THALES

Displaying 1-17 of 17 results

  • White Papers // May 2013

    Active and Passive Eavesdropper Threats Within Public and Private Civilian Wireless Networks - Existing and Potential Future Countermeasures - An Overview

    In this paper, the authors aim at providing an overview of threats that may deteriorate security level and trust in public wireless networks, because of eavesdropper and hacking technologies that operate at the radio interface, and aims at providing an introduction to relevant counter-measures that deal with \"Physical based\" security...

    Provided By THALES

  • White Papers // Jul 2012

    Improved Broadcast Encryption Scheme with Constant-Size Ciphertext

    The Boneh-Gentry-Waters (BGW) scheme is one of the most efficient broadcast encryption scheme regarding the overhead size. This performance relies on the use of a pairing. Hence this protocol can benefit from public key improvements. The ciphertext is of constant size, whatever the proportion of revoked users is. The main...

    Provided By THALES

  • White Papers // Jul 2011

    Wardrop Equilibrium Formulation of Resource-Constrained DTN Routing in Public Safety Networks

    In this paper, the authors investigate the ability of using DTNs in Public Safety networks, where bandwidth and storage are constrained. They formalize the problem as a Wardrop equilibrium over a time-discretized graph. Driven by their findings, they propose RECOR, a centralized REsource-Constrained Oracle-based DTN routing mechanism, which spreads the...

    Provided By THALES

  • White Papers // Jan 2011

    PACS: Chopping and Shuffling Large Contents for Faster Opportunistic Dissemination

    A common assumption in intermittently-connected (or opportunistic) mobile networks is that any contact has enough capacity to transfer the required amount of data. Although such an assumption is reasonable for analytical purposes and when contents are small, it does not hold anymore when nodes produce contents that are larger than...

    Provided By THALES

  • White Papers // Jun 2010

    Contact Surround in Opportunistic Networks

    Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant results concerning contact and inter-contact distributions. Nevertheless, only the temporal dimension does not give a complete overview of contact characterization. In this paper, the authors propose the surround...

    Provided By THALES

  • White Papers // Mar 2010

    Accurate Performance Bounds for Target Detection in WSNs With Deterministic Node Placement

    This paper addresses target detection applications for long-lasting surveillance of areas of interest using unattended Wireless Sensor Networks (WSNs). In this context, to achieve a long system lifetime, sensing and communication modules of wireless sensor nodes may be switched on and off according to a prefixed duty cycle, whose use...

    Provided By THALES

  • White Papers // Jan 2010

    Engineering Energy-Efficient Target Detection Applications in Wireless Sensor Networks

    This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of areas of interest. As battery energy depletion is an issue in this context, an approach consists of switching on and off sensing and communication modules of wireless sensors according...

    Provided By THALES

  • White Papers // Jan 2010

    Robust Streaming in Delay Tolerant Networks

    Delay Tolerant Networks (DTN) do not provide any end to end connectivity guarantee. Thus, transporting data over such networks is a tough challenge as most of Internet applications assume a form of persistent end to end connection. While research in DTN has mainly addressed the problem of routing in various...

    Provided By THALES

  • Webcasts // Jan 2010

    Understanding the Value of MPLS Encryption

    This webinar will cover a complete and brief introduction to MPLS, The advantages of moving to MPLS services, the security implications. This webinar will introduce MPLS and underscore its increased acceptance and popularity based on maximization of data transport resources and reduced cost enabling a strong return on investment. Based...

    Provided By THALES

  • Case Studies // Jul 2009

    Follett Protects Customer Data and Complies With PCI DSS With Thales

    The Follett Higher Education Group (FHEG) sells more than 20 million textbooks annually in stores and online, and it operates more than 700 campus book stores for colleges and universities. Since it began operating stores and taking credit cards, FHEG has taken protecting its customers' privacy seriously. To protect customer...

    Provided By THALES

  • Case Studies // Jun 2009

    Thales Speeds Up and Secures Electronic Invoicing at Si.mobil-Vodafone

    Si.mobil-Vodafone is the first private mobile telephony operator in Slovenia and with its variety of new services, products and technologies is competing directly with the large state owned telco. With more than 500,000 customers, billing is a major cost to the business. The electronic invoices must be created in accordance...

