EURECOM

Displaying 1-40 of 116 results

  • White Papers // Jul 2014

    A Large-Scale Analysis of the Security of Embedded Firmwares

    As embedded systems are more than ever present in society, their security is becoming an increasingly important issue. However, based on the results of many recent analyses of individual firmware images, embedded systems acquired a reputation of being insecure. Despite these facts, the authors still lack a global understanding of...

    Provided By EURECOM

  • White Papers // Apr 2014

    Private and Dynamic Time-Series Data Aggregation With Trust Relaxation

    With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are...

    Provided By EURECOM

  • White Papers // Feb 2014

    Toward Black-Box Detection of Logic Flaws in Web Applications

    Web applications play a very important role in many critical areas, including online banking, health care, and personal communication. This, combined with the limited security training of many web developers, makes web applications one of the most common targets for attackers. In the past, researchers have proposed a large number...

    Provided By EURECOM

  • White Papers // Dec 2013

    Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares

    To address the growing concerns about the security of embedded systems, it is important to perform accurate analysis of firmware binaries, even when the source code or the hardware documentation is not available. However, research in this field is hindered by the lack of dedicated tools. For example, dynamic analysis...

    Provided By EURECOM

  • White Papers // Sep 2013

    ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

    With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of...

    Provided By EURECOM

  • White Papers // Sep 2013

    Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting

    Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate...

    Provided By EURECOM

  • White Papers // Sep 2013

    Towards the Model-Driven Engineering of Security Requirements for Embedded Systems

    This paper discusses why and how security requirements engineering must be adapted to the model-driven approach usually adopted to design and develop embedded systems. In particular, the authors discuss to what extent the elicitation of security requirements and the Y-chart partitioning approach, a central design methodology in embedded systems, can...

    Provided By EURECOM

  • White Papers // Jul 2013

    Elastic SIEM: Elastic Detector Integrated With OSSIM

    Cloud computing adoption is rising fast. Flexibility, pay-per-use and available resources on-demand with the promise of lower ownership costs are a very attractive value proposition. On the other hand, Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), are being asked for flexible cloud offerings while needing...

    Provided By EURECOM

  • White Papers // Jul 2013

    Secure Alert Tracking in Supply Chain

    Risk management practices, techniques and tools with respect to companies' supply chains have begun to receive more attention recently, as the need to improve supply chain performances has increased in order to keep the balance between financial considerations and those of the customer interests. With the multiplication of intermediate actors,...

    Provided By EURECOM

  • White Papers // Jun 2013

    The Role of Phone Numbers in Understanding Cyber-Crime Schemes

    Internet and telephones are part of everyone's modern life. Unfortunately, several criminal activities also rely on these technologies to reach their victims. While the use and importance of the Internet has been largely studied, previous work overlooked the role that phone numbers can play in understanding online threats. In this...

    Provided By EURECOM

  • White Papers // Jun 2013

    Effective and Efficient Security Policy Engines for Automotive On-Board Networks

    The configuration of security mechanisms in automotive onboard networks makes it necessary to define and deploy adapted security policies. This paper discusses how to design policy engines that implement an effective enforcement in such architectures despite the complexity of the protocol stacks of on-board electronic control units. It also evaluates...

    Provided By EURECOM

  • White Papers // Jun 2013

    Bootstrapping Security Associations in Opportunistic Networks

    Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, the authors analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. This key management solution relies on two phases: a first phase where nodes are...

    Provided By EURECOM

  • White Papers // Jun 2013

    QoE-Aware Traffic Management for Mobile Video Delivery

    Video delivery has become a major challenge for mobile networks. The increasing spread of smartphones, along with the expanding availability of LTE coverage, has contributed to an extensively growing mobile video demand, bringing large volumes of video traffic and far exceeding the capacity of mobile networks. As a result, wireless...

    Provided By EURECOM

  • White Papers // Jun 2013

    Degrees of Freedom of Downlink Single-And Multi-Cell Multi-User MIMO Systems With Location Based CSIT

    Multiple antennas facilitate the coexistence of multiple users in wireless communications, leading to spatial multiplexing and spatial division and to significant system capacity increase. However, this comes at the cost of very precise Channel State Information at the Transmitters (CSIT). The authors advocate the use of channel propagation models to...

