradations common in ...
https://arrow.dit.ie/scschcomcon/173
Marked
Mark
Monitoring VoIP Speech Quality for Chopped and Clipped Speech
(2016)
Hines, Andrew; Skoglund, Jan; Kokaram, Anil C; Harte, Naomi
Monitoring VoIP Speech Quality for Chopped and Clipped Speech
(2016)
Hines, Andrew; Skoglund, Jan; Kokaram, Anil C; Harte, Naomi
https://arrow.dit.ie/scschcomart/46
Marked
Mark
On the Applications of Deterministic Chaos for Encrypting Data on the Cloud
(2010)
Blackledge, Jonathan; Ptitsyn, Nikolai
On the Applications of Deterministic Chaos for Encrypting Data on the Cloud
(2010)
Blackledge, Jonathan; Ptitsyn, Nikolai
Abstract:
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. We study cryptographic systems using finite-state approximations to chaos or ‘pseudo-chaos’ and develop an approach based on the concept of multi-algorithmic cryptography that exploits the properties of pseudo-chaos. Although such algorithms can be taken to be in the public domain in order to conform with the Kerchhoff-Shannon principal, i.e. the enemy knows the system, th...
https://arrow.dit.ie/engscheleart/147
Marked
Mark
On the Applications of Deterministic Chaos for Encrypting Data on the Cloud
(2011)
Blackledge, Jonathan; Ptitsyn, Nikolai
On the Applications of Deterministic Chaos for Encrypting Data on the Cloud
(2011)
Blackledge, Jonathan; Ptitsyn, Nikolai
Abstract:
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. We study cryptographic systems using finite-state approximations to chaos or ‘pseudo-chaos’ and develop an approach based on the concept of multi-algorithmic cryptography that exploits the properties of pseudo-chaos. Although such algorithms can be taken to be in the public domain in order to conform with the Kerchhoff-Shannon principal, i.e. the enemy knows the system, th...
https://arrow.dit.ie/engscheleart/170
Marked
Mark
On the Development of a One-Time Pad Generator for Personalising Cloud Security
(2017)
Tobin, Paul; Tobin, Lee; McKeever, Michael; Blackledge, Jonathan, Profesor
On the Development of a One-Time Pad Generator for Personalising Cloud Security
(2017)
Tobin, Paul; Tobin, Lee; McKeever, Michael; Blackledge, Jonathan, Profesor
Abstract:
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulo-two arithmetic, where the key passed the National Institute of Standards and Technology statisti...
https://arrow.dit.ie/engscheleart/250
Displaying Results 1 - 25 of 36 on page 1 of 2
1
2
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Institution
Dublin Institute of Technology (34)
Royal College of Surgeons i... (2)
Item Type
Conference item (14)
Journal article (6)
Other (16)
Peer Review Status
Peer-reviewed (1)
Non-peer-reviewed (1)
Unknown (34)
Year
2017 (5)
2016 (2)
2015 (9)
2013 (3)
2012 (1)
2011 (2)
2010 (5)
2009 (4)
2008 (2)
2007 (2)
2006 (1)
built by Enovation Solutions