Universite Joseph Fourier

Displaying 1-8 of 8 results

  • White Papers // May 2013

    On the Use of Continued Fractions for Stream Ciphers

    The one time pad is presently known as one of the simplest and fastest encryption methods. In binary data, applying a onetime pad algorithm consists of combining the pad and the plain text with XOR. In this paper, the authors present a new approach to stream ciphers. This method draws...

    Provided By Universite Joseph Fourier

  • White Papers // May 2012

    Hierarchical Selection Diversity Combining Architecture

    This paper proposes a Hierarchical Selection Diversity (HSD) scheme whereby a large array is split up into multiple groups, with the best antenna (in the SNR sense) being selected in each group. The set of selected antennas is then combined using maximal-ratio combining. As opposed to Generalized Selection Combining (GSC),...

    Provided By Universite Joseph Fourier

  • White Papers // Nov 2011

    Secure Probabilistic Routing in Wireless Sensor Networks

    In this paper, the authors propose a provably secure routing protocol for Wireless Sensor Networks (WSNs) based on random walks using tabu lists. Many approaches have been developed in the literature to solve security problems of routing protocols for WSNs. But most of them are not resilient against attacks from...

    Provided By Universite Joseph Fourier

  • White Papers // Jul 2011

    Vote-Independence: A Powerful Privacy Notion for Voting Protocols

    Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on copying other voter's votes. To capture this and similar attacks, the authors extend the classical threat model and introduce a new security notion for voting protocols: vote-independence. They give a formal definition and analyze...

    Provided By Universite Joseph Fourier

  • White Papers // Dec 2010

    Limitations and Performances of Robust Control Over WSN: UFAD Control in Intelligent Buildings

    The aim of this paper is to propose a model-based feedback control strategy for indoor temperature regulation in buildings equipped with UnderFloor Air Distribution (UFAD). Supposing distributed sensing and actuation capabilities, a 0D model of the ventilation process is derived, based on the thermodynamics properties of the flow. A state-space...

    Provided By Universite Joseph Fourier

  • White Papers // Oct 2010

    Probabilistic Methods for Routing in Wireless Sensor Networks

    In this paper, the authors improve routing algorithms mixing random walk and tabu list. They propose 4 new routing protocols based on such ideas. They compare the performances of their algorithms using a simulator. For their tests they propose several classes of network topology in order to show that there...

    Provided By Universite Joseph Fourier

  • White Papers // Apr 2010

    Automated Control For SLA-Aware Elastic Clouds

    Although cloud computing provides a means to support remote. On-demand access to a set of computing resources, its ad-hoc management for quality-of-service and SLA poses significant challenges to the performance. Availability and economical costs of the cloud. This paper discusses these issues and presents early ideas to handle them. First...

    Provided By Universite Joseph Fourier

  • White Papers // Dec 2008

    Implementation of an International "Professional" Bachelor's Degree in Wireless Networks and Security in Grenoble

    The 'Professional' Bachelor's Degree programmes "Networks and Telecommunications" specialising in "Wireless Networks and Security" has existed since 2005 in Grenoble. This programme is actually the 5th and 6th semesters of a three-year degree. In order to encourage international exchanges within this programme, in September 2007 the authors launched as part...

    Provided By Universite Joseph Fourier

  • White Papers // May 2013

    On the Use of Continued Fractions for Stream Ciphers

    The one time pad is presently known as one of the simplest and fastest encryption methods. In binary data, applying a onetime pad algorithm consists of combining the pad and the plain text with XOR. In this paper, the authors present a new approach to stream ciphers. This method draws...

    Provided By Universite Joseph Fourier

  • White Papers // Apr 2010

    Automated Control For SLA-Aware Elastic Clouds

    Although cloud computing provides a means to support remote. On-demand access to a set of computing resources, its ad-hoc management for quality-of-service and SLA poses significant challenges to the performance. Availability and economical costs of the cloud. This paper discusses these issues and presents early ideas to handle them. First...

    Provided By Universite Joseph Fourier

  • White Papers // Dec 2010

    Limitations and Performances of Robust Control Over WSN: UFAD Control in Intelligent Buildings

    The aim of this paper is to propose a model-based feedback control strategy for indoor temperature regulation in buildings equipped with UnderFloor Air Distribution (UFAD). Supposing distributed sensing and actuation capabilities, a 0D model of the ventilation process is derived, based on the thermodynamics properties of the flow. A state-space...

    Provided By Universite Joseph Fourier

  • White Papers // Dec 2008

    Implementation of an International "Professional" Bachelor's Degree in Wireless Networks and Security in Grenoble

    The 'Professional' Bachelor's Degree programmes "Networks and Telecommunications" specialising in "Wireless Networks and Security" has existed since 2005 in Grenoble. This programme is actually the 5th and 6th semesters of a three-year degree. In order to encourage international exchanges within this programme, in September 2007 the authors launched as part...

    Provided By Universite Joseph Fourier

  • White Papers // Jul 2011

    Vote-Independence: A Powerful Privacy Notion for Voting Protocols

    Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on copying other voter's votes. To capture this and similar attacks, the authors extend the classical threat model and introduce a new security notion for voting protocols: vote-independence. They give a formal definition and analyze...

    Provided By Universite Joseph Fourier

  • White Papers // Nov 2011

    Secure Probabilistic Routing in Wireless Sensor Networks

    In this paper, the authors propose a provably secure routing protocol for Wireless Sensor Networks (WSNs) based on random walks using tabu lists. Many approaches have been developed in the literature to solve security problems of routing protocols for WSNs. But most of them are not resilient against attacks from...

    Provided By Universite Joseph Fourier

  • White Papers // Oct 2010

    Probabilistic Methods for Routing in Wireless Sensor Networks

    In this paper, the authors improve routing algorithms mixing random walk and tabu list. They propose 4 new routing protocols based on such ideas. They compare the performances of their algorithms using a simulator. For their tests they propose several classes of network topology in order to show that there...

    Provided By Universite Joseph Fourier

  • White Papers // May 2012

    Hierarchical Selection Diversity Combining Architecture

    This paper proposes a Hierarchical Selection Diversity (HSD) scheme whereby a large array is split up into multiple groups, with the best antenna (in the SNR sense) being selected in each group. The set of selected antennas is then combined using maximal-ratio combining. As opposed to Generalized Selection Combining (GSC),...

    Provided By Universite Joseph Fourier