    Provided By EURECOM

  • White Papers // Jun 2013

    Analysis of Pilot Decontamination Based on Power Control

    A subspace method for channel estimation is proposed for asymmetric antenna array systems. The so-called pilot contamination problem reported in is found to be due to the linearity of channel estimation in. The authors show that it does not occur in cellular systems with power control and power-controlled handoff when...

    Provided By EURECOM

  • White Papers // Jun 2013

    MIMO BC With Imperfect and Delayed Channel State Information at the Transmitter and Receivers

    In the setting of the two-user (M;N) Multiple-Input Multiple-Output (MIMO) Broadcast Channel (BC), recent work by Maddah-Ali and Tse, and Vaze and Varanasi have revealed the usefulness of delayed Channel State Information at the Transmitter (perfect delayed CSIT). The authors' work studies the general case of communicating with imperfect delayed...

    Provided By EURECOM

  • White Papers // Jun 2013

    Implementation and Test of a DSRC Prototype on OpenAirInterface SDR Platform

    This paper presents OpenAirITS, an open-source Software-Defined Radio platform for DSRC (802.11p) technology. They extended the Linux 802.11 subsystem, developed a soft-modem and a dedicated driver for the OpenAirInterface Express-MIMO FPGA board. The low-layer PHY functions of DSRC have not been coded on the chipset, but instead as a soft-modem,...

    Provided By EURECOM

  • White Papers // May 2013

    Space Time Interference Alignment Scheme for the MIMO BC and IC with Delayed Csit and Finite Coherence Time

    Interference is a major limitation in wireless networks and the search for efficient ways of transmitting in this context has been productive and diversified. Numerous techniques allow the increase of the multiplexing gain. However, most techniques, even promising linear solutions rely on perfect current CSIT which is not realistic. Though...

    Provided By EURECOM

  • White Papers // May 2013

    Reference Monitors for Security and Interoperability in OAuth 2.0

    OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It was recently adopted by major internet players like Google, Facebook, and Microsoft. It has been pointed out that this framework is potentially subject to security issues, as well as...

    Provided By EURECOM

  • White Papers // May 2013

    Evolving Security Requirements in Multi-Layered Service-Oriented-Architectures

    Due to today's rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet of services, and the introduction of new security regulations (imposed by national and international regulatory bodies,...

    Provided By EURECOM

  • White Papers // Apr 2013

    Power Monitor V2: Novel PowEr Saving Android Application

    This paper presents a novel scheme to derive power saving profiles based on the usage patterns of the Android devices. The entire architecture is developed as an Android app "Power Monitor v2" and is deployed to the smart devices. A monitoring module of the app periodically collects several data from...

    Provided By EURECOM

  • White Papers // Apr 2013

    Broadcasting User Content Over Novel Mobile Networks

    In the "Youtube Era", mobile consumption of video, such as Video on Demand (VoD) and User Generated Content (UGC), has been steadily increasing. However, mobile networks are showing to be unprepared for such phenomenal traffic volume, whereas the devices' multiple interfaces are being exploited to address this problem. As such,...

    Provided By EURECOM

  • White Papers // Mar 2013

    The DoF of Network MIMO With Backhaul Delays

    The authors consider the problem of downlink precoding for Network (multi-cell) MIMO networks where Transmitters (TXs) are provided with imperfect Channel State Information (CSI). Specifically, each TX receives a delayed channel estimate with the delay being specific to each channel component. This model is particularly adapted to the scenarios where...

    Provided By EURECOM

  • White Papers // Mar 2013

    An Architecture to Aggregate Heterogeneous and Semantic Sensed Data

    Sensor networks are used in a great deal of realms such as home monitoring, environmental monitoring (e.g., weather forecasting), health monitoring (e.g., pacemaker, brain waves), vehicular networks, etc. The authors are surrounding by sensor networks such as healthcare, home or environmental monitoring, weather forecasting, etc. All sensor-based applications proposed are...

