NASA Astrophysics Data System (ADS)
Kuo, Cynthia; Walker, Jesse; Perrig, Adrian
Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.
Cha, Shi-Cho; Chen, Jyun-Fu
2017-01-01
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900
Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu
2017-10-14
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.
Security Enhancement of Wireless Sensor Networks Using Signal Intervals
Moon, Jaegeun; Jung, Im Y.; Yoo, Jaesoo
2017-01-01
Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users. PMID:28368341
Security Enhancement of Wireless Sensor Networks Using Signal Intervals.
Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo
2017-04-02
Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.
2007-01-15
it can detect specifically proscribed content changes to critical files (e.g., illegal shells inserted into /etc/ passwd ). Fourth, it can detect the...UNIX password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access patterns seen at the storage...content integrity verification is utilized. As a concrete example, consider a UNIX system password file (/etc/ passwd ), which consists of a set of well
Secure communications using nonlinear silicon photonic keys.
Grubel, Brian C; Bosworth, Bryan T; Kossey, Michael R; Cooper, A Brinton; Foster, Mark A; Foster, Amy C
2018-02-19
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities. Compared to a large, electronically stored one-time pad, our method provisions large amounts of information within the intrinsically complex nanostructure of the micro-cavities. By probing a micro-cavity with a rapid sequence of spectrally-encoded ultrafast optical pulses and measuring the lightwave responses, we experimentally demonstrate the ability to extract 2.4 Gb of key material from a single micro-cavity device. Subsequently, in a secure communication experiment with pairs of devices, we achieve bit error rates below 10 -5 at code rates of up to 0.1. The PUFs' responses are never transmitted over the channel or stored in digital memory, thus enhancing the security of the system. Additionally, the micro-cavity PUFs are extremely small, inexpensive, robust, and fully compatible with telecommunications infrastructure, components, and electronic fabrication. This approach can serve one-time pad or public key exchange applications where high security is required.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less
High-Fidelity Down-Conversion Source for Secure Communications Using On-Demand Single Photons
NASA Technical Reports Server (NTRS)
Roberts, Tony
2015-01-01
AdvR, Inc., has built an efficient, fully integrated, waveguide-based source of spectrally uncorrelated photon pairs that will accelerate research and development (R&D) in the emerging field of quantum information science. Key to the innovation is the use of submicron periodically poled waveguides to produce counter propagating photon pairs, which is enabled by AdvR's patented segmented microelectrode poling technique. This novel device will provide a high brightness source of down-conversion pairs with enhanced spectral properties and low attenuation, and it will operate in the visible to the mid-infrared spectral region. A waveguide-based source of spectrally and spatially pure heralded photons will contribute to a wide range of NASA's advanced technology development efforts, including on-demand single photon sources for high-rate spaced-based secure communications.
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
NASA Astrophysics Data System (ADS)
Graham, Christopher J.
2012-05-01
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
Memristive crypto primitive for building highly secure physical unclonable functions
NASA Astrophysics Data System (ADS)
Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek
2015-08-01
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Memristive crypto primitive for building highly secure physical unclonable functions.
Gao, Yansong; Ranasinghe, Damith C; Al-Sarawi, Said F; Kavehei, Omid; Abbott, Derek
2015-08-04
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Memristive crypto primitive for building highly secure physical unclonable functions
Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek
2015-01-01
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information. PMID:26239669
NASA Astrophysics Data System (ADS)
Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin
2017-10-01
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
NASA Technical Reports Server (NTRS)
Clark, K. H. (Inventor)
1983-01-01
A clamp-mount device is disclosed for mounting equipment to an associated I-beam and the like structural member of the type having oppositely extending flanges wherein the device comprises a base and a pair of oppositely facing clamping members carried diagonally on the base clamping flanges therebetween and having flange receiving openings facing one another. Lock means are carried diagonally by the base opposite the clamping members locking the flanges in the clamping members. A resilient hub is carried centrally of the base engaging and biasing a back side of the flanges maintaining tightly clamped and facilitating use on vertical as well as horizontal members. The base turns about the hub to receive the flanges within the clamping members. Equipment may be secured to the base by any suitable means such as bolts in openings. Slidable gate latches secure the hinged locks in an upright locking position. The resilient hub includes a recess opening formed in the base and a rubber-like pad carried in this opening being depressably and rotatably carried therein.
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
Securing non-volatile memory regions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen
Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.
Secure TRNG with random phase stimulation
NASA Astrophysics Data System (ADS)
Wieczorek, Piotr Z.
2017-08-01
In this paper a novel TRNG concept is proposed which is a vital part of cryptographic systems. The proposed TRNG involves phase variability of a pair of ring oscillators (ROs) to force the multiple metastable events in a flip-flop (FF). In the solution, the ROs are periodically activated to ensure the violation of the FF timing and resultant state randomness, while the TRNG circuit adapts the structure of ROs to obtain the maximum entropy and circuit security. The TRNG can be implemented in inexpensive re-programmable devices (CPLDs or FPGAs) without the use of Digital Clock Managers (DCMs). Preliminary test results proved the circuit's immunity to the intentional frequency injection attacks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP
NASA Astrophysics Data System (ADS)
Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni
The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.
Bright nanoscale source of deterministic entangled photon pairs violating Bell's inequality.
Jöns, Klaus D; Schweickert, Lucas; Versteegh, Marijn A M; Dalacu, Dan; Poole, Philip J; Gulinatti, Angelo; Giudice, Andrea; Zwiller, Val; Reimer, Michael E
2017-05-10
Global, secure quantum channels will require efficient distribution of entangled photons. Long distance, low-loss interconnects can only be realized using photons as quantum information carriers. However, a quantum light source combining both high qubit fidelity and on-demand bright emission has proven elusive. Here, we show a bright photonic nanostructure generating polarization-entangled photon pairs that strongly violates Bell's inequality. A highly symmetric InAsP quantum dot generating entangled photons is encapsulated in a tapered nanowire waveguide to ensure directional emission and efficient light extraction. We collect ~200 kHz entangled photon pairs at the first lens under 80 MHz pulsed excitation, which is a 20 times enhancement as compared to a bare quantum dot without a photonic nanostructure. The performed Bell test using the Clauser-Horne-Shimony-Holt inequality reveals a clear violation (S CHSH > 2) by up to 9.3 standard deviations. By using a novel quasi-resonant excitation scheme at the wurtzite InP nanowire resonance to reduce multi-photon emission, the entanglement fidelity (F = 0.817 ± 0.002) is further enhanced without temporal post-selection, allowing for the violation of Bell's inequality in the rectilinear-circular basis by 25 standard deviations. Our results on nanowire-based quantum light sources highlight their potential application in secure data communication utilizing measurement-device-independent quantum key distribution and quantum repeater protocols.
Molecular transport network security using multi-wavelength optical spins.
Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P
2016-01-01
Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.
Secure satellite communication using multi-photon tolerant quantum communication protocol
NASA Astrophysics Data System (ADS)
Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.
2015-09-01
This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.
NASA Technical Reports Server (NTRS)
Sanders, Fred G. (Inventor)
1988-01-01
This invention relates to devices which grip cylindrical structures and more particularly to a device which has three arcuate gripping members having frictional surfaces for gripping and compressing a bi-stem. The bi-stem gripping apparatus is constructed having a pair of side gripping members, and an intermediate gripping member disposed between them. Sheets of a gum stock silicone rubber with frictional gripping surfaces are bonded to the inner region of the gripping members and provide frictional engagement between the bi-stem and the apparatus. A latch secures the gripping apparatus to a bi-stem, and removable handles are attached, allowing an astronaut to pull the bi-stem from its cassette. A tethering ring on the outside of the gripping apparatus provides a convenient point to which a lanyard may be attached.
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.
Short Message Service (SMS) Security Solution for Mobile Devices
2006-12-01
correspondences, all reside on the mobile device . Once the data is compromised, the owner, family members, and friends may be subjected to identity theft ...SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Gurminder Singh Co-Advisor: John Gibson...in military settings are also discussed. 15. NUMBER OF PAGES 113 14. SUBJECT TERMS GSM security, SMS security, mobile device security
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Yehia M.; Chen, Tsung-Chi; Harrer, Marques B.
2017-11-21
An ion funnel device is disclosed. A first pair of electrodes is positioned in a first direction. A second pair of electrodes is positioned in a second direction. The device includes an RF voltage source and a DC voltage source. A RF voltage with a superimposed DC voltage gradient is applied to the first pair of electrodes, and a DC voltage gradient is applied to the second pair of electrodes.
76 FR 30243 - Minimum Security Devices and Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A. Description: The requirement that savings associations establish a written security program is necessitated by...
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.
Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N
2018-05-01
Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a secured device, an unsecured airway device requires only half the force to cause airway dislodgement. The secured King had the highest dislodgement force relative to the other studied devices.
76 FR 15368 - Minimum Security Devices and Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-21
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... establish a written security program is necessitated by the Bank Protection Act (12 U.S.C. 1881-1884), which...
Assessing the Security of Connected Diabetes Devices.
Out, Dirk-Jan; Tettero, Olaf
2017-03-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo
2017-09-18
Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.
An Efficient Remote Authentication Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen
2017-02-01
Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.
An improved CCA-secure conditional proxy re-encryption without pairings
NASA Astrophysics Data System (ADS)
Chang, Yanni; He, Mingxing; Li, Xiao; Xing, Pengfei
2014-10-01
In order to solve fine-grained delegation, the definition of conditional proxy re-encryption was proposed and soon draws a lot of attention in recent years. All of the existing schemes except one are based on bilinear pairings, which computation is costly. We point out that the only one existing conditional proxy re-encryption scheme without pairings can not solve fine-grained delegation essentially. Then we propose a new property of conditional proxy re-encryption scheme, that is non-diffusibility, that means if the proxy with a re-encryption key under one condition conclude with delegatee, they can obtain the re-encryption keys under any other conditions. We also propose a concrete CCA-secure conditional proxy re-encryption scheme without pairings. To the best of our knowledge, this is the first CCA-secure conditional proxy re-encryption scheme without pairings, which satisfies the non-diffusibility property.
Assessing the Security of Connected Diabetes Devices
Out, Dirk-Jan; Tettero, Olaf
2017-01-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
ERIC Educational Resources Information Center
Zahadat, Nima
2016-01-01
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
Memory attacks on device-independent quantum cryptography.
Barrett, Jonathan; Colbeck, Roger; Kent, Adrian
2013-01-04
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
Outsourcing Security Services for Low Performance Portable Devices
NASA Astrophysics Data System (ADS)
Szentgyörgyi, Attila; Korn, András
The number of portable devices using wireless network technologies is on the rise. Some of these devices are incapable of, or at a disadvantage at using secure Internet services, because secure communication often requires comparatively high computing capacity. In this paper, we propose a solution which can be used to offer secure network services for low performance portable devices without severely degrading data transmission rates. We also show that using our approach these devices can utilize some secure network services which were so far unavailable to them due to a lack of software support. In order to back up our claims, we present performance measurement results obtained in a test network.