    Provided By THALES

  • White Papers // Feb 2009

    Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks

    Mobile wireless Ad hoc NETworks (MANETs) naturally support a traffic mix of elastic and real-time flows but the shared nature and lossy properties of the radio medium make their coexistence challenging. The authors argue in this paper for a new kind of elastic data transport service which would preserve the...

    Provided By THALES

  • Case Studies // Jan 2009

    Croatian Banks Make Fraud Virtually Impossible by Securing Transactions and User Identities With Thales nCipher HSMs

    A member of the Asseco Group, which is Europe's fifth largest system integrator, Logos is one of Croatia's most trusted IT companies. Logos has built numerous online banking systems for clients including leading Croatian banks Zagrebacka Banka (member of UniCredit Group), PBZ (member of Intesa Sanpaolo Group), and Raiffeisenbank Austria....

    Provided By THALES

  • White Papers // Jan 2009

    Service Oriented Tasking System for WSN

    The increasing ubiquity and diversity in the resources and functionalities of the devices of the Internet of things claims the need for a device-independent abstraction layer to expose (and consume) device capabilities as services on the network and the need for mechanisms to customize the behaviour of the devices to...

    Provided By THALES

  • White Papers // Jan 2009

    Tasking Wireless Sensor Nodes in the Internet of Things

    The increasing ubiquity and diversity in the resources and functionalities of the devices of the Internet of things claims the need for a device independent abstraction layer to expose (and consume) device capabilities as services on the network and the need for mechanisms to customize the behaviour of the devices...

    Provided By THALES

  • Case Studies // Dec 2008

    UTI Systems Protects Mission Critical PKIs With nCipher nShield

    Based in Bucharest, Romania, UTI Systems is one of Romania's oldest and largest information technology service providers. In 2002, UTI began building a Public Key Infrastructure (PKI) for a government ministry using a UTI certification authority software solution called certSAFE. The ministry planned to use the PKI to secure email...

    Provided By THALES

  • White Papers // Aug 2008

    Sensor Networks for Cognitive Radio: Theory and System Design

    Following current trends towards dynamic spectrum allocation and cognitive radio, this paper proposes a new approach and innovative techniques to support the coexistence of licensed and unlicensed wireless users in a same area. The proposed concept, called Sensor Network aided Cognitive Radio, consists of a wireless sensor network able to...

    Provided By THALES

  • White Papers // Jul 2012

    Improved Broadcast Encryption Scheme with Constant-Size Ciphertext

    The Boneh-Gentry-Waters (BGW) scheme is one of the most efficient broadcast encryption scheme regarding the overhead size. This performance relies on the use of a pairing. Hence this protocol can benefit from public key improvements. The ciphertext is of constant size, whatever the proportion of revoked users is. The main...

    Provided By THALES

  • White Papers // Jul 2011

    Wardrop Equilibrium Formulation of Resource-Constrained DTN Routing in Public Safety Networks

    In this paper, the authors investigate the ability of using DTNs in Public Safety networks, where bandwidth and storage are constrained. They formalize the problem as a Wardrop equilibrium over a time-discretized graph. Driven by their findings, they propose RECOR, a centralized REsource-Constrained Oracle-based DTN routing mechanism, which spreads the...

    Provided By THALES

  • White Papers // Jan 2011

    PACS: Chopping and Shuffling Large Contents for Faster Opportunistic Dissemination

    A common assumption in intermittently-connected (or opportunistic) mobile networks is that any contact has enough capacity to transfer the required amount of data. Although such an assumption is reasonable for analytical purposes and when contents are small, it does not hold anymore when nodes produce contents that are larger than...

    Provided By THALES

  • White Papers // Jun 2010

    Contact Surround in Opportunistic Networks

    Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant results concerning contact and inter-contact distributions. Nevertheless, only the temporal dimension does not give a complete overview of contact characterization. In this paper, the authors propose the surround...

    Provided By THALES

  • White Papers // Jan 2009

    Service Oriented Tasking System for WSN

    The increasing ubiquity and diversity in the resources and functionalities of the devices of the Internet of things claims the need for a device-independent abstraction layer to expose (and consume) device capabilities as services on the network and the need for mechanisms to customize the behaviour of the devices to...

    Provided By THALES

  • White Papers // Jan 2010

    Robust Streaming in Delay Tolerant Networks

    Delay Tolerant Networks (DTN) do not provide any end to end connectivity guarantee. Thus, transporting data over such networks is a tough challenge as most of Internet applications assume a form of persistent end to end connection. While research in DTN has mainly addressed the problem of routing in various...