    Provided By EURECOM

  • White Papers // Mar 2013

    A P2P Based Usage Control Enforcement Scheme Resilient to Re-injection Attacks

    Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by malevolent acquaintances of social network, unauthorized duplication of files or personal messages, or persistence of some files in third-party operated storage beyond their deletion by their owners. The authors suggest a usage control...

    Provided By EURECOM

  • White Papers // Feb 2013

    On the Value of Spectrum Sharing Among Operators in Multicell Networks

    This paper considers the benefits of allowing spectrum sharing among co-located wireless service providers operating in the same multi-cell network. Although spectrum sharing was shown to be valuable in some scenarios where the created interference can be eliminated, the benefits have not clearly shown for multi-cell networks with aggressive reuse....

    Provided By EURECOM

  • White Papers // Feb 2013

    Decontaminating Pilots in Massive MIMO Systems

    Pilot contamination is known to severely limit the performance of large-scale antenna ("Massive MIMO") systems due to degraded channel estimation. This paper proposes a twofold approach to this problem. First, the authors show analytically that pilot contamination can be made to vanish asymptotically in the number of antennas for a...

    Provided By EURECOM

  • White Papers // Feb 2013

    Optimal Combining of Instantaneous and Statistical CSI in the SIMO Interference Channel

    The uplink of the two-user multiple-antenna interference channel is considered and the optimal (in the ergodic rate sense) BeamForming (BF) problem is posed and solved. Specifically, a feedback scenario is studied whereby a Base Station (BS) is allowed to estimate the instantaneous channel vector information from the users it serves,...

    Provided By EURECOM

  • White Papers // Jan 2013

    T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags

    One prominent application of RFID technology is the automation of safety inspections when transporting hazardous goods such as highly reactive chemicals in supply chains. Here, it is dangerous to place specific, reactive chemicals close to each other, because small leaks can already result in a threat to the life of...

    Provided By EURECOM

  • White Papers // Jan 2013

    Secure Product Tracking in Supply Chain

    In this paper, the authors propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors' privacy. Their solution is based on generating identifiers of the actors and...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM

  • White Papers // Nov 2012

    A General Scalable and Accurate Decentralized Level Monitoring Method for Large-Scale Dynamic Service Provision in Hybrid Clouds

    Hybrid cloud computing combines private clouds with geographically-distributed resources from public clouds, desktop grids or in-house gateways to provide the most flexibility of each kind of cloud platforms. Service provisioning for wide-area applications such as cloud backup or cloud network games is sensitive to wide-area network metric such as round...

    Provided By EURECOM

  • White Papers // Nov 2012

    On the Resilience of the Dependability Framework to the Intrusion of New Security Threats

    Initially thought of with a strong emphasis on accidental faults, it has paid more attention over the years to intentional ones and, thus, to classical security concepts as well. Recently, a couple of incidents have received a lot of attention: the Hydraq and Stuxnet worms outbreaks. They have been used...

    Provided By EURECOM

  • White Papers // Nov 2012

    HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems

    Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult for security administrators and for business analysts to create intelligible specifications. The authors introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS), which has...

    Provided By EURECOM

  • White Papers // Sep 2012

    Computing the Nash Equilibria of Intruder Classification Games

    The authors investigate the problem of classifying an intruder of two different types (spy or spammer). The classification is based on the number of file server and mail server attacks a network defender observes during a fixed window. The spammer naively attacks (with a known distribution) his main target: the...

    Provided By EURECOM

  • White Papers // Sep 2012

    Catch the Jammer in Wireless Sensor Network

    Jamming attacks can severely affect the performance of Wireless Sensor Networks (WSNs) due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. In this paper, the authors investigate the feasibility of localizing an omni-antenna...

    Provided By EURECOM

  • White Papers // Sep 2012

    Towards Assisted Remediation of Security Vulnerabilities

    Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities missed by developers, complex solutions are undertaken like static analysis, often after the development phase and with a loss of context. Although vulnerabilities are found, there is...

    Provided By EURECOM

  • White Papers // Sep 2012

    Data Transfer Scheduling for P2P Storage

    In peer-to-peer storage and backup applications, large amounts of data have to be transferred between nodes. In general, recipient of data transfers are not chosen randomly from the whole set of nodes in the peer-to-peer networks, but they are chosen according to peer selection rules imposing several criteria, such as...