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
NASA Astrophysics Data System (ADS)
Ramanathan, Ravishankar; Brandão, Fernando G. S. L.; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Wojewódka, Hanna
2016-12-01
Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two nonsignaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries. Our main innovation is the proof that even the partial randomness certified by the two-party Bell test [a single input-output pair (u* , x* ) for which the conditional probability P (x*|u*) is bounded away from 1 for all no-signaling strategies that optimally violate the Bell inequality] can be used for amplification. We introduce the methodology of a partial tomographic procedure on the empirical statistics obtained in the Bell test that ensures that the outputs constitute a linear min-entropy source of randomness. As a technical novelty that may be of independent interest, we prove that the Santha-Vazirani source satisfies an exponential concentration property given by a recently discovered generalized Chernoff bound.
New Results on Unconditionally Secure Multi-receiver Manual Authentication
NASA Astrophysics Data System (ADS)
Wang, Shuhong; Safavi-Naini, Reihaneh
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
Synthesis of securement device options and strategies
DOT National Transportation Integrated Search
2002-03-01
The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...
Security Issues for Mobile Medical Imaging: A Primer.
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
2015-10-01
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
System and method for calibrating a rotary absolute position sensor
NASA Technical Reports Server (NTRS)
Davis, Donald R. (Inventor); Permenter, Frank Noble (Inventor); Radford, Nicolaus A (Inventor)
2012-01-01
A system includes a rotary device, a rotary absolute position (RAP) sensor generating encoded pairs of voltage signals describing positional data of the rotary device, a host machine, and an algorithm. The algorithm calculates calibration parameters usable to determine an absolute position of the rotary device using the encoded pairs, and is adapted for linearly-mapping an ellipse defined by the encoded pairs to thereby calculate the calibration parameters. A method of calibrating the RAP sensor includes measuring the rotary position as encoded pairs of voltage signals, linearly-mapping an ellipse defined by the encoded pairs to thereby calculate the calibration parameters, and calculating an absolute position of the rotary device using the calibration parameters. The calibration parameters include a positive definite matrix (A) and a center point (q) of the ellipse. The voltage signals may include an encoded sine and cosine of a rotary angle of the rotary device.
Performance of device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Cao, Zhu; Zhao, Qi; Ma, Xiongfeng
2016-07-01
Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .
Williams, J.V.
1984-04-26
Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.
Twenty Seven Years of Quantum Cryptography!
NASA Astrophysics Data System (ADS)
Hughes, Richard
2011-03-01
One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with which the contractor's telecommunications security equipment, devices, techniques, or services must be...
Rotary electrical contact device and method for providing current to and/or from a rotating member
Koplow, Jeffrey P
2013-11-19
Examples of rotary electrical connectors include a first pair and a second pair of opposing sheaves coupled together by intersecting first shaft connecting the first pair of opposing sheaves and a second shaft connecting the second pair of opposing sheaves, and at least partially electrically conductive belt disposed about respective perimeters of the first pair and second pair of opposing sheaves and adapted to remain in contact with at least a portion of the respective perimeters of the sheaves during motion of said sheaves. In example devices, one of the plurality of sheaves may remain stationary during operation of the device while the remaining sheaves rotate and/or orbit around a center axis of the stationary sheave, the device being configured to couple current between a stationary power source and a rotating member through the electrically conductive belt.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
Remote two-wire data entry method and device
Kronberg, James W.
1995-01-01
A device for detecting switch closure such as in a keypad for entering data comprising a matrix of conductor pairs and switches, each pair of conductors shorted by the pressing of a particular switch, and current-regulating devices on each conductor for limiting current in one direction and passing it without limit in the other direction. The device is driven by alternating current. The ends of the conductors in a conductor pair limit current of opposing polarities with respect to each other so that the signal on a shorted pair is an alternating current signal with a unique combination of a positive and a negative peak, which, when analyzed, allows the determination of which key was pressed. The binary identification of the pressed key is passed to the input port of a host device.
New color-shifting security devices
NASA Astrophysics Data System (ADS)
Moia, Franco
2004-06-01
The unbroken global increase of forgery and counterfeiting of valuable documents and products steadily requires improved types of optical security devices. Hence, the "security world" is actively seeking for new features which meet high security standards, look attractively and allow easy recognition. One special smart security device created by ROLIC's technology represents a cholesteric device combined with a phase image. On tilting, such devices reveal strong color shifts which are clearly visible to the naked eye. The additional latent image is invisible under normal lighting conditions but can be revealed to human eyes by means of a simple, commercially available linear sheet polarizer. Based on our earlier work, first published in 1981, we now have developed phase change guest-host devices combined with dye-doped cholesteric material for application in new security features. ROLIC has developed sophisticated material systems of cross-linkable cholesteric liquid crystals and suitable cross-linkable dyes which allow to create outstanding cholesteric color-shifting effects not only on light absorbing dark backgrounds but also on bright or even white backgrounds preserving the circularly polarizing state. The new security devices combine unambiguously 1st and 2nd level inspection features and show brilliant colors on black as well as on white substrates. On tilting, the security devices exhibit remarkable color shifts while the integrated hidden images can be revealed by use of a sheet polarizer. Furthermore, due to its very thin material layers, even demanding applications, such as on banknotes can be considered.
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
Authenticated sensor interface device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... banking office; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES...
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Wireless Security Within Hastily Formed Networks
2006-09-01
WLAN DEVICES (STEP ONE) ............34 1. Personal Firewalls..............................................................................34 2. Anti ...includes client devices , access points, network infrastructure, network management, and delivery of mobility services to maintain network security and...Technology Special Publication 800-48, Wireless Network Security, 802.11, Bluetooth , and Handheld Devices . Available at http://csrc.nist.gov
49 CFR 392.9 - Inspection of cargo, cargo securement devices and systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) FEDERAL MOTOR CARRIER SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR CARRIER SAFETY REGULATIONS DRIVING OF COMMERCIAL MOTOR VEHICLES General § 392.9 Inspection of cargo, cargo securement devices... drives that commercial motor vehicle; (2) Inspect the cargo and the devices used to secure the cargo...
Efficient Implementation of the Pairing on Mobilephones Using BREW
NASA Astrophysics Data System (ADS)
Yoshitomi, Motoi; Takagi, Tsuyoshi; Kiyomoto, Shinsaku; Tanaka, Toshiaki
Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.
Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali
2014-12-22
In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.
Remote two-wire data entry method and device
Kronberg, J.W.
1991-01-01
This invention is comprised of a device for detecting switch closure such as in a keypad for entering data comprising a matrix of conductor pairs and switches, each pair of conductors shorted by the pressing of a particular switch, and current-regulating devices on each conductor for limiting current in one direction and passing it without limit in the other direction. The device is driven by alternating current. The ends of the conductors in a conductor pair limit current of opposing polarities with respect to each other so that the signal on a shorted pair is an alternating current signal with a unique combination of a positive and a negative peak, which, when analyzed, allows the determination of which key was pressed. The binary identification of the pressed key is passed to the input port of a host device.
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
Analyzing the cost of screening selectee and non-selectee baggage.
Virta, Julie L; Jacobson, Sheldon H; Kobza, John E
2003-10-01
Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.
On the security of semi-device-independent QKD protocols
NASA Astrophysics Data System (ADS)
Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin
2018-06-01
While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
NASA Astrophysics Data System (ADS)
Moia, Franco
2002-04-01
With linear photo-polymerization (LPP) ROLIC has invented a photo-patternable technology enabling to align not only conventional liquid crystals but also liquid crystals polymers (LCP). ROLIC's optical security device technology derives from its LPP/LCP technology. LPP/LCP security devices are created by structured photo-alignment of an LPP layer through phot-masks, thus generating a high resolution, photo-patterned aligning layer which carries the aligning information of the image to be created. The subsequent LCP layer transforms the aligning information into an optical phase image with low and/or very high information content, such as invisible photographic pictures. The building block capability of the LPP/LCP technology allows the manufacturing of cholesteric and non-cholesteric LPP/LCP devices which cover 1st and/or 2nd level applications. Apart from black/white security devices colored information zones can be integrated. Moreover, we have developed an LPP/LCP security device which covers all three- 1st, 2nd and 3rd- inspection levels in one and the same authentication device: besides a color shift by tilting the device (1st level) and the detection of normally hidden information by use of a simple sheet polarizer (2nd level) the new device contains encrypted hidden information which can be visualized only by superimposing an LPP/LCP inspection tool (key) for decryption (3rd level). This optical key is also based on the LPP/LCP technology and is itself a 3rd level security device.
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists
Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin
2017-01-01
Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774
NASA Astrophysics Data System (ADS)
Caspani, Lucia; Reimer, Christian; Kues, Michael; Roztocki, Piotr; Clerici, Matteo; Wetzel, Benjamin; Jestin, Yoann; Ferrera, Marcello; Peccianti, Marco; Pasquazi, Alessia; Razzari, Luca; Little, Brent E.; Chu, Sai T.; Moss, David J.; Morandotti, Roberto
2016-06-01
Recent developments in quantum photonics have initiated the process of bringing photonic-quantumbased systems out-of-the-lab and into real-world applications. As an example, devices to enable the exchange of a cryptographic key secured by the laws of quantum mechanics are already commercially available. In order to further boost this process, the next step is to transfer the results achieved by means of bulky and expensive setups into miniaturized and affordable devices. Integrated quantum photonics is exactly addressing this issue. In this paper, we briefly review the most recent advancements in the generation of quantum states of light on-chip. In particular, we focus on optical microcavities, as they can offer a solution to the problem of low efficiency that is characteristic of the materials typically used in integrated platforms. In addition, we show that specifically designed microcavities can also offer further advantages, such as compatibility with telecom standards (for exploiting existing fibre networks) and quantum memories (necessary to extend the communication distance), as well as giving a longitudinal multimode character for larger information transfer and processing. This last property (i.e., the increased dimensionality of the photon quantum state) is achieved through the ability to generate multiple photon pairs on a frequency comb, corresponding to the microcavity resonances. Further achievements include the possibility of fully exploiting the polarization degree of freedom, even for integrated devices. These results pave the way for the generation of integrated quantum frequency combs that, in turn, may find important applications toward the realization of a compact quantum-computing platform.
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
Cao, Yuan; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-01
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μm2 and consumes a power as low as 5.16 μW per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 ∘C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications. PMID:29360790
Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-23
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.
