scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
This new approach allows the end-user to send private and classified message via SMS.
By using part of the power towards a private message, we can effectively modify the channel seen by compute-and-forward.
a private message is perceived as more intimate if sent out at night as opposed to daytime).
The interferer, which does not know the confidential message assists the confidential message transmission by sending a signal that is independent of the transmitted message.
The proposed protocol allows a sender to divide a private message into two parts and send those parts to different receivers in a deterministic way.
So, the secret message can send in a secret and obscure way using steganography techniques.
Proceedings ArticleDOI
20 Sep 2010
33 Citations
In this paper we present a novel scheme to send message imperceptibly between points over Internet.
This enables the confidential message communication among group users, and grants any outsider to send message to the group.
This means that, a first solution could be, to send the message to dl members of the group, e. g., using their public keys.

See what other people are reading

Are there any papers on gels that have multiple properties?
5 answers
Research papers have explored the development of gels with multiple properties. For instance, a study by Zhou et al. demonstrated the engineering of viscoelastic properties in nanoparticle gels, achieving high storage and loss moduli simultaneously. Additionally, Mizuno et al. investigated particulate physical gels with a multiscale nature in their vibrational states and phonon transport properties, showcasing distinct crossovers at specific frequencies. Furthermore, Chen et al. proposed a nanofiber-reinforced hydrogel with reversible information recording, self-encryption, and multi-decryption capabilities, providing a universal information-handling system. These papers collectively highlight the diverse functionalities that gels can possess, ranging from mechanical properties to information handling and phonon transport behaviors.
How to improve the efficiency of a text messaging booking system?
5 answers
To enhance the efficiency of a text messaging booking system, integrating electronic questionnaires can streamline processes and save time. By sending text links for initial assessments and follow-ups, like in the case of a Fracture Liaison Service (FLS) study, the system can gather necessary information swiftly. This method allows for quick data analysis and action planning, leading to cost savings and reduced practitioner time, as demonstrated by the FLS cost analysis. Additionally, utilizing electronic forms for booking services, as seen in the SMS booking systems described in other studies, can simplify the booking process, making it more accessible and user-friendly. By combining these approaches, text messaging booking systems can significantly improve efficiency and effectiveness.
How do wireless sensor networks differ from traditional wired sensor networks in terms of deployment and maintenance costs?
5 answers
Wireless sensor networks (WSNs) differ from traditional wired sensor networks in deployment and maintenance costs. WSNs offer advantages like greater flexibility, scalability, and the ability to monitor multiple locations simultaneously, leading to lower installation and maintenance costs compared to wired networks. However, a significant challenge for WSNs is their limited lifetime due to battery replacements, which can be costly and time-consuming. To address this, researchers have developed energy-efficient protocols, energy harvesting techniques, and the use of renewable energy sources to improve the lifetime of WSNs. These advancements aim to reduce energy consumption, enable sensors to recharge using ambient energy sources, and provide a reliable power supply through renewable sources like solar panels, ultimately impacting deployment and maintenance costs positively.
What are the potential benefits and challenges of implementing a homomorphic blockchain approach for enhanced data security?
5 answers
Implementing a homomorphic blockchain approach, such as 5ireHE, offers enhanced data security by combining blockchain's decentralized system with homomorphic encryption. This fusion allows for secure data storage and sharing while preserving privacy. Benefits include end-to-end encryption, data segregation, and improved privacy protection. However, challenges like limited support for advanced operations in neural networks, scalability issues, and performance trade-offs need addressing. Additionally, real-time implementation is crucial for homomorphic encryption to achieve better improvements. Despite these challenges, leveraging homomorphic encryption in blockchain systems can redefine paradigms in e-health, ensuring data privacy and security.
What is iteracare?
4 answers
IteraCare is a multifaceted system designed to enhance care provision in various contexts. It encompasses an e-learning project, I-CARE (Improving Care and Access for Rainbow Equity), aimed at filling gaps in healthcare professionals' education regarding LGBTIQ+ health. Additionally, IteraCare includes a hand-held activation system for caregivers to engage individuals with dementia, facilitating cognitive and social activation without specialized training. Moreover, an intelligent care system is part of IteraCare, integrating physiological value detection, data encryption, and cloud synchronization to ensure efficient and secure care provision. Furthermore, in the realm of Internet of Things (IoT), IteraCare leverages IoT technologies to develop pervasive healthcare frameworks, addressing health monitoring, elderly care, and chronic diseases to improve quality of life and reduce costs. Overall, IteraCare represents a comprehensive approach to enhancing care delivery through education, technology, and personalized support systems.