    Provided By EURECOM

  • White Papers // Jul 2012

    A Measurement Study of the Wuala On-line Storage Service

    Wuala is a popular online backup and file sharing system that has been successfully operated for several years. Very little is known about the design and implementation of Wuala. The authors capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design and operation of...

    Provided By EURECOM

  • White Papers // Jun 2012

    Enabling Message Security for RESTful Services

    The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream service providers nowadays are shifting to REST-based services in the detriment of SOAP-based ones. REST proposes a lightweight approach to consume resources with no specific encapsulation, thus lacking of...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM

  • White Papers // Sep 2010

    Space-Time Codes That Are Approximately Universal for the Parallel, Multi-Block and Cooperative DDF Channels

    Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff (DMT) of the cooperativerelay channel under the dynamic decode-and-forward protocol for any network size and for all numbers of transmit and receive antennas at the relays. Along the way, the authors prove that spacetime codes previously constructed in the literature...

    Provided By EURECOM

  • White Papers // Jan 2011

    Spatial Transmit Prefiltering for Frequency-Flat MIMO Transmission With Mean and Covariance Information

    In this paper techniques are proposed for combining information about the mean and the covariance of the channel for the purpose of MIMO transmission. (Partial) Channel State Information at the Transmitter (CSIT) is typically used in MIMO systems for the design of spatial prefiltering and waterfilling. For the purpose of...

    Provided By EURECOM

  • White Papers // Feb 2011

    The Multiplexing Gain of a Two-Cell MIMO Channel With Unequal CSI

    In this paper, the joint precoding across two distant transmitters (TXs) to two receivers (RXs), each equipped with one antenna is discussed. The authors consider a distributed Channel State Information (CSI) configuration where each TX has a separate local estimate of the channel. The authors assume that no communication is...

    Provided By EURECOM

  • White Papers // May 2010

    Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy

    IEEE 802.16 technology has emerged as a competitive alternative to wireline broadband access solution. IEEE 802.16 can provide Quality of Service (QoS) guarantees for heterogeneous classes of traffic with different QoS requirements. The standard, however, leaves open the resource management and scheduling issues, which are crucial components to guarantee QoS...

    Provided By EURECOM

  • White Papers // Sep 2011

    Spectrum Sensing for Cognitive Radio Exploiting Spectral Masks

    In this paper, the authors will provide a straightforward look at semi blind spectrum sensing technique exploiting spectral masks. The proposed spectrum sensing technique is deployed on two stages. At a first level, the spectral masks database is built during the synchronization phase of the transmission, then in a second...

    Provided By EURECOM

  • White Papers // Oct 2011

    Combined Compressive Sampling and Distribution Discontinuities Detection Approach to Wideband Spectrum Sensing for Cognitive Radios

    This paper presents a new sensing technique for cognitive radio systems which combines algebraic tools and compressive sampling techniques. The proposed approach consists of the detection of spectrum holes using spectrum distribution discontinuities detector fed by a compressed measurements. The compressed sensing algorithm is designed to take advantage from the...

    Provided By EURECOM

  • White Papers // Sep 2011

    SINR Balancing and Beamforming for the MISO Interference Channel

    In this paper a K user Multi-Input Single-Output (MISO) InterFerence Channel (IFC) is considered where the interference at each receiver is treated as an additional Gaussian noise contribution (Noisy IFC). The authors address the MISO DownLink (DL) beamformer design and power allocation for maximizing the minimum SINR with per base...

    Provided By EURECOM

  • White Papers // Sep 2011

    On Optimum End-to-End Distortion in Delay-Constrained Wideband MIMO Systems

    In this paper, the authors analyze the optimum expected End-to-End Distortion (EED) in delay-constrained wide-band Multiple-Input Mulitple-Output (MIMO) systems. They prove that the existence of frequency diversity benefits the EED in delay-constrained systems though it does not impact the ergodic channel capacity. For further analysis, they derive the closed-form expression...