Quartz resonator fluid density and viscosity monitor
Martin, Stephen J.; Wiczer, James J.; Cernosek, Richard W.; Frye, Gregory C.; Gebert, Charles T.; Casaus, Leonard; Mitchell, Mary A.
1998-01-01
A pair of thickness-shear mode resonators, one smooth and one with a textured surface, allows fluid density and viscosity to be independently resolved. A textured surface, either randomly rough or regularly patterned, leads to trapping of liquid at the device surface. The synchronous motion of this trapped liquid with the oscillating device surface allows the device to weigh the liquid; this leads to an additional response that depends on liquid density. This additional response enables a pair of devices, one smooth and one textured, to independently resolve liquid density and viscosity; the difference in responses determines the density while the smooth device determines the density-viscosity product, and thus, the pair determines both density and viscosity.
Textured-surface quartz resonator fluid density and viscosity monitor
Martin, Stephen J.; Wiczer, James J.; Cernosek, Richard W.; Frye, Gregory C.; Gebert, Charles T.; Casaus, Leonard; Mitchell, Mary A.
1998-08-25
A pair of thickness-shear mode resonators, one smooth and one with a textured surface, allows fluid density and viscosity to be independently resolved. A textured surface, either randomly rough or regularly patterned, leads to trapping of liquid at the device surface. The synchronous motion of this trapped liquid with the oscillating device surface allows the device to weigh the liquid; this leads to an additional response that depends on liquid density. This additional response enables a pair of devices, one smooth and one textured, to independently resolve liquid density and viscosity; the difference in responses determines the density while the smooth device determines the density-viscosity product, and thus, the pair determines both density and viscosity.
NASA Astrophysics Data System (ADS)
Barati, Fatemeh; Grossnickle, Max; Su, Shanshan; Lake, Roger K.; Aji, Vivek; Gabor, Nathaniel M.
2017-12-01
Strong electronic interactions can result in novel particle-antiparticle (electron-hole, e-h) pair generation effects, which may be exploited to enhance the photoresponse of nanoscale optoelectronic devices. Highly efficient e-h pair multiplication has been demonstrated in several important nanoscale systems, including nanocrystal quantum dots, carbon nanotubes and graphene. The small Fermi velocity and nonlocal nature of the effective dielectric screening in ultrathin layers of transition-metal dichalcogenides (TMDs) indicates that e-h interactions are very strong, so high-efficiency generation of e-h pairs from hot electrons is expected. However, such e-h pair multiplication has not been observed in 2D TMD devices. Here, we report the highly efficient multiplication of interlayer e-h pairs in 2D semiconductor heterostructure photocells. Electronic transport measurements of the interlayer I-VSD characteristics indicate that layer-indirect e-h pairs are generated by hot-electron impact excitation at temperatures near T = 300 K. By exploiting this highly efficient interlayer e-h pair multiplication process, we demonstrate near-infrared optoelectronic devices that exhibit 350% enhancement of the optoelectronic responsivity at microwatt power levels. Our findings, which demonstrate efficient carrier multiplication in TMD-based optoelectronic devices, make 2D semiconductor heterostructures viable for a new class of ultra-efficient photodetectors based on layer-indirect e-h excitations.
Skogen, Erik J [Albuquerque, NM; Raring, James [Goleta, CA; Tauke-Pedretti, Anna [Albuquerque, NM
2011-08-09
An optical NAND gate is formed from two pair of optical waveguide devices on a substrate, with each pair of the optical waveguide devices consisting of an electroabsorption modulator and a photodetector. One pair of the optical waveguide devices is electrically connected in parallel to operate as an optical AND gate; and the other pair of the optical waveguide devices is connected in series to operate as an optical NOT gate (i.e. an optical inverter). The optical NAND gate utilizes two digital optical inputs and a continuous light input to provide a NAND function output. The optical NAND gate can be formed from III-V compound semiconductor layers which are epitaxially deposited on a III-V compound semiconductor substrate, and operates at a wavelength in the range of 0.8-2.0 .mu.m.
Distance bounded energy detecting ultra-wideband impulse radio secure protocol.
Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J
2014-01-01
We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.
NASA Technical Reports Server (NTRS)
Eaton, L. R. (Inventor)
1976-01-01
An improved heat transfer device particularly suited for use as an evaporator plate in a diffusion cloud chamber. The device is characterized by a pair of mutually spaced heat transfer plates, each being of a planar configuration, having a pair of opposed surfaces defining therebetween a heat pipe chamber. Within the heat pipe chamber, in contiguous relation with the pair of opposed surfaces, there is disposed a pair of heat pipe wicks supported in a mutually spaced relationship by a foraminous spacer of a planar configuration. A wick including a foraminous layer is contiguously related to the external surfaces of the heat transfer plates for uniformly wetting these surfaces.
Thermic sealing in femoral catheterisation: First experience with the Secure Device.
Sacherer, Michael; Kolesnik, Ewald; von Lewinski, Friederike; Verheyen, Nicolas; Brandner, Karin; Wallner, Markus; Eaton, Deborah M; Luha, Olev; Zweiker, Robert; von Lewinski, Dirk
2018-04-03
Devices currently used to achieve hemostasis of the femoral artery following percutaneous cardiac catheterization are associated with vascular complications and remnants of artificial materials are retained at the puncture site. The SECURE arterial closure device induces hemostasis by utilizing thermal energy, which causes collagen shrinking and swelling. In comparison to established devices, it has the advantage of leaving no foreign material in the body following closing. This study was designed to evaluate the efficacy and safety of the SECURE device to close the puncture site following percutaneous cardiac catheterization. The SECURE device was evaluated in a prospective non-randomized single-centre trial with patients undergoing 6 F invasive cardiac procedures. A total of 67 patients were enrolled and the device was utilized in 63 patients. 50 diagnostic and 13 interventional cases were evaluated. Femoral artery puncture closure was performed immediately after completion of the procedure. Time to hemostasis (TTH), time to ambulation (TTA) and data regarding short-term and 30-day clinical follow-up were recorded. Mean TTH was 4:30 ± 2:15 min in the overall observational group. A subpopulation of patients receiving anticoagulants had a TTH of 4:53 ± 1:43 min. There were two access site complications (hematoma > 5 cm). No major adverse events were identified during hospitalization or at the 30 day follow-up. The new SECURE device demonstrates that it is feasible in diagnostic and interventional cardiac catheterization. With respect to safety, the SECURE device was non-inferior to other closure devices as tested in the ISAR closure trial.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
NASA Astrophysics Data System (ADS)
Wang, Lian; Zhou, Yuan-yuan; Zhou, Xue-jun; Chen, Xiao
2018-03-01
Based on the orbital angular momentum and pulse position modulation, we present a novel passive measurement-device-independent quantum key distribution (MDI-QKD) scheme with the two-mode source. Combining with the tight bounds of the yield and error rate of single-photon pairs given in our paper, we conduct performance analysis on the scheme with heralded single-photon source. The numerical simulations show that the performance of our scheme is significantly superior to the traditional MDI-QKD in the error rate, key generation rate and secure transmission distance, since the application of orbital angular momentum and pulse position modulation can exclude the basis-dependent flaw and increase the information content for each single photon. Moreover, the performance is improved with the rise of the frame length. Therefore, our scheme, without intensity modulation, avoids the source side channels and enhances the key generation rate. It has greatly utility value in the MDI-QKD setups.
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles
Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu
2018-01-01
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu
2018-05-07
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.
Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs
NASA Astrophysics Data System (ADS)
Wang, Cong; Xu, Gang; Yang, Yi-Xian
2013-07-01
In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
NASA Astrophysics Data System (ADS)
Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong
2014-08-01
We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.
Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G
2012-01-01
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
Fully device-independent quantum key distribution.
Vazirani, Umesh; Vidick, Thomas
2014-10-03
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
Fully Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Vazirani, Umesh; Vidick, Thomas
2014-10-01
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation
NASA Technical Reports Server (NTRS)
Nguyen, Quang-Viet (Inventor); Kojima, Jun (Inventor); Lekki, John (Inventor)
2015-01-01
A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.
17 CFR 240.10b-5 - Employment of manipulative and deceptive devices.
Code of Federal Regulations, 2010 CFR
2010-04-01
... fraud or deceit upon any person, in connection with the purchase or sale of any security. (Sec. 10; 48... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employment of manipulative and deceptive devices. 240.10b-5 Section 240.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
Ivanov, Vladimir I; Yu, Paul L; Baras, John S
2010-09-01
Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Identify and describe how security measures selected by the facility will address the applicable risk-based... explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes identified by the Department; (3) Identify and describe how security measures selected and utilized by the...
A Silicon-Chip Source of Bright Photon-Pair Comb
2012-10-16
A silicon -chip source of bright photon-pair comb Wei C. Jiang,1, ∗ Xiyuan Lu,2, ∗ Jidong Zhang,3 Oskar Painter,4 and Qiang Lin1, 3, † 1Institute of...efficient monolithic photon-pair source for on-chip application. Here we report a device on the silicon -on-insulator platform that utilizes dramatic cavity...enhanced four-wave mixing in a high-Q silicon microdisk resonator. The device is able to produce high-purity photon pairs in a comb fashion, with an
Physical security and IT convergence: Managing the cyber-related risks.
McCreight, Tim; Leece, Doug
The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California.
Security and privacy issues in implantable medical devices: A comprehensive survey.
Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E
2015-06-01
Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety
Sackner-Bernstein, Jonathan
2017-01-01
Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID
2012-05-08
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio
2015-08-28
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.
The Need to Address Mobile Device Security in the Higher Education IT Curriculum
ERIC Educational Resources Information Center
Patten, Karen P.; Harris, Mark A.
2013-01-01
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
NASA Astrophysics Data System (ADS)
Graham, Michelle; Gray, David
As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.
Finite-key analysis for measurement-device-independent quantum key distribution.
Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong
2014-04-29
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
Device independence for two-party cryptography and position verification with memoryless devices
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie
2018-06-01
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
The impact of internet-connected control systems on the oil and gas industry
NASA Astrophysics Data System (ADS)
Martel, Ruth T.
In industry and infrastructure today, communication is a way of life. In the oil and gas industry, the use of devices that communicate with the network at large is both commonplace and expected. Unfortunately, security on these devices is not always best. Many industrial control devices originate from legacy devices not originally configured with security in mind. All infrastructure and industry today has seen an increase in attacks on their networks and in some cases, a very dramatic increase, which should be a cause for alarm and action. The purpose of this research was to highlight the threat that Internet-connected devices present to an organization's network in the oil and gas industry and ultimately, to the business and possibly even human life. Although there are several previous studies that highlight the problem of these Internet-connected devices, there remains evidence that security response has not been adequate. The analysis conducted on only one easily discovered device serves as an example of the ongoing issue of the security mindset in the oil and gas industry. The ability to connect to a network through an Internet-connected device gives a hacker an anonymous backdoor to do great damage in that network. The hope is that the approach to security in infrastructure and especially the oil and gas industry, changes before a major catastrophe occurs involving human life.