Why is iron soccer ball not suitable?
5 answers
The iron soccer ball problem arises in models where Lorentz symmetry in momentum space is modified, potentially due to effects of quantum gravity, such as in Loop Quantum Gravity theories. This issue pertains to the treatment of multi-particle states and poses a significant challenge in these modified symmetry models. While iron is widely used in various applications due to its abundance, it has shown limitations in solar energy conversion technologies, such as in photovoltaics and dye-sensitized solar cells, where its inclusion has led to inefficiencies and poor performance. Therefore, the unsuitability of iron in the context of the soccer ball problem and solar energy applications highlights the need for alternative materials and approaches in these scientific domains.
Discuss about hash method in Lightweight cryptography in IoT. And what are the challenges of Lightweight cryptography implementation?
5 answers
Hash methods play a crucial role in Lightweight cryptography for ensuring data integrity in IoT applications. The National Institute of Standards and Technology (NIST) has been actively involved in standardizing lightweight hash functions to meet the security demands of IoT environments. Implementations of hash functions like PHOTON-Beetle, Sparkle, Ascon, and Xoodyak have been optimized for field-programmable gate array (FPGA) to achieve small hardware footprints and high throughput-to-area ratios, making them suitable for resource-constrained IoT devices. However, challenges in Lightweight cryptography implementation include the need for algorithms that are both secure and resource-efficient due to the limited capabilities of IoT devices. Additionally, ensuring that cryptographic algorithms are lightweight while maintaining adequate security levels remains a key challenge in securing IoT devices effectively.
ISO 25010 "Security"
5 answers
ISO 25010 defines security as a crucial aspect in various systems, including web applications, academic information systems, and information security management systems. Studies have utilized ISO 25010 to enhance security measures, such as implementing the advanced encryption standard (AES) for data protection, establishing a security quality framework for academic information systems, and evaluating user satisfaction based on security measures in web-based systems. Additionally, ISO 25010 has been instrumental in testing and ensuring the quality of monitoring systems in educational settings, covering aspects like functional suitability, usability, reliability, performance efficiency, and maintainability. Furthermore, the application of ISO/IEC 27001 framework has led to improved information security governance, emphasizing the importance of information security management systems for achieving business goals.
What is the paper solving?
4 answers
Paper solving refers to the process of solving mathematical problems or addressing challenges related to paper properties and production. In the context of mathematics, paper folding activities can enhance geometric and algebraic thinking among students, fostering problem-solving skills and mathematical proficiencies. On the other hand, in engineering education, paper-and-pencil solutions can serve as indicators of problem-solving skills, such as accurate diagramming, strategic inferences, and solution checking, aiding in distinguishing skill levels and improving feedback effectiveness. Additionally, research focuses on methods for producing paper with specific properties, like high sizing capability and reduced friction coefficient, through coating processes involving various compounds like copolymers and ketene dimers. These diverse contexts highlight the multifaceted nature of paper solving in both mathematical and practical applications.
How developments in technology effects hacking?
5 answers
Developments in technology significantly impact hacking activities. The evolution of artificial intelligence (AI), autonomous platforms, and augmented/virtual reality (AR/VR) intensifies the characteristics of offensive cyber operations (OCOs) and deepens vulnerabilities in information networks. The rapid growth of information technology globally, including computer networks and the internet, has facilitated cybercrime such as hacking, credit card theft, and data manipulation, posing threats to stability and challenging law enforcement. Hacker attacks have become more sophisticated and professional, targeting industrial systems and engaging in organized cybercrime linked to illegal activities like drug trafficking and terrorism, necessitating enhanced international cooperation in combating cyber threats. Moreover, the development of stronger encryption algorithms, like the modified advanced encryption standard (AES) using quantum computing, is crucial to counter advancing hacking technologies and secure sensitive data. The emergence of hacker groups intertwined with organized crime highlights the need for specialized legislation to combat cybercriminal organizations effectively.
Can statistical methods be combined with other encryption techniques to improve the security of digital images?
4 answers
Statistical methods can indeed be combined with other encryption techniques to enhance the security of digital images. For instance, a hybrid approach integrating chaotic encryption and wavelet-based compression has been proposed to secure images efficiently while reducing storage space and transmission time. Additionally, combining the RSA algorithm with Chaos-based encryption can provide advanced encryption, offering both speed and high security levels. Moreover, a dual security approach utilizing chaotic map scrambling and singular-value decomposition has been suggested for image encryption, demonstrating promising security qualities against various attacks. By integrating statistical methods with encryption techniques like chaotic encryption and compression, a comprehensive and robust security framework can be established to safeguard digital images effectively.