    Provided By EURECOM

  • White Papers // Jun 2011

    Interference Mitigation in Femto-Macro Coexistence With Two-Way Relay Channel

    Motivated by the femtocell networks where crosstier interference management is crucial to achieve higher system throughput, the authors consider a basic interference model consisting of a MIMO two-way relay communication network in presence of a one-way point-to-point MIMO communication link. They propose an upper-bound on the maximum degrees of freedom...

    Provided By EURECOM

  • White Papers // Jun 2011

    Hash-and-Forward Relaying for Two-Way Relay Channel

    This paper considers a communication network comprised of two nodes, which have no mutual direct communication links, communicating two-way with the aid of a common Relay Node (RN), also known as separated Two-Way Relay (TWR) channel. The authors first recall a cut-set outer bound for the set of rates in...

    Provided By EURECOM

  • White Papers // Jul 2011

    Wireless Access Mechanisms and Architecture Definition in the MEDIEVAL Project

    Wireless network access and the exchange of multimedia flows over the Internet are becoming more and more pervasive in the everyday life. However, simple technological advances in terms of improved network capacity cannot satisfy the increasing demand of such services, since a paradigm shift from the current Internet architecture is...

    Provided By EURECOM

  • White Papers // Jun 2011

    Sensor Network Aided Agile Spectrum Access Through Low-Latency Multi-Band Communications

    Dynamic spectrum access supported by a low-latency wireless sensor network for spectrum usage monitoring is demonstrated using OpenAirInterface platform. The platform performs secondary communications in bands detected as free, thanks to its multi-band capability. With respect to application scenarios, the main target is to address agile broadband public safety communications....

    Provided By EURECOM

  • White Papers // Apr 2011

    Smart Hybrid-ARQ (SHARQ) for Cooperative Communication Via Distributed Relays in LTE-Advanced

    The work described in this paper proposes two Smart Hybrid-Automatic Repeat ReQuest (SHARQ) schemes with incremental redundancy, that are developed for a dual-hop network of two relays implementing cooperative communication. In a dual-hop network consisting of multiple relays, one of the most challenging tasks is to determine an appropriate trade-off...

    Provided By EURECOM

  • White Papers // Apr 2011

    Near Capacity Linear Closed Form Precoders Design With Recursive Stream Selection for MU-MIMO Broadcast Channels

    This paper proposes a novel Closed Form (CF) precoders design for Multi-User Multiple Input Multiple Output Broadcast Channel (MU-MIMO BC). The proposed algorithm constructs stream-wisely the precoders in a recursive manner. It consists in two steps: The first step is a recursive selection of the best streams minimizing the interference...

    Provided By EURECOM

  • White Papers // Dec 2011

    CHECKER: On-Site Checking in RFID-Based Supply Chains

    Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through on-site checking. While RFID-equipped products travel through the supply chain, RFID readers can verify product...

    Provided By EURECOM

  • White Papers // Feb 2012

    Link Abstraction for Multi-User MIMO in LTE Using Interference-Aware Receiver

    Most of the recent wireless communication systems are interference limited rather than noise limited. In the case of a very strong interferer the conventional assumption of the interference as Gaussian is extremely suboptimal. However, optimal (capacity achieving) receivers utilize some prior knowledge about the interference to reach optimality. The link...

    Provided By EURECOM

  • White Papers // Jan 2012

    Interference Relay Channel in 4G Wireless Networks

    In the next generation cellular systems, such as LTE-A (Release 10 and beyond), Relay Node (RN) deployment has been adopted due to its potentials in enlarging coverage and increasing system throughput, even with primitive relaying functionalities. For example, in LTE-A Release 10 only Type-I (non-transparent) RNs are considered wherein no...

    Provided By EURECOM

  • White Papers // Feb 2012

    A Practical Precoding Scheme for Multicell MIMO Channels With Partial User's Data Sharing

    In this paper, the authors consider a setting where K Transmitters (TXs) equipped with multiple antennas aim at transmitting to their K respective Receivers (RXs) also equipped with multiple antennas. Without exchange of the user's data symbols, this represents a conventional Interference Channel (IC), while it is a so-called MIMO...