Security Issues and Resulting Security Policies for Mobile Devices
2013-03-01
protecting it. The Army has requested that the capabilities of these devices be delivered rapidly to the battlefield. Programs like Joint Battle...Explosives (ATF) has already deployed 50 iPads, with interest in deploying 50 additional devices. Despite the desire to rapidly deploy these devices, little...come in many different forms, such as personal data assistants, smart phones, and tablets . Today, the most popular mobile devices are characterized by
Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study
ERIC Educational Resources Information Center
Hines, Natasha
2015-01-01
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
NASA Astrophysics Data System (ADS)
Miret, Josep M.; Sebé, Francesc
Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.
Support system, excavation arrangement, and process of supporting an object
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arnold, Bill W.
2017-08-01
A support system, an excavation arrangement, and a process of supporting an object are disclosed. The support system includes a weight-bearing device and a camming mechanism positioned below the weight-bearing device. A downward force on the weight-bearing device at least partially secures the camming mechanism to opposing surfaces. The excavation arrangement includes a borehole, a support system positioned within and secured to the borehole, and an object positioned on and supported by the support system. The process includes positioning and securing the support system and positioning the object on the weight-bearing device.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
Frassanito, Paolo; Massimi, Luca; Tamburrini, Gianpiero; Pittiruti, Mauro; Doglietto, Francesco; Nucci, Carlotta Ginevra; Caldarelli, Massimo
2016-09-01
Accidental dislocation or removal is a well-known complication of external cerebrospinal fluid (CSF) drainage in daily clinical practice. At present, no data about the incidence of such complications are available in the scientific literature. SecurAcath (Interrad Medical, Plymouth, Minnesota, USA) is a subcutaneously anchored device recently adopted for securement of central venous catheters, known to be highly effective (and cost-effective) in reducing the risk of catheter dislodgement and/or accidental removal. We report our preliminary experience with the use of SecurAcath to secure CSF drainage, either ventricular or spinal, to the skin. SecurAcath was used in 29 consecutive patients (age range: 3 weeks-16 years, median age 6.3 years). In particular, the device was used for 25 ventricular catheters (a patient received 2 catheters in the same procedure for bilateral brain abscess) and 5 spinal drainages. Period in place ranged from 1-4 weeks (median 22 days). No complication related to the use of the device was observed, in particular there was no case of dislocation or accidental removal of the catheter. The removal procedure was extremely easy. The device has proven its utility also in 3 cases requiring an adjustment of the length of the catheter. In our experience, SecurAcath is a safe and effective device to secure CSF external catheters to the skin, with several relevant advantages: its placement and maintenance are easy; it may stay in place for the entire duration of the catheter; it allows a more complete antisepsis of the exit site, thus reducing local skin complications; it eliminates the risk of suture-related needlestick injuries. Copyright © 2016 Elsevier Inc. All rights reserved.
Protecting computer-based medical devices: defending against viruses and other threats.
2005-07-01
The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices
Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio
2015-01-01
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677
NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
Wireless Local Area Network (WLAN) Vulnerability Assessment and Security
2005-09-01
even that they have a Bluetooth device to begin with. Bluetooth attacks can permit network sniffing, device detection, data and services theft . Two...the Bluetooth v1.1 Foundation Specifications9. One major security issue is the fact that the Bluetooth standard allows a single device to communicate...simultaneously with multiple other devices . Many Bluetooth radios are embedded in devices and users often do not realize whether they are on or
Emerging Techniques for Field Device Security
Schwartz, Moses; Bechtel Corp.; Mulder, John; ...
2014-11-01
Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a systemmore » will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.« less
Securing Information with Complex Optical Encryption Networks
2015-08-11
Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... Secure Gun Storage or Safety Devices ACTION: 30-Day Notice of information collection. The Department of... approved collection. (2) Title of the Form/Collection: Certification of Secure Gun Storage or Safety... to the availability of secure gun storage or safety devices. (5) An estimate of the total number of...
21 CFR 880.5210 - Intravascular catheter securement device.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Intravascular catheter securement device. 880.5210 Section 880.5210 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... and is used to keep the hub of the needle or the catheter flat and securely anchored to the skin. (b...
21 CFR 880.5210 - Intravascular catheter securement device.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Intravascular catheter securement device. 880.5210 Section 880.5210 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... and is used to keep the hub of the needle or the catheter flat and securely anchored to the skin. (b...
Grassani, Davide; Simbula, Angelica; Pirotta, Stefano; Galli, Matteo; Menotti, Matteo; Harris, Nicholas C; Baehr-Jones, Tom; Hochberg, Michael; Galland, Christophe; Liscidini, Marco; Bajoni, Daniele
2016-04-01
Compact silicon integrated devices, such as micro-ring resonators, have recently been demonstrated as efficient sources of quantum correlated photon pairs. The mass production of integrated devices demands the implementation of fast and reliable techniques to monitor the device performances. In the case of time-energy correlations, this is particularly challenging, as it requires high spectral resolution that is not currently achievable in coincidence measurements. Here we reconstruct the joint spectral density of photons pairs generated by spontaneous four-wave mixing in a silicon ring resonator by studying the corresponding stimulated process, namely stimulated four wave mixing. We show that this approach, featuring high spectral resolution and short measurement times, allows one to discriminate between nearly-uncorrelated and highly-correlated photon pairs.
McInroy, John E.
2005-01-18
A precision positioning device is provided. The precision positioning device comprises a precision measuring/vibration isolation mechanism. A first plate is provided with the precision measuring mean secured to the first plate. A second plate is secured to the first plate. A third plate is secured to the second plate with the first plate being positioned between the second plate and the third plate. A fourth plate is secured to the third plate with the second plate being positioned between the third plate and the fourth plate. An adjusting mechanism for adjusting the position of the first plate, the second plate, the third plate, and the fourth plate relative to each other.
Protection of data carriers using secure optical codes
NASA Astrophysics Data System (ADS)
Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.
2006-02-01
Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.
Secure Location Provenance for Mobile Devices
2015-07-01
SECURE LOCATION PROVENANCE FOR MOBILE DEVICES UNIVERSITY OF ALABAMA AT BIRMINGHAM JULY 2015 FINAL TECHNICAL REPORT...PROVENANCE FOR MOBILE DEVICES 5a. CONTRACT NUMBER FA8750-12-2-0254 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 69220K 6. AUTHOR(S) Ragib Hasan...based services allow mobile device users to access various services based on the users’ current physical location information. Path-critical applications
An improved mounting device for attaching intracranial probes in large animal models.
Dunster, Kimble R
2015-12-01
The rigid support of intracranial probes can be difficult when using animal models, as mounting devices suitable for the probes are either not available, or designed for human use and not suitable in animal skulls. A cheap and reliable mounting device for securing intracranial probes in large animal models is described. Using commonly available clinical consumables, a universal mounting device for securing intracranial probes to the skull of large animals was developed and tested. A simply made mounting device to hold a variety of probes from 500 μm to 1.3 mm in diameter to the skull was developed. The device was used to hold probes to the skulls of sheep for up to 18 h. No adhesives or cements were used. The described device provides a reliable method of securing probes to the skull of animals.
Memory device for two-dimensional radiant energy array computers
NASA Technical Reports Server (NTRS)
Schaefer, D. H.; Strong, J. P., III (Inventor)
1977-01-01
A memory device for two dimensional radiant energy array computers was developed, in which the memory device stores digital information in an input array of radiant energy digital signals that are characterized by ordered rows and columns. The memory device contains a radiant energy logic storing device having a pair of input surface locations for receiving a pair of separate radiant energy digital signal arrays and an output surface location adapted to transmit a radiant energy digital signal array. A regenerative feedback device that couples one of the input surface locations to the output surface location in a manner for causing regenerative feedback is also included
Device for remote operation of electrical disconnect
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Bobbitt, III, John Thomas
Provided is a device for remote operation of an electrical disconnect. The device can include a handle clamp configured to be secured to an extending member of the electrical disconnect. The device can further include a case clamp configured to be secured to a rigid portion of the electrical disconnect. The device can further include a cable having an exterior sheath coaxially surrounding an inner cable. The inner cable can be coaxially slidable with respect to the exterior sheath. The inner cable can extend through an opening of the case clamp and be secured to the handle clamp. The devicemore » can further include an actuator configured to coaxially slide the inner cable such that the handle clamp is actuated towards the case clamp.« less
Experimental Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-01
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Experimental measurement-device-independent quantum key distribution.
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-27
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Design of real-time encryption module for secure data protection of wearable healthcare devices.
Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K
2013-01-01
Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Cold War Agency: The United States and the Failure of the DIEM Experiment
2017-03-01
2000s to establish democratic regimes in Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests with the
29 CFR 1915.151 - Scope, application and definitions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... deceleration devices. Body belt means a strap with means for both securing it about the waist and attaching it to a lanyard, lifeline, or deceleration device. Body harness means straps which may be secured about.... Connector means a device which is used to couple (connect) parts of a personal fall arrest system or parts...
29 CFR 1915.151 - Scope, application and definitions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... deceleration devices. Body belt means a strap with means for both securing it about the waist and attaching it to a lanyard, lifeline, or deceleration device. Body harness means straps which may be secured about.... Connector means a device which is used to couple (connect) parts of a personal fall arrest system or parts...
29 CFR 1915.151 - Scope, application and definitions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... deceleration devices. Body belt means a strap with means for both securing it about the waist and attaching it to a lanyard, lifeline, or deceleration device. Body harness means straps which may be secured about.... Connector means a device which is used to couple (connect) parts of a personal fall arrest system or parts...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Secure Gun Storage or Safety Devices ACTION: 60-Day notice of information collection. The Department of...) Title of the Form/Collection: Certification of Secure Gun Storage or Safety Devices. (3) Agency form... gun storage or safety devices. (5) An estimate of the total number of respondents and the amount of...
Direct mounted photovoltaic device with improved side clip
Keenihan, James R; Boven, Michelle L; Brown, Jr., Claude; Eurich, Gerald K; Gaston, Ryan S; Hus, Michael
2013-11-19
The present invention is premised upon a photovoltaic assembly system for securing and/or aligning at least a plurality of vertically adjacent photovoltaic device assemblies to one another. The securing function being accomplished by a clip member that may be a separate component or integral to one or more of the photovoltaic device assemblies.
Direct mounted photovoltaic device with improved front clip
Keenihan, James R; Boven, Michelle; Brown, Jr., Claude; Gaston, Ryan S; Hus, Michael; Langmaid, Joe A; Lesniak, Mike
2013-11-05
The present invention is premised upon a photovoltaic assembly system for securing and/or aligning at least a plurality of vertically adjacent (overlapping) photovoltaic device assemblies to one another. The securing function being accomplished by a clip member that may be a separate component or integral to one or more of the photovoltaic device assemblies.
