Telecom of New Zealand

Displaying 1-23 of 23 results

  • White Papers // Jun 2013

    Securing P2P Storage with a Self-organizing Payment Scheme

    This paper describes how to establish trust for P2P storage using a payment-based scheme. This scheme relies on the monitoring of storage peers on a regular basis. The verification operations allow assessing peer behavior and eventually estimating their subsequent remuneration or punishment. The periodic verification operations are used to enforce...

    Provided By Telecom of New Zealand

  • White Papers // Jun 2013

    Optimal Relay Placement for Capacity and Performance Improvement Using a Fluid Model for Heterogeneous Wireless Networks

    In this paper, the authors address the problem of optimal relay placement in a cellular network assuming network densification, with the aim of maximizing cell capacity. In their model, a fraction of radio resources is dedicated to the Base-Station (BS)/Relay Nodes (RN) communication. In the remaining resources, BS and RN...

    Provided By Telecom of New Zealand

  • White Papers // Feb 2013

    Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have attracted a great deal of research attention due to their wide potential applications such as battlefield surveillance, environmental monitoring and Intrusion Detection. Many of these applications require a reliable detection of specified events. Such requirement can be guaranteed only if the target field monitored by...

    Provided By Telecom of New Zealand

  • White Papers // Jan 2013

    Compression of Multitemporal Remote Sensing Images Through Bayesian Segmentation

    Multi-temporal remote sensing images are useful tools for many applications in natural resource management. Compression of this kind of data is an issue of interest, yet, only a few paper address it specifically, while general-purpose compression algorithms are not well suited to the problem, as they do not exploit the...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2012

    Statistical Inference in Large Antenna Arrays under Unknown Noise Pattern

    In this paper, a general information-plus-noise transmission model is assumed, the receiver end of which is composed of a large number of sensors and is unaware of the noise pattern. For this model, and under reasonable assumptions, a set of results is provided for the receiver to perform statistical eigen-inference...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2012

    Profiled Model Based Power Simulator for Side Channel Evaluation

    The amount of embedded devices has considerably increased these last years. Consequently, there is a real need for protecting information security from malicious outsider. Nowadays, there exists a wide variety of techniques to extract secret information from a device. An embedded cryptographic device performs operation on sensitive data and as...

    Provided By Telecom of New Zealand

  • White Papers // Oct 2012

    SHADE: Secure HAmming DistancE Computation from Oblivious Transfer

    The authors introduce two new schemes for securely computing Hamming distance in the two-party setting; very efficient protocol, based solely on 1-out-of-2 oblivious transfer that achieves full security in the semi-honest setting and one-sided security in the malicious setting. Moreover they show that this protocol is significantly more efficient than...

    Provided By Telecom of New Zealand

  • White Papers // Aug 2012

    A Formal Study of Two Physical Countermeasures Against Side Channel Attacks

    Secure electronic circuits must implement countermeasures against a wide range of attacks. Often, the protection against side channel attacks requires to be tightly integrated within the functionality to be protected. It is now part of the designer's job to implement them. But this task is known to be error-prone, and...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2012

    Cross-Unlinkable Hierarchical Group Signatures

    The authors introduce the notion of Cross-Unlinkability for group signature schemes. Considering groups organized in a tree structure, where belonging to the parent group is required to join a new group, Cross-Unlinkability enables a cascade revocation process that takes into account the underlying tree structure, while ensuring anonymity for non-revoked...

    Provided By Telecom of New Zealand

  • White Papers // Jun 2012

    Imitation-Based Spectrum Access Policy for Cognitive Radio Networks

    In this paper, the authors tackle the problem of opportunistic spectrum access in cognitive radio networks. They consider a large number of unlicensed Secondary Users (SU) accessing a number of frequency channels partially occupied by licensed Primary Users (PU). Each channel is characterized by an unknown availability probability. They apply...

    Provided By Telecom of New Zealand

  • White Papers // May 2012

    Accuracy of Homology Based Approaches for Coverage Hole Detection in Wireless Sensor Networks

    Homology theory provides new and powerful solutions to address the coverage problems in Wireless Sensor Networks (WSNs). They are based on algebraic objects, such as Cech complex and Rips complex. Cech complex gives accurate information about coverage quality but requires a precise knowledge of the relative locations of nodes. This...