    Provided By EURECOM

  • White Papers // Jan 2012

    Moving Face Spoofing Detection Via 3D Projective Invariants

    Face recognition provides many advantages compared with other available biometrics, but it is particularly subject to spoofing. The most accurate methods in literature addressing this problem, rely on the estimation of the three-dimensionality of faces, which heavily increase the whole cost of the system. This paper proposes an effective and...

    Provided By EURECOM

  • White Papers // Jan 2012

    Retrospective Interference Alignment for Interference Channels With Delayed Feedback

    The capacity of the most recent network architectures, such as femtocells, is severely limited by interference. This has spurred an intense research on the M-user interference channel, in which M transmitter/receiver pairs interfere with each other. Very striking recent results, though, disproved it by showing that the degrees of freedom...

    Provided By EURECOM

  • White Papers // Jan 2012

    Sparse Precoding in Multicell MIMO Systems

    In this paper, the authors consider the joint precoding across K distant Transmitters (TXs) towards K single-antenna Receivers (RXs) and they let the TXs have access to perfect Channel State Information (CSI). Instead of considering the conventional method of clustering to allocate the user's data symbols, they focus on determining...

    Provided By EURECOM

  • White Papers // Jan 2012

    3D Face Recognition: A Robust Multi-Matcher Approach to Data Degradations

    Over the past decades, 3D face has emerged as a solution to face recognition due to its reputed invariance to lighting conditions and pose. While proposed approaches have proven their efficiency over renowned databases as FRGC, less effort was spent on studying the robustness of algorithms to quality degradations. In...

    Provided By EURECOM

  • White Papers // Mar 2012

    On the Vulnerability of Automatic Speaker Recognition to Spoofing Attacks With Artificial Signals

    Automatic Speaker Verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which...

    Provided By EURECOM

  • White Papers // Jan 2012

    Outage Performance of Double Stratospheric Platforms Diversity Systems

    High Altitude Platform Networks (HAPNs) comprise an emerging communication solution promising to exploit many of the best aspects of terrestrial and satellite-based systems. Nevertheless, while offering advantageous propagation characteristics, HAP networks are still subject to large fades due to atmospheric precipitation and especially due to rain, for the allocated high...

    Provided By EURECOM

  • White Papers // Feb 2012

    Regional Confidence Score Assessment for 3D Face

    3D shape data for face recognition is advantageous to its 2D counterpart for being invariant to illumination and pose. However, expression variations and occlusions still remain as major challenges since the shape distortions hinder accurate matching. Numerous algorithms developed to overcome this problem mainly propose region-based approaches, where similarity scores...

    Provided By EURECOM

  • White Papers // Jan 2012

    Redundancy Management for P2P Backup

    The authors propose a redundancy management mechanism for peer-to-peer backup applications. Since, in a backup system, data is read over the network only during restore processes caused by data loss, redundancy management targets data durability rather than attempting to make each piece of information available at any time. Each peer...

    Provided By EURECOM

  • White Papers // Jan 2012

    Distributed Troubleshooting of Web Sessions Using Clustering

    Web browsing is a very common way of using the Internet to, among others, read news, do on-line shopping, or search for user generated content such as YouTube or Dailymotion. Traditional evaluations of web surfing focus on objectively measured Quality of Service (QoS) metrics such as loss rate or round-trip...

    Provided By EURECOM

  • White Papers // Feb 2012

    Spectrum Sensing for Cognitive Radio Exploiting Spectrum Discontinuities Detection

    This paper presents a spectrum sensing algorithm for wideband cognitive radio exploiting sensed spectrum discontinuity properties. Some work has already been investigated by wavelet approach by Giannakis et al, but in this paper the authors investigate an algebraic framework in order to model spectrum discontinuities. The information derived at the...

    Provided By EURECOM

  • White Papers // Feb 2012

    Game Theory-Based Resource Management Strategy for Cognitive Radio Networks

    This paper investigates the application of game theory tools in the context of Cognitive Radio Networks (CRN). Specifically, the authors propose a resource management strategy with the objective to maximize a defined utility function subject to minimize the mutual interference caused by Secondary Users (SUs) with protection for Primary Users...