Practical device-independent quantum cryptography via entropy accumulation.
Arnon-Friedman, Rotem; Dupuis, Frédéric; Fawzi, Omar; Renner, Renato; Vidick, Thomas
2018-01-31
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-01-01
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-06-17
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
3-dimensional telepresence system for a robotic environment
Anderson, Matthew O.; McKay, Mark D.
2000-01-01
A telepresence system includes a camera pair remotely controlled by a control module affixed to an operator. The camera pair provides for three dimensional viewing and the control module, affixed to the operator, affords hands-free operation of the camera pair. In one embodiment, the control module is affixed to the head of the operator and an initial position is established. A triangulating device is provided to track the head movement of the operator relative to the initial position. A processor module receives input from the triangulating device to determine where the operator has moved relative to the initial position and moves the camera pair in response thereto. The movement of the camera pair is predetermined by a software map having a plurality of operation zones. Each zone therein corresponds to unique camera movement parameters such as speed of movement. Speed parameters include constant speed, or increasing or decreasing. Other parameters include pan, tilt, slide, raise or lowering of the cameras. Other user interface devices are provided to improve the three dimensional control capabilities of an operator in a local operating environment. Such other devices include a pair of visual display glasses, a microphone and a remote actuator. The pair of visual display glasses are provided to facilitate three dimensional viewing, hence depth perception. The microphone affords hands-free camera movement by utilizing voice commands. The actuator allows the operator to remotely control various robotic mechanisms in the remote operating environment.
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
[Impact of an automated dispensing system for medical devices in cardiac surgery department].
Clou, E; Dompnier, M; Kably, B; Leplay, C; Poupon, E; Archer, V; Paul, M
2018-01-01
To secure medical devices' management, the implementation of automated dispensing system in surgical service has been realized. The objective of this study was to evaluate security, organizational and economic impact of installing automated dispensing system for medical devices (ASDM). The implementation took place in a cardiac surgery department. Security impact was assessed by comparing traceability rate of implantable medical devices one year before and one year after installation. Questionnaire on nurses' perception and satisfaction completed this survey. Resupplying costs, stocks' evolution and investments for the implementation of ASDM were the subject of cost-benefit study. After one year, traceability rate is excellent (100%). Nursing staffs were satisfied with 87.5% by this new system. The introduction of ASDM allowed a qualitative and quantitative decrease in stocks, with a reduction of 30% for purchased medical devices and 15% for implantable medical devices in deposit-consignment. Cost-benefit analysis shows a rapid return on investment. Real stock decrease (purchased medical devices) is equivalent to 46.6% of investment. Implementation of ASDM allows to secure storage and dispensing of medical devices. This system has also an important economic impact and appreciated by users. Copyright © 2017 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.
33 CFR 104.265 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...
Russell, Thomas P [Amherst, MA; Lutkenhaus, Jodie [Wethersfield, CT
2012-05-15
Disclosed herein is a device comprising a pair of electrodes; and a nanotube, a nanorod and/or a nanowire; the nanotube, nanorod and/or nanowire comprising a piezoelectric and/or pyroelectric polymeric composition; the pair of electrodes being in electrical communication with opposing surfaces of the nanotube, nanorod and/or a nanowire; the pair of electrodes being perpendicular to a longitudinal axis of the nanotube, nanorod and/or a nanowire.
Semiconductor devices for entangled photon pair generation: a review
NASA Astrophysics Data System (ADS)
Orieux, Adeline; Versteegh, Marijn A. M.; Jöns, Klaus D.; Ducci, Sara
2017-07-01
Entanglement is one of the most fascinating properties of quantum mechanical systems; when two particles are entangled the measurement of the properties of one of the two allows the properties of the other to be instantaneously known, whatever the distance separating them. In parallel with fundamental research on the foundations of quantum mechanics performed on complex experimental set-ups, we assist today with bourgeoning of quantum information technologies bound to exploit entanglement for a large variety of applications such as secure communications, metrology and computation. Among the different physical systems under investigation, those involving photonic components are likely to play a central role and in this context semiconductor materials exhibit a huge potential in terms of integration of several quantum components in miniature chips. In this article we review the recent progress in the development of semiconductor devices emitting entangled photons. We will present the physical processes allowing the generation of entanglement and the tools to characterize it; we will give an overview of major recent results of the last few years and highlight perspectives for future developments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...
Code of Federal Regulations, 2014 CFR
2014-04-01
... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...
Code of Federal Regulations, 2011 CFR
2011-04-01
... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...
Code of Federal Regulations, 2012 CFR
2012-04-01
... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...
Code of Federal Regulations, 2013 CFR
2013-04-01
... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M
2017-09-04
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
Secure data exchange between intelligent devices and computing centers
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2005-03-01
The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Security-Enhanced Push Button Configuration for Home Smart Control.
Han, Junghee; Park, Taejoon
2017-06-08
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.
Security-Enhanced Push Button Configuration for Home Smart Control †
Han, Junghee; Park, Taejoon
2017-01-01
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment. PMID:28594370
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
Derived virtual devices: a secure distributed file system mechanism
NASA Technical Reports Server (NTRS)
VanMeter, Rodney; Hotz, Steve; Finn, Gregory
1996-01-01
This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan
2016-11-01
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.
1992-03-17
The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.
Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.
1992-01-01
The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.
Measurement-Device-Independent Quantum Key Distribution over 200 km
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei
2014-11-01
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
Device Data Protection in Mobile Healthcare Applications
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
Obfuscated authentication systems, devices, and methods
Armstrong, Robert C; Hutchinson, Robert L
2013-10-22
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.
ERIC Educational Resources Information Center
Cooper, Paul K.
2017-01-01
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance.
Kramer, Daniel B; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R
2012-01-01
Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware.
Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance
Kramer, Daniel B.; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R.
2012-01-01
Background Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Results Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Conclusions Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware. PMID:22829874
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.
Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier
2018-06-06
As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
DOT National Transportation Integrated Search
2016-05-22
This report presents recommendations for minimum DSRC device communication performance and security requirements to ensure effective operation of the DSRC system. The team identified recommended DSRC communications requirements aligned to use cases, ...
Detection of orthopaedic foot and ankle implants by security screening devices.
Bluman, Eric M; Tankson, Cedric; Myerson, Mark S; Jeng, Clifford L
2006-12-01
A common question asked by patients contemplating foot and ankle surgery is whether the implants used will set off security screening devices in airports and elsewhere. Detectability of specific implants may require the orthopaedic surgeon to provide attestation regarding their presence in patients undergoing implantation of these devices. Only two studies have been published since security measures became more stringent in the post-9/11 era. None of these studies specifically focused on the large numbers of orthopaedic foot and ankle implants in use today. This study establishes empiric data on the detectability by security screening devices of some currently used foot and ankle implants. A list of foot and ankle procedures was compiled, including procedures frequently used by general orthopaedists as well as those usually performed only by foot and ankle specialists. Implants tested included those used for open reduction and internal fixation, joint fusion, joint arthroplasty, osteotomies, arthroreisis, and internal bone stimulation. A test subject walked through a gate-type security device and was subsequently screened using a wand-type detection device while wearing each construct grouping. The screening was repeated with the implants placed within uncooked steak to simulate subcutaneous and submuscular implantation. None of the implants were detected by the gate-type security device. Specific implants that triggered the wand-type detection device regardless of coverage with the meat were total ankle prostheses, implantable bone stimulators, large metatarsophalangeal hemiarthroplasty, large arthroreisis plugs, medial distal tibial locking construct, supramalleolar osteotomy fixation, stainless steel bimalleolar ankle fracture fixation, calcaneal fracture plate and screw constructs, large fragment blade plate constructs, intramedullary tibiotalocalcaneal fusion constructs, and screw fixation for calcaneal osteotomies, ankle arthrodeses, triple arthrodeses, and stainless steel first metatarsophalangeal joint arthrodeses. The placement of implants in meat prevented the detectability of only the stainless steel Jones fracture implant (stainless steel 6.5-mm cannulated screw) and the stainless steel midfoot fusion construct (four stainless steel 4.0-mm cannulated screws). These data may help the orthopaedic surgeon in counseling patients as to the detectability of some orthopaedic foot and ankle implants in use today. Specific constructs for which documentation may need to be provided to the patient are identified. As security standards evolve and the environments in which they are practiced change, empiric testing of many of these devices may need to be repeated.
A device that operates within a self-assembled 3D DNA crystal
NASA Astrophysics Data System (ADS)
Hao, Yudong; Kristiansen, Martin; Sha, Ruojie; Birktoft, Jens J.; Hernandez, Carina; Mao, Chengde; Seeman, Nadrian C.
2017-08-01
Structural DNA nanotechnology finds applications in numerous areas, but the construction of objects, 2D and 3D crystalline lattices and devices is prominent among them. Each of these components has been developed individually, and most of them have been combined in pairs. However, to date there are no reports of independent devices contained within 3D crystals. Here we report a three-state 3D device whereby we change the colour of the crystals by diffusing strands that contain dyes in or out of the crystals through the mother-liquor component of the system. Each colouring strand is designed to pair with an extended triangle strand by Watson-Crick base pairing. The arm that contains the dyes is quite flexible, but it is possible to establish the presence of the duplex proximal to the triangle by X-ray crystallography. We modelled the transition between the red and blue states through a simple kinetic model.
Device-independent two-party cryptography secure against sequential attacks
NASA Astrophysics Data System (ADS)
Kaniewski, Jędrzej; Wehner, Stephanie
2016-05-01
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.
Server-Based and Server-Less Byod Solutions to Support Electronic Learning
2016-06-01
Knowledge Online NSD National Security Directive OS operating system OWA Outlook Web Access PC personal computer PED personal electronic device PDA...mobile devices, institute mobile device policies and standards, and promote the development and use of DOD mobile and web -enabled applications” (DOD...with an isolated BYOD web server, properly educated system administrators must carry out and execute the necessary, pre-defined network security
48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...
48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...
48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...
48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...
Securing Paternity by Mutilating Female Genitalia in Spiders.