    Provided By Telecom of New Zealand

  • White Papers // Apr 2012

    Analytical Joint Processing Multi-Point Cooperation Performance in Rayleigh Fading

    Coordinated multi-point transmission is a new technique targeted to the LTE-Advanced (LTE-A) standard and promising better cellular performance. In the 3rd Generation Partnership Project (3GPP) LTE-A two main schemes were highlighted: Coordinated BeamForming/scheduling (CoMPCBF) and Joint Processing (CoMP-JP). In the CoMP-CBF strategy, a user is served by only one base...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    Optimal Rate Assignment for Higher Utility WiMAX Surveillance Systems

    In this paper, the authors address the problem of guaranteed transmission of video flows in the context of WiMAX mesh networks for video surveillance purposes. The main design issue in such networks is to maximize the number of flows that can be accommodated in critical situations. Guaranteeing a throughput for...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    What Does It Cost to Deliver Information Using Position-Based Beaconless Forwarding Protocols?

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    Evaluation of Forward Prediction Scheduling in Heterogeneous Access Networks

    With widespread deployment of often overlapping mobile and wireless coverage today, modern-day Smartphones may have the capability to transmit data using multiple parallel paths to improve overall communication throughput. However, multipath data transfers have serious compatibility issues with reliable transport layer protocols which dictate the data to be received at...

    Provided By Telecom of New Zealand

  • White Papers // Feb 2012

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access' company and its clients....

    Provided By Telecom of New Zealand

  • White Papers // Dec 2011

    Prototyping an Embedded Automotive System From Its UML/SysML Models

    In this paper, the authors introduce a fast approach to prototype embedded systems. Software components are first modeled and formally verified using a SysML environment named AVATAR, supported by a free software named TTool. Simulation and formal verification of AVATAR components can be performed at the push of a button....

    Provided By Telecom of New Zealand

  • White Papers // Dec 2011

    On Sizing CCN Content Stores by Exploiting Topological Information

    Content Centric Networking (CCN) is a promising architecture to diffuse popular content over the Internet. As opposite to cache devices such as P2P-accelerator or Web proxies, CCN is content-aware but service-agnostic, so that it promises to offer a caching service that could not only relieve now-a-days congestion, but would also...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2011

    A Framework for Joint Multiple Description Coding and Network Coding Over Wireless Ad-Hoc Networks

    Network Coding (NC) can achieve the maximum information flow in the network by allowing nodes to combine received packets before retransmission. Several papers have shown NC to be beneficial in mobile ad-hoc networks, but the delay introduced by buffered decoding raises a problem in real-time streaming applications. Here, the authors...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2011

    An MDC-Based Video Streaming Architecture for Mobile Networks

    Multiple Description Coding (MDC) is a framework designed to improve the robustness of video content transmission in lossy environments. In this paper, the authors propose an MDC technique using a legacy coder to produce two descriptions, based on separation of even and odd frames. If only one description is received,...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2010

    Robust Decoding of a 3D-Escot Bitstream Transmitted Over a Noisy Channel

    In this paper, the authors propose a Joint Source-Channel (JSC) decoding scheme for 3D ESCOT-based video coders, such as Vidwav. The embedded bitstream generated by such coders is very sensitive to transmission errors unavoidable on wireless channels. The proposed JSC decoder employs the residual redundancy left in the bitstream by...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2010

    H.264-Based Multiple Description Coding Using Motion Compensated Temporal Interpolation

    Multiple description coding is a framework adapted to noisy transmission environments. In this paper, the authors use H.264 to create two descriptions of a video sequence, each of them assuring a minimum quality level. If both of them are received, a suitable algorithm is used to produce an improved quality...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2009

    Mutual Information-Based Context Quantization

    Context-based lossless coding suffers in many cases from the so-called context dilution problem, which arises when, in order to model high-order statistic dependencies among data, a large number of contexts is used. In this case the learning process cannot be fed with enough data, and so the probability estimation is...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2012

    Profiled Model Based Power Simulator for Side Channel Evaluation

    The amount of embedded devices has considerably increased these last years. Consequently, there is a real need for protecting information security from malicious outsider. Nowadays, there exists a wide variety of techniques to extract secret information from a device. An embedded cryptographic device performs operation on sensitive data and as...