    Provided By EURECOM

  • White Papers // Mar 2012

    Large System Analysis of Zero-Forcing Precoding in MISO Broadcast Channels With Limited Feedback

    In this paper, the authors analyze the sum rate of Zero-Forcing (ZF) precoding in MISO broadcast channels with limited feedback, transmit correlation and path loss. Their analysis assumes that the number of transmit antennas M and the number of users K are large, while their ratio remains bounded. By applying...

    Provided By EURECOM

  • White Papers // Feb 2011

    Deterministic Equivalent for the SINR of Regularized Zero-Forcing Precoding in Correlated MISO Broadcast Channels With Imperfect CSIT

    This paper considers the MISO broadcast channel with different spatial correlations of the user vector channels. The base station implements Regularized Zero-Forcing (RZF) precoding based on an imperfect channel estimation. The authors derive a deterministic equivalent of the Signal-to-Interference plus Noise Ratio (SINR) by applying novel results from the field...

    Provided By EURECOM

  • White Papers // Jan 2011

    Asymptotic Analysis of Regularized Zero-Forcing Precoding in MISO Broadcast Channels With Limited Feedback

    In this paper, the authors analyze the asymptotic sum-rate of Regularized Zero-Forcing (RZF) precoding in MISO broadcast channels with limited feedback, transmit correlation and path-loss. Their analysis assumes that the ratio of the number of transmit antennas M to the number of users K is bounded as (K;M) grow large....

    Provided By EURECOM

  • White Papers // Nov 2011

    High Throughput and Low Power Enhancements for LDPC Decoders

    Modern VLSI decoders for Low-Density ParityCheck (LDPC) codes require high throughput performance while achieving high energy efficiency on the smallest possible footprint. In this paper, the authors present two optimizations to enhance the throughput and reduce the power consumption for these decoders. As a first optimization, they seek to speedup...

    Provided By EURECOM

  • White Papers // May 2011

    Interference-Aware Receiver Structure for Multi-User MIMO and LTE

    In this paper, the authors propose a novel low-complexity interference-aware receiver structure for multi-user MIMO which is based on the exploitation of the structure of residual interference. They show that multi-user MIMO can deliver its promised gains in modern wireless systems in spite of the limited CSIT only if users...

    Provided By EURECOM

  • White Papers // Dec 2010

    Hardware Optimized Sample Rate Conversion for Software Defined Radio

    The evolution towards applications with increasing functionalities leads to the need of high flexible systems that support a high number of different standards while decreasing the required hardware space. Therefore, a high configurable platform being able to handle a multitude of standards is needed. One main issue is the tradeoff...

    Provided By EURECOM

  • White Papers // Sep 2010

    A Scalable Interest-Oriented Peer-to-Peer Pub/Sub Network

    There has been a big challenge in structured peer-to-peer overlay network research area. Generally, a structured overlay network involves nodes evenly or based on their resource availabilities, and gathers nodes' resources to achieve some bigger tasks. The challenge here is to gather resources based on nodes' interests, and only interested...

    Provided By EURECOM

  • White Papers // Nov 2010

    Bag of Soft Biometrics for Person Identification New Trends and Challenges

    In this paper, the authors seek to provide insight on the general topic of soft biometrics. They firstly present a new refined definition of soft biometrics, emphasizing on the aspect of human compliance, and then proceed to identify candidate traits that accept this novel definition. They, then address relations between...

    Provided By EURECOM

  • White Papers // Apr 2009

    Hierarchical Codes: A Flexible Trade-Off for Erasure Codes in Peer-to-Peer Storage Systems

    Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and maintained. The simplest redundancy scheme is replication, which however suffers from storage inefficiency. Another approach is erasure coding, which provides the same level of...

    Provided By EURECOM

  • White Papers // Jul 2009

    Analysis of User-Driven Peer Selection in Peer-to-Peer Backup and Storage Systems

    In this paper, the authors present a model of peer-to-peer backup and storage systems in which users have the ability to selfishly select remote peers they want to exchange data with. In their work, peer characteristics (e.g., on-line availability and dedicated bandwidth) play an important role and are reflected in...

    Provided By EURECOM