Mouginot, Pierick; Prügel, Josepha; Thom, Ulrike; Steinhoff, Philip O M; Kupryjanowicz, Janusz; Uhl, Gabriele
2015-11-16
Competition between males and their sperm over access to females and their eggs has resulted in manifold ways by which males try to secure paternity, ranging from physically guarding the female after mating to reducing her receptivity or her attractiveness to subsequent males by transferring manipulative substances or by mechanically sealing the female reproductive tract with a copulatory plug. Copulations may also result in internal damage of the female genitalia; however, this is not considered as a direct adaptation against sperm competition but as a collateral effect. Here, we present a drastic and direct mechanism for securing paternity: the removal of coupling structures on female genitalia by males. In the orb-weaving spider Larinia jeskovi males remove the scapus, a crucial coupling device on the female external genital region. Reconstruction of the coupling mechanism using micro-CT-scanned mating pairs revealed that several sclerites of the male genitalia interact to break off the scapus. Once it is removed, remating cannot occur due to mechanical coupling difficulties. In the field, male-inflicted genital damage is very prevalent since all female L. jeskovi were found to be mutilated at the end of the mating season. External genital mutilation is an overlooked but widely spread phenomenon since 80 additional spider species were found for which male genital manipulation can be suspected. Interlocking genitalia provide an evolutionary platform for the rapid evolution of this highly effective mechanism to secure paternity, and we suspect that other animal groups with interlocking genital structures might reveal similarly drastic male adaptations. Copyright © 2015 Elsevier Ltd. All rights reserved.
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2011 CFR
2011-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Particle Capture Devices and Methods of Use Thereof
NASA Technical Reports Server (NTRS)
Voldman, Joel (Inventor); Skelley, Alison M. (Inventor); Kirak, Oktay (Inventor); Jaenisch, Rudolf (Inventor)
2015-01-01
The present invention provides a device and methods of use thereof in microscale particle capturing and particle pairing. This invention provides particle patterning device, which mechanically traps individual particles within first chambers of capture units, transfer the particles to second chambers of opposing capture units, and traps a second type of particle in the same second chamber. The device and methods allow for high yield assaying of trapped cells, high yield fusion of trapped, paired cells, for controlled binding of particles to cells and for specific chemical reactions between particle interfaces and particle contents. The device and method provide means of identification of the particle population and a facile route to particle collection.
Strongly exchange-coupled triplet pairs in an organic semiconductor
NASA Astrophysics Data System (ADS)
Weiss, Leah R.; Bayliss, Sam L.; Kraffert, Felix; Thorley, Karl J.; Anthony, John E.; Bittl, Robert; Friend, Richard H.; Rao, Akshay; Greenham, Neil C.; Behrends, Jan
2017-02-01
From biological complexes to devices based on organic semiconductors, spin interactions play a key role in the function of molecular systems. For instance, triplet-pair reactions impact operation of organic light-emitting diodes as well as photovoltaic devices. Conventional models for triplet pairs assume they interact only weakly. Here, using electron spin resonance, we observe long-lived, strongly interacting triplet pairs in an organic semiconductor, generated via singlet fission. Using coherent spin manipulation of these two-triplet states, we identify exchange-coupled (spin-2) quintet complexes coexisting with weakly coupled (spin-1) triplets. We measure strongly coupled pairs with a lifetime approaching 3 μs and a spin coherence time approaching 1 μs, at 10 K. Our results pave the way for the utilization of high-spin systems in organic semiconductors.
Comparison of commercial and noncommercial endotracheal tube-securing devices.
Fisher, Daniel F; Chenelle, Christopher T; Marchese, Andrew D; Kratohvil, Joseph P; Kacmarek, Robert M
2014-09-01
Tracheal intubation is used to establish a secure airway in patients who require mechanical ventilation. Unexpected extubation can have serious complications, including airway trauma and death. Various methods and devices have been developed to maintain endotracheal tube (ETT) security. Associated complications include pressure ulcers due to decreased tissue perfusion. Device consideration includes ease of use, rapid application, and low exerted pressure around the airway. Sixteen ETT holders were evaluated under a series of simulated clinical conditions. ETT security was tested by measuring distance displaced after a tug. Nine of the 16 methods could be evaluated for speed of moving the ETT to the opposite side of the mouth. Sensors located on a mannequin measured applied forces when the head was rotated vertically or horizontally. Data were analyzed using multivariate analysis of variance, with P < .05. Median displacement of the ETT by the tug test was 0 cm (interquartile range of 0.0-0.10 cm, P < .001). The mean time to move the ETT from one side of the mouth to the other ranged from 1.25 ± 0.2 s to 34.4 ± 3.4 s (P < .001). Forces applied to the face with a vertical head lift ranged from < 0.2 newtons (N) to a maximum of 3.52 N (P < .001). Forces applied to the face with a horizontal rotation ranged from < 0.2 N to 3.52 N (P < .001). Commercial devices produced greater force than noncommercial devices. Noncommercial airway holders exert less force on a patient's face than commercial devices. Airway stability is affected by the type of securing method. Many commercial holders allow for rapid but secure movement of the artificial airway from one side of the mouth to the other. Copyright © 2014 by Daedalus Enterprises.
Pies, Ross E.
2016-03-29
A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Hunter, Steven L.; Boro, Carl O.; Farris, Alvis
2002-01-01
A tiltmeter device having a pair of orthogonally disposed tilt sensors that are levelable within an inner housing containing the sensors. An outer housing can be rotated to level at least one of the sensor pair while the inner housing can be rotated to level the other sensor of the pair. The sensors are typically rotated up to about plus or minus 100 degrees. The device is effective for measuring tilts in a wide range of angles of inclination of wells and can be employed to level a platform containing a third sensor.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
... Communication Capabilities, Components Thereof, and Products Containing Same; Institution of Investigation... VirnetX, Inc., of Zephyr Cove, Nevada and Science Applications International Corporation of McLean... sale within the United States after importation of certain devices with secure communication...
Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)
Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states
NASA Astrophysics Data System (ADS)
Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo
2017-12-01
This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.
NASA Astrophysics Data System (ADS)
Bovino, Fabio Antonio; Messina, Angelo
2016-10-01
In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
NASA Astrophysics Data System (ADS)
Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan
2014-10-01
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Specifying Skill-Based Training Strategies and Devices: A Model Description
1990-06-01
Technical Report 897 Specifying Skill-Based Training N Strategies and Devices: A Model Description I Paui J. Sticha and Mark Schlager Human Resources...unlimied 90 ’ Technical Report 897 Specifying Skill-Based Training Strategies and Devices: A Model Description Paul J. Sticha and Mark Schlager Human...SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE FMNo o7 ote la. REPORT SECURITY CLASSIFICATION lb. RESTRICTWE MARKINGS
Laupu, W; Brimacombe, J
2007-08-01
We tested the hypothesis that supplementary cleaning using potassium permanganate 8 mg.l(-1) eliminates protein deposits from the reusable metallic and synthetic rubber airway equipment. Twenty Macintosh laryngoscope blades (surgical steel), 20 pairs of Magill's forceps (surgical steel) and 20 Guedel airways (synthetic rubber) were allocated to two groups for supplementary cleaning. In group A, the device was immersed in potassium permanganate 8 mg.l(-1). In group B (controls), the device was immersed in sterile water. The devices were then immersed in a protein staining solution, rinsed and the severity of staining was scored. In addition, the devices were inspected for tissue and then tested for occult blood. Protein contamination was lower in the potassium permanganate group for all devices (each device: p < 0.0001). There was no staining detected in the permanganate group. In the permanganate group, dried tissue was detected in the teeth of one pair of forceps, which was not detected following supplementary cleaning. Additionally, occult blood was detected on two pairs of forceps and a laryngoscope blade, which was not detected following supplementary cleaning. In the control group, no tissue was detected but one pair of forceps and two laryngoscope blades tested positive for occult blood before and after supplementary cleaning. We conclude that supplementary cleaning using potassium permanganate 8 mg.l(-1) eliminates protein deposits from re-usable metallic and synthetic rubber airway equipment.
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
Experimental measurement-device-independent quantum digital signatures over a metropolitan network
NASA Astrophysics Data System (ADS)
Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei
2017-04-01
Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.
Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar
2017-08-01
Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.
Bonfanti, Matteo E
2014-09-01
Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
... capabilities, components thereof, and products containing the same. The complaint names Apple Inc. of Cupertino..., Components Thereof, and Products Containing the Same; Receipt of Complaint; Solicitation of Comments Relating... Certain Devices with Secure Communication Capabilities, Components Thereof, and Products Containing the...
Radio Frequency Based Programmable Logic Controller Anomaly Detection
2013-09-01
include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
ID-based encryption scheme with revocation
NASA Astrophysics Data System (ADS)
Othman, Hafizul Azrie; Ismail, Eddie Shahril
2017-04-01
In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.
Device for testing continuity and/or short circuits in a cable
NASA Technical Reports Server (NTRS)
Hayhurst, Arthur R. (Inventor)
1995-01-01
A device for testing current paths is attachable to a conductor. The device automatically checks the current paths of the conductor for continuity of a center conductor, continuity of a shield and a short circuit between the shield and the center conductor. The device includes a pair of connectors and a circuit to provide for testing of the conductive paths of the cable. The pair of connectors electrically connects the conductive paths of a cable to be tested with the circuit paths of the circuit. The circuit paths in the circuit include indicators to simultaneously indicate the results of the testing.
Czugala, Monika; Gorkin, Robert; Phelan, Thomas; Gaughran, Jennifer; Curto, Vincenzo Fabio; Ducrée, Jens; Diamond, Dermot; Benito-Lopez, Fernando
2012-12-07
This work describes the first use of a wireless paired emitter detector diode device (PEDD) as an optical sensor for water quality monitoring in a lab-on-a-disc device. The microfluidic platform, based on an ionogel sensing area combined with a low-cost optical sensor, is applied for quantitative pH and qualitative turbidity monitoring of water samples at point-of-need. The autonomous capabilities of the PEDD system, combined with the portability and wireless communication of the full device, provide the flexibility needed for on-site water testing. Water samples from local fresh and brackish sources were successfully analysed using the device, showing very good correlation with standard bench-top systems.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-818] Certain Devices With Secure... AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that a complaint was filed with the U.S. International Trade Commission on November 4, 2011, under section 337 of...
49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?
Code of Federal Regulations, 2012 CFR
2012-10-01
... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...
49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?
Code of Federal Regulations, 2014 CFR
2014-10-01
... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...
49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?
Code of Federal Regulations, 2013 CFR
2013-10-01
... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...
Code of Federal Regulations, 2010 CFR
2010-04-01
... name, address, telephone number, and social security number (if available) of the patient receiving the...; (ii) The name, address, telephone number, and social security number (if available) of the patient... the manufacturer of the tracked device for audit upon written request by an authorized representative...
Code of Federal Regulations, 2011 CFR
2011-04-01
... name, address, telephone number, and social security number (if available) of the patient receiving the...; (ii) The name, address, telephone number, and social security number (if available) of the patient... the manufacturer of the tracked device for audit upon written request by an authorized representative...
Constructing RBAC Based Security Model in u-Healthcare Service Platform
Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil
2015-01-01
In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104
Constructing RBAC based security model in u-healthcare service platform.
Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil
2015-01-01
In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
Device-independent security of quantum cryptography against collective attacks.
Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas; Massar, Serge; Pironio, Stefano; Scarani, Valerio
2007-06-08
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Si-Jing; Zhang, Lu; You, Li-Xing; Wang, Zhen; Liu, Yang; Lu, Chao-Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Chen, Teng-Yun; Pan, Jian-Wei
2016-01-01
Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.
Devices and dressings to secure peripheral venous catheters to prevent complications.
Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M
2015-06-12
A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard methodological procedures expected by Cochrane. We included six RCTs (1539 participants) in this review. Trial sizes ranged from 50 to 703 participants. These six trials made four comparisons, namely: transparent dressings versus gauze; bordered transparent dressings versus a securement device; bordered transparent dressings versus tape; and transparent dressing versus sticking plaster. There is very low quality evidence of fewer catheter dislodgements or accidental removals with transparent dressings compared with gauze (two studies, 278 participants, RR 0.40; 95% CI 0.17 to 0.92, P = 0.03%). The relative effects of transparent dressings and gauze on phlebitis (RR 0.89; 95% CI 0.47 to 1.68) and infiltration (RR 0.80; 95% CI 0.48 to 1.33) are unclear. The relative effects on PVC failure of a bordered transparent dressing and a securement device have been assessed in only one small study and these were unclear. There was very low quality evidence from the same single study of less frequent dislodgement or accidental catheter removal with bordered transparent dressings than securement devices (RR 0.14, 95% CI 0.03 to 0.63) but more phlebitis with bordered dressings (RR 8.11, 95% CI 1.03 to 64.02) (very low quality evidence). A small single study compared bordered transparent dressings with tape and found very low quality evidence of more PVC failure with the bordered dressing (RR 1.84, 95% CI 1.08 to 3.11) but the relative effects on dislodgement were not clear (very low quality evidence). The relative effects of transparent dressings and a sticking plaster have only been compared in one small study and are unclear. More high quality RCTs are required to determine the relative effects of alternative PVC dressings and securement devices. It is not clear if any one dressing or securement device is better than any other in securing peripheral venous catheters. There is a need for further, independent high quality trials to evaluate the many traditional as well as the newer, high use products. Given the large cost differences between some different dressings and securement devices, future trials should include a robust cost-effectiveness analysis.
Agreement and reading time for differently-priced devices for the digital capture of X-ray films.
Salazar, Antonio José; Camacho, Juan Camilo; Aguirre, Diego Andrés
2012-03-01
We assessed the reliability of three digital capture devices: a film digitizer (which cost US $15,000), a flat-bed scanner (US $1800) and a digital camera (US $450). Reliability was measured as the agreement between six observers when reading images acquired from a single device and also in terms of the pair-device agreement. The images were 136 chest X-ray cases. The variables measured were the interstitial opacities distribution, interstitial patterns, nodule size and percentage pneumothorax size. The agreement between the six readers when reading images acquired from a single device was similar for the three devices. The pair-device agreements were moderate for all variables. There were significant differences in reading-time between devices: the mean reading-time for the film digitizer was 93 s, it was 59 s for the flat-bed scanner and 70 s for the digital camera. Despite the differences in their cost, there were no substantial differences in the performance of the three devices.
Device for producing a fluid stream of varying composition
Moss, Owen R.; Clark, Mark L.; Rossignol, E. John
1982-01-01
A device for producing a fluid stream of varying composition comprises a chamber having an inlet at one end and outlet at the other. Between the inlet and outlet there are substantially planar pans or baffles positioned normal to the bulk flow of fluid between the inlet and the outlet. These pans are arranged in pairs. Each pan, except those of the pair most remote from the inlet, is spaced from the walls of the chamber to permit air to flow past it. The pans of each pair are also spaced from each other, in a direction parallel to their planes, leaving an empty space along the mid-plane of the chamber. This produces a circulation and mixing of fluid between the pairs of pans or baffles. A secondary stream of fluid is introduced between two pairs of baffles in the intermediate portion of the chamber, so that the composition of the fluid is different in the portion adjacent to the outlet and the portion adjacent to the inlet. In a specific embodiment, the device is an exposure chamber for experimental animals, and the pans or baffles are catch pans for excrement.
2014-09-30
fingerprint sensor etc. Secure application execution Trust established outwards With normal world apps With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...
21 CFR 876.5320 - Nonimplanted electrical continence device.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Nonimplanted electrical continence device. 876... Nonimplanted electrical continence device. (a) Identification. A nonimplanted electrical continence device is a device that consists of a pair of electrodes on a plug or a pessary that are connected by an electrical...
21 CFR 876.5320 - Nonimplanted electrical continence device.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Nonimplanted electrical continence device. 876... Nonimplanted electrical continence device. (a) Identification. A nonimplanted electrical continence device is a device that consists of a pair of electrodes on a plug or a pessary that are connected by an electrical...
21 CFR 876.5320 - Nonimplanted electrical continence device.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Nonimplanted electrical continence device. 876... Nonimplanted electrical continence device. (a) Identification. A nonimplanted electrical continence device is a device that consists of a pair of electrodes on a plug or a pessary that are connected by an electrical...
21 CFR 876.5320 - Nonimplanted electrical continence device.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Nonimplanted electrical continence device. 876... Nonimplanted electrical continence device. (a) Identification. A nonimplanted electrical continence device is a device that consists of a pair of electrodes on a plug or a pessary that are connected by an electrical...
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Multi-wavelength lenses for terahertz surface wave.
Wei, Minggui; Yang, Quanlong; Xu, Quan; Zhang, Xueqian; Li, Yanfeng; Gu, Jianqiang; Han, Jiaguang; Zhang, Weili
2017-10-16
Metasurface-based surface wave (SW) devices working at multi-wavelength has been continuously arousing enormous curiosity recently, especially in the terahertz community. In this work, we propose a multi-layer metasurface structure composed of metallic slit pairs to build terahertz SW devices. The slit pair has a narrow bandwidth and its response frequency can be altered by its geometric parameter, thereby suppressing the frequency crosstalk and reducing the difficulty of design. By elaborately tailoring the distribution of the slit pairs, a series of achromatic SW lenses (SWLs) working at 0.6, 0.75 and 1 THz are experimentally demonstrated by the near field scanning terahertz microscope (NSTM) system. In addition, a wavelength-division-multiplexer (WDM) is further designed and implemented, which is promising in building multiplexed devices for plasmonic circuits. The structure proposed here cannot only couple the terahertz wave from free space to SWs, but also control its propagation. Moreover, our findings demonstrate the great potential to design multi-wavelength plasmonic metasurface devices, which can be extended to microwave and visible frequencies as well.
Enabling private and public sector organizations as agents of homeland security
NASA Astrophysics Data System (ADS)
Glassco, David H. J.; Glassco, Jordan C.
2006-05-01
Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.
Integral Transport Analysis Results for Ions Flowing Through Neutral Gas
NASA Astrophysics Data System (ADS)
Emmert, Gilbert; Santarius, John
2017-10-01
Results of a computational model for the flow of energetic ions and neutrals through a background neutral gas will be presented. The method models reactions as creating a new source of ions or neutrals if the energy or charge state of the resulting particle is changed. For a given source boundary condition, the creation and annihilation of the various species is formulated as a 1-D Volterra integral equation that can quickly be solved numerically by finite differences. The present work focuses on multiple-pass, 1-D ion flow through neutral gas and a nearly transparent, concentric anode and cathode pair in spherical, cylindrical, or linear geometry. This has been implemented as a computer code for atomic (3He, 3He +, 3He + +) and molecular (D, D2, D-, D +, D2 +, D3 +) ion and neutral species, and applied to modeling inertial-electrostatic connement (IEC) devices. The code yields detailed energy spectra of the various ions and energetic neutral species. Calculations for several University of Wisconsin IEC and ion implantation devices will be presented. Research supported by US Dept. of Homeland Security Grant 2015-DN-077-ARI095, Dept. of Energy Grant DE-FG02-04ER54745, and the Grainger Foundation.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Dawn Technologies, Inc., Distinctive Devices, Inc., Haber, Inc., and Independence Brewing Co.; Order of Suspension of Trading June 14... a lack of current and accurate information concerning the securities of Independence Brewing Co...
Multi-Rate Secure Processor Terminal Architecture Study. Volume 1. Terminal Architecture.
1981-06-01
together because of the intimate relationship that must be established between the KG devices and the control of those devices to satisy security...9.6 kilobit for ti’.:., pass filter funtion because it’s time span is larger. The resultdot loading is estimated at 260 microseconds out of 833
Android Based Mobile Apps for Information Security Hands-On Education
ERIC Educational Resources Information Center
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M.
2017-01-01
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2012 CFR
2012-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
Torigoe, Hidetaka; Miyakawa, Yukako; Fukushi, Miyako; Ono, Akira; Kozasa, Tetsuo
2009-01-01
We have already found that Hg(II) cation specifically binds to T:T mismatch base pair in heteroduplex DNA, which increases the melting temperature of heteroduplex DNA involving T:T mismatch base pair by about 4 degrees C. We have also found that Ag(I) cation specifically binds to C:C mismatch base pair in heteroduplex DNA, which increases the melting temperature of heteroduplex DNA involving C:C mismatch base pair by about 4 degrees C. Using the specific interaction, we developed a novel device to trap each of Hg(II) and Ag(I) cation. The device is composed of 5'-biotinylated T-rich or C-rich DNA oligonucleotides, BIO-T20: 5'-Bio-T(20)-3' or BIO-C20: 5'-Bio-C(20)-3' (Bio is a biotin), immobilized on streptavidin-coated polystylene beads. When the BIO-T20-immobilized beads were added to a solution containing Hg(II) cation, and the beads trapping Hg(II) cation were collected by centrifugation, almost all of Hg(II) cation were removed from the solution. Also, when the BIO-C20-immobilized beads were added to a solution containing Ag(I) cation, and the beads trapping Ag(I) cation were collected by centrifugation, almost all of Ag(I) cation were removed from the solution. We conclude that, using the novel device developed in this study, Hg(II) and Ag(I) cation can be effectively removed from the solution.
Conducting real-time multiplayer experiments on the web.
Hawkins, Robert X D
2015-12-01
Group behavior experiments require potentially large numbers of participants to interact in real time with perfect information about one another. In this paper, we address the methodological challenge of developing and conducting such experiments on the web, thereby broadening access to online labor markets as well as allowing for participation through mobile devices. In particular, we combine a set of recent web development technologies, including Node.js with the Socket.io module, HTML5 canvas, and jQuery, to provide a secure platform for pedagogical demonstrations and scalable, unsupervised experiment administration. Template code is provided for an example real-time behavioral game theory experiment which automatically pairs participants into dyads and places them into a virtual world. In total, this treatment is intended to allow those with a background in non-web-based programming to modify the template, which handles the technical server-client networking details, for their own experiments.