    Provided By Telecom of New Zealand

  • White Papers // Oct 2012

    SHADE: Secure HAmming DistancE Computation from Oblivious Transfer

    The authors introduce two new schemes for securely computing Hamming distance in the two-party setting; very efficient protocol, based solely on 1-out-of-2 oblivious transfer that achieves full security in the semi-honest setting and one-sided security in the malicious setting. Moreover they show that this protocol is significantly more efficient than...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2011

    An MDC-Based Video Streaming Architecture for Mobile Networks

    Multiple Description Coding (MDC) is a framework designed to improve the robustness of video content transmission in lossy environments. In this paper, the authors propose an MDC technique using a legacy coder to produce two descriptions, based on separation of even and odd frames. If only one description is received,...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    Evaluation of Forward Prediction Scheduling in Heterogeneous Access Networks

    With widespread deployment of often overlapping mobile and wireless coverage today, modern-day Smartphones may have the capability to transmit data using multiple parallel paths to improve overall communication throughput. However, multipath data transfers have serious compatibility issues with reliable transport layer protocols which dictate the data to be received at...

    Provided By Telecom of New Zealand

  • White Papers // Jun 2013

    Optimal Relay Placement for Capacity and Performance Improvement Using a Fluid Model for Heterogeneous Wireless Networks

    In this paper, the authors address the problem of optimal relay placement in a cellular network assuming network densification, with the aim of maximizing cell capacity. In their model, a fraction of radio resources is dedicated to the Base-Station (BS)/Relay Nodes (RN) communication. In the remaining resources, BS and RN...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2010

    H.264-Based Multiple Description Coding Using Motion Compensated Temporal Interpolation

    Multiple description coding is a framework adapted to noisy transmission environments. In this paper, the authors use H.264 to create two descriptions of a video sequence, each of them assuring a minimum quality level. If both of them are received, a suitable algorithm is used to produce an improved quality...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2011

    A Framework for Joint Multiple Description Coding and Network Coding Over Wireless Ad-Hoc Networks

    Network Coding (NC) can achieve the maximum information flow in the network by allowing nodes to combine received packets before retransmission. Several papers have shown NC to be beneficial in mobile ad-hoc networks, but the delay introduced by buffered decoding raises a problem in real-time streaming applications. Here, the authors...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2009

    Mutual Information-Based Context Quantization

    Context-based lossless coding suffers in many cases from the so-called context dilution problem, which arises when, in order to model high-order statistic dependencies among data, a large number of contexts is used. In this case the learning process cannot be fed with enough data, and so the probability estimation is...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2011

    On Sizing CCN Content Stores by Exploiting Topological Information

    Content Centric Networking (CCN) is a promising architecture to diffuse popular content over the Internet. As opposite to cache devices such as P2P-accelerator or Web proxies, CCN is content-aware but service-agnostic, so that it promises to offer a caching service that could not only relieve now-a-days congestion, but would also...

    Provided By Telecom of New Zealand

  • White Papers // Jan 2013

    Compression of Multitemporal Remote Sensing Images Through Bayesian Segmentation

    Multi-temporal remote sensing images are useful tools for many applications in natural resource management. Compression of this kind of data is an issue of interest, yet, only a few paper address it specifically, while general-purpose compression algorithms are not well suited to the problem, as they do not exploit the...

    Provided By Telecom of New Zealand

  • White Papers // Sep 2010

    Robust Decoding of a 3D-Escot Bitstream Transmitted Over a Noisy Channel

    In this paper, the authors propose a Joint Source-Channel (JSC) decoding scheme for 3D ESCOT-based video coders, such as Vidwav. The embedded bitstream generated by such coders is very sensitive to transmission errors unavoidable on wireless channels. The proposed JSC decoder employs the residual redundancy left in the bitstream by...

    Provided By Telecom of New Zealand

  • White Papers // Feb 2012

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access' company and its clients....