    Provided By THALES

  • White Papers // Jan 2010

    Engineering Energy-Efficient Target Detection Applications in Wireless Sensor Networks

    This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of areas of interest. As battery energy depletion is an issue in this context, an approach consists of switching on and off sensing and communication modules of wireless sensors according...

    Provided By THALES

  • White Papers // Mar 2010

    Accurate Performance Bounds for Target Detection in WSNs With Deterministic Node Placement

    This paper addresses target detection applications for long-lasting surveillance of areas of interest using unattended Wireless Sensor Networks (WSNs). In this context, to achieve a long system lifetime, sensing and communication modules of wireless sensor nodes may be switched on and off according to a prefixed duty cycle, whose use...

    Provided By THALES

  • White Papers // Jan 2009

    Tasking Wireless Sensor Nodes in the Internet of Things

    The increasing ubiquity and diversity in the resources and functionalities of the devices of the Internet of things claims the need for a device independent abstraction layer to expose (and consume) device capabilities as services on the network and the need for mechanisms to customize the behaviour of the devices...

    Provided By THALES

  • White Papers // Feb 2009

    Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks

    Mobile wireless Ad hoc NETworks (MANETs) naturally support a traffic mix of elastic and real-time flows but the shared nature and lossy properties of the radio medium make their coexistence challenging. The authors argue in this paper for a new kind of elastic data transport service which would preserve the...

    Provided By THALES

  • White Papers // Aug 2008

    Sensor Networks for Cognitive Radio: Theory and System Design

    Following current trends towards dynamic spectrum allocation and cognitive radio, this paper proposes a new approach and innovative techniques to support the coexistence of licensed and unlicensed wireless users in a same area. The proposed concept, called Sensor Network aided Cognitive Radio, consists of a wireless sensor network able to...

    Provided By THALES

  • White Papers // May 2013

    Active and Passive Eavesdropper Threats Within Public and Private Civilian Wireless Networks - Existing and Potential Future Countermeasures - An Overview

    In this paper, the authors aim at providing an overview of threats that may deteriorate security level and trust in public wireless networks, because of eavesdropper and hacking technologies that operate at the radio interface, and aims at providing an introduction to relevant counter-measures that deal with \"Physical based\" security...

    Provided By THALES

  • Case Studies // Jul 2009

    Follett Protects Customer Data and Complies With PCI DSS With Thales

    The Follett Higher Education Group (FHEG) sells more than 20 million textbooks annually in stores and online, and it operates more than 700 campus book stores for colleges and universities. Since it began operating stores and taking credit cards, FHEG has taken protecting its customers' privacy seriously. To protect customer...

    Provided By THALES

  • Case Studies // Dec 2008

    UTI Systems Protects Mission Critical PKIs With nCipher nShield

    Based in Bucharest, Romania, UTI Systems is one of Romania's oldest and largest information technology service providers. In 2002, UTI began building a Public Key Infrastructure (PKI) for a government ministry using a UTI certification authority software solution called certSAFE. The ministry planned to use the PKI to secure email...

    Provided By THALES

  • Case Studies // Jan 2009

    Croatian Banks Make Fraud Virtually Impossible by Securing Transactions and User Identities With Thales nCipher HSMs

    A member of the Asseco Group, which is Europe's fifth largest system integrator, Logos is one of Croatia's most trusted IT companies. Logos has built numerous online banking systems for clients including leading Croatian banks Zagrebacka Banka (member of UniCredit Group), PBZ (member of Intesa Sanpaolo Group), and Raiffeisenbank Austria....

    Provided By THALES

  • Case Studies // Jun 2009

    Thales Speeds Up and Secures Electronic Invoicing at Si.mobil-Vodafone

    Si.mobil-Vodafone is the first private mobile telephony operator in Slovenia and with its variety of new services, products and technologies is competing directly with the large state owned telco. With more than 500,000 customers, billing is a major cost to the business. The electronic invoices must be created in accordance...

    Provided By THALES

  • Webcasts // Jan 2010

    Understanding the Value of MPLS Encryption

    This webinar will cover a complete and brief introduction to MPLS, The advantages of moving to MPLS services, the security implications. This webinar will introduce MPLS and underscore its increased acceptance and popularity based on maximization of data transport resources and reduced cost enabling a strong return on investment. Based...

    Provided By THALES