Fast and slow light generated by surface plasmon wave and gold grating coupling effects
NASA Astrophysics Data System (ADS)
Amiri, Iraj S.; Ariannejad, M. M.; Tajdidzadeh, M.; Sorger, Volker J.; Ling, Xi; Yupapin, P.
2018-06-01
We present here the results of a simulation of the effect of gold and graphene coatings on silicon micro-ring resonators. We studied the effect of different radii of graphene on the time delay, from which one an interesting aspect of light pulse behaviors, such as fast light, was numerically investigated. The obtained results indicate that the time delay can be varied, which is in good agreement with theoretical predictions. Fast and slow light pulse trains can be obtained by modifying the throughput port, which forms the gold grating length. The temporal gaps between the fast and slow light in the used graphene and gold are 140 and 168 fs, respectively, which can be tuned by varying the radius or grating length. The obtained results show that such a device may be useful in applications requiring fast and slow light pulse train pairs, such as optical switching, sensors, communications, and security applications.
Fast and slow light generated by surface plasmon wave and gold grating coupling effects
NASA Astrophysics Data System (ADS)
Amiri, Iraj S.; Ariannejad, M. M.; Tajdidzadeh, M.; Sorger, Volker J.; Ling, Xi; Yupapin, P.
2018-01-01
We present here the results of a simulation of the effect of gold and graphene coatings on silicon micro-ring resonators. We studied the effect of different radii of graphene on the time delay, from which one an interesting aspect of light pulse behaviors, such as fast light, was numerically investigated. The obtained results indicate that the time delay can be varied, which is in good agreement with theoretical predictions. Fast and slow light pulse trains can be obtained by modifying the throughput port, which forms the gold grating length. The temporal gaps between the fast and slow light in the used graphene and gold are 140 and 168 fs, respectively, which can be tuned by varying the radius or grating length. The obtained results show that such a device may be useful in applications requiring fast and slow light pulse train pairs, such as optical switching, sensors, communications, and security applications.
Duc Nguyen, Tho; Sheng, Yugang; Rybicki, James E; Wohlgenannt, Markus
2008-01-01
We present magnetoconductivity and magnetoluminescence measurements in sandwich devices made from films of a π-conjugated molecule and demonstrate effects of more than 30 and 50% magnitude, respectively, in fields of 100 mT at room-temperature. It has previously been recognized that the effect is caused by hyperfine coupling, and that it is phenomenologically similar to other magnetic field effects that act on electron–hole pairs, which are well-known in spin-chemistry. However, we show that the very large magnitude of the effect contradicts present knowledge of the electron–hole pair recombination processes in electroluminescent π-conjugated molecules, and that the effect persists even in almost hole-only devices. Therefore, this effect is likely caused by the interaction of radical pairs of equal charge. PMID:27877957
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
12 CFR 208.61 - Bank security procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
...; the cost of the security devices; other security measures in effect at the banking office; and the... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Bank security procedures. 208.61 Section 208.61....61 Bank security procedures. (a) Authority, purpose, and scope. Pursuant to section 3 of the Bank...
NASA Technical Reports Server (NTRS)
Delgado, Felix A. (Inventor); Stern, Susan M. (Inventor)
1998-01-01
A contamination sample collection device has a wooden dowel with a cotton swab at one end, the cotton being covered by a nylon cloth and the wooden dowel being encapsulated by plastic tubing which is heat shrunk onto the dowel and onto a portion of the cotton swab to secure the cotton in place. Another plastic tube is heat shrunk onto the plastic that encapsulates the dowel and a portion of the nylon cloth to secure the nylon cloth in place. The device may thereafter be covered with aluminum foil protector. The device may be used for obtaining samples of contamination in clean room environments.
Induction logging device with a pair of mutually perpendicular bucking coils
Koelle, Alfred R.; Landt, Jeremy A.
1981-01-01
An instrument is disclosed for mapping vertical conductive fractures in a resistive bedrock, magnetically inducing eddy currents by a pair of vertically oriented, mutually perpendicular, coplanar coils. The eddy currents drive magnetic fields which are picked up by a second, similar pair of coils.
Envisaging quantum transport phenomenon in a muddled base pair of DNA
NASA Astrophysics Data System (ADS)
Vohra, Rajan; Sawhney, Ravinder Singh
2018-05-01
The effect of muddled base pair on electron transfer through a deoxyribonucleic acid (DNA) molecule connected to the gold electrodes has been elucidated using tight binding model. The effect of hydrogen and nitrogen bonds on the resistance of the base pair has been minutely observed. Using the semiempirical extended Huckel approach within NEGF regime, we have determined the current and conductance vs. bias voltage for disordered base pairs of DNA made of thymine (T) and adenine (A). The asymmetrical behaviour amid five times depreciation in the current characteristics has been observed for deviated Au-AT base pair-Au devices. An interesting revelation is that the conductance of the intrinsic AT base pair configuration attains dramatically high values with the symmetrical zig-zag pattern of current, which clearly indicates the transformation of the bond length within the strands of base pair when compared with other samples. A thorough investigation of the transmission coefficients T( E) and HOMO-LUMO gap reveals the misalignment of the strands in base pairs of DNA. The observed results present an insight to extend this work to build biosensing devices to predict the abnormality with the DNA.
Expanding the spectrum: 20 years of advances in MMW imagery
NASA Astrophysics Data System (ADS)
Martin, Christopher A.; Lovberg, John A.; Kolinko, Valdimir G.
2017-05-01
Millimeter-wave imaging has expanded from the single-pixel swept imagers developed in the 1960s to large field-ofview real-time systems in use today. Trex Enterprises has been developing millimeter-wave imagers since 1991 for aviation and security applications, as well as millimeter-wave communications devices. As MMIC device development was stretching into the MMW band in the 1990s, Trex developed novel imaging architectures to create 2-D staring systems with large pixel counts and no moving parts while using a minimal number of devices. Trex also contributed to the device development in amplifiers, switches, and detectors to enable the next generation of passive MMW imaging systems. The architectures and devices developed continue to be employed in security imagers, radar, and radios produced by Trex. This paper reviews the development of the initial real-time MMW imagers and associated devices by Trex Enterprises from the 1990s through the 2000s. The devices include W-band MMIC amplifiers, switches, and detector didoes, and MMW circuit boards and optical processors. The imaging systems discussed include two different real-time passive MMW imagers flown on helicopters and a MMW radar system, as well as implementation of the devices and architectures in simpler stand-off and gateway security imagers.
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.
2015-01-01
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227
Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J
2015-08-27
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.
Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F
2015-09-23
Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F
2015-01-01
Introduction Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. Methods and analysis A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethics and dissemination Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Trial registration number Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. PMID:26399574
Vincenzo, Jennifer L; Glenn, Jordan M; Gray, Stephanie M; Gray, Michelle
2016-08-01
Clinical functional assessments of balance often lack specificity and sensitivity in discriminating and predicting falls among community-dwelling older adults. We determined the feasibility of using a smart-device application measuring balance to discriminate fall status among older adults. We also evaluated differences between smart-device balance measurements when secured with or without a harness. A cross-sectional study design to determine the ability of the Sway Balance smart-device application (SWAY) to discriminate older adults based on fall history. The Berg Balance Scale (BBS) and Activities-Specific Balance Confidence Scale (ABC) were used as comparative, clinically based assessments. Community-dwelling older adults with (n = 25) and without (n = 32) a history of fall(s) participated. Multivariate analysis of variance was used to determine differences among assessments based on fall history. Logistic regression models determined the ability of each assessment to discriminate fall history. Older adults with and without a history of falls were not significantly different on SWAY (P = 0.92) but were different on BBS (P = 0.01), and ABC (P < 0.001). Similarly, SWAY did not discriminate fall history (P = 0.92), while BBS and ABC both discriminated fall history (P < 0.01). Paired t tests between SWAY scores with and without a harness indicated no differences (P ≥ 0.05). Among the older adults studied, the BBS and ABC measures discriminated groups defined by fall history, while the SWAY smart-device balance application did not. Modifications to the application may improve the discriminating ability of the measure in the recognition of fall status in older adults.
Key-value store with internal key-value storage interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.
A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less
NASA Astrophysics Data System (ADS)
Barati, Fatemeh; Grossnickle, Max; Su, Shanshan; Lake, Roger; Aji, Vivek; Gabor, Nathaniel
Two-dimensional heterostructures composed of atomically thin transition metal dichalcogenides provide the opportunity to design novel devices for the study of electron-hole pair multiplication. We report on highly efficient multiplication of interlayer electron-hole pairs at the interface of a tungsten diselenide / molybdenum diselenide heterostructure. Electronic transport measurements of the interlayer current-voltage characteristics indicate that layer-indirect electron-hole pairs are generated by hot electron impact excitation. Our findings, which demonstrate an efficient energy relaxation pathway that competes with electron thermalization losses, make 2D semiconductor heterostructures viable for a new class of hot-carrier energy harvesting devices that exploit layer-indirect electron-hole excitations. SHINES, an Energy Frontier Research Center funded by the U.S. Department of Energy, Air Force Office of Scientific Research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bues, M; Anand, A; Liu, W
2014-06-15
Purpose: We evaluated the effect of interposing immobilization devices into the beam's path on the robustness of a head and neck plan. Methods: An anthropomorphic head phantom was placed into a preliminary prototype of a specialized head and neck immobilization device for proton beam therapy. The device consists of a hard low density shell, a custom mold insert, and thermoplastic mask to immobilize the patient's head in the shell. This device was provided by CIVCO Medical Solutions for the purpose of evaluation of suitability for proton beam therapy. See Figure 1. Two pairs of treatment plans were generated. The firstmore » plan in each pair was a reference plan including only the anthropomorphic phantom, and the second plan in each pair included the immobilization device. In all other respects the plans within the pair were identical. Results: In the case of the simple plan the degradation of plan robustness was found to be clinically insignificant. In this case, target coverage in the worst case scenario was reduced from 95% of the target volume receiving 96.5% of prescription dose to 95% of the target volume receiving 96.3% of prescription dose by introducing the immobilization device. In the case of the complex plan, target coverage of the boost volume in the worst case scenario was reduced from 95% of the boost target volume receiving 97% of prescription dose to 95% of the boost target volume receiving 83% of prescription dose by introducing the immobilization device. See Figure 2. Conclusion: Immobilization devices may have a deleterious effect on plan robustness. Evaluation of the preliminary prototype revealed a variable impact on the plan robustness depending of the complexity of the case. Brian Morse is an employee of CIVCO Medical Solutions.« less