    Provided By Telecom of New Zealand

  • White Papers // May 2012

    Accuracy of Homology Based Approaches for Coverage Hole Detection in Wireless Sensor Networks

    Homology theory provides new and powerful solutions to address the coverage problems in Wireless Sensor Networks (WSNs). They are based on algebraic objects, such as Cech complex and Rips complex. Cech complex gives accurate information about coverage quality but requires a precise knowledge of the relative locations of nodes. This...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    Optimal Rate Assignment for Higher Utility WiMAX Surveillance Systems

    In this paper, the authors address the problem of guaranteed transmission of video flows in the context of WiMAX mesh networks for video surveillance purposes. The main design issue in such networks is to maximize the number of flows that can be accommodated in critical situations. Guaranteeing a throughput for...

    Provided By Telecom of New Zealand

  • White Papers // Mar 2012

    What Does It Cost to Deliver Information Using Position-Based Beaconless Forwarding Protocols?

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single...

    Provided By Telecom of New Zealand

  • White Papers // Jul 2012

    Cross-Unlinkable Hierarchical Group Signatures

    The authors introduce the notion of Cross-Unlinkability for group signature schemes. Considering groups organized in a tree structure, where belonging to the parent group is required to join a new group, Cross-Unlinkability enables a cascade revocation process that takes into account the underlying tree structure, while ensuring anonymity for non-revoked...

    Provided By Telecom of New Zealand

  • White Papers // Aug 2012

    A Formal Study of Two Physical Countermeasures Against Side Channel Attacks

    Secure electronic circuits must implement countermeasures against a wide range of attacks. Often, the protection against side channel attacks requires to be tightly integrated within the functionality to be protected. It is now part of the designer's job to implement them. But this task is known to be error-prone, and...

    Provided By Telecom of New Zealand

  • White Papers // Feb 2013

    Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have attracted a great deal of research attention due to their wide potential applications such as battlefield surveillance, environmental monitoring and Intrusion Detection. Many of these applications require a reliable detection of specified events. Such requirement can be guaranteed only if the target field monitored by...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2012

    Statistical Inference in Large Antenna Arrays under Unknown Noise Pattern

    In this paper, a general information-plus-noise transmission model is assumed, the receiver end of which is composed of a large number of sensors and is unaware of the noise pattern. For this model, and under reasonable assumptions, a set of results is provided for the receiver to perform statistical eigen-inference...

    Provided By Telecom of New Zealand

  • White Papers // Apr 2012

    Analytical Joint Processing Multi-Point Cooperation Performance in Rayleigh Fading

    Coordinated multi-point transmission is a new technique targeted to the LTE-Advanced (LTE-A) standard and promising better cellular performance. In the 3rd Generation Partnership Project (3GPP) LTE-A two main schemes were highlighted: Coordinated BeamForming/scheduling (CoMPCBF) and Joint Processing (CoMP-JP). In the CoMP-CBF strategy, a user is served by only one base...

    Provided By Telecom of New Zealand

  • White Papers // Jun 2012

    Imitation-Based Spectrum Access Policy for Cognitive Radio Networks

    In this paper, the authors tackle the problem of opportunistic spectrum access in cognitive radio networks. They consider a large number of unlicensed Secondary Users (SU) accessing a number of frequency channels partially occupied by licensed Primary Users (PU). Each channel is characterized by an unknown availability probability. They apply...

    Provided By Telecom of New Zealand

  • White Papers // Jun 2013

    Securing P2P Storage with a Self-organizing Payment Scheme

    This paper describes how to establish trust for P2P storage using a payment-based scheme. This scheme relies on the monitoring of storage peers on a regular basis. The verification operations allow assessing peer behavior and eventually estimating their subsequent remuneration or punishment. The periodic verification operations are used to enforce...

    Provided By Telecom of New Zealand

  • White Papers // Dec 2011

    Prototyping an Embedded Automotive System From Its UML/SysML Models

    In this paper, the authors introduce a fast approach to prototype embedded systems. Software components are first modeled and formally verified using a SysML environment named AVATAR, supported by a free software named TTool. Simulation and formal verification of AVATAR components can be performed at the push of a button....

    Provided By Telecom of New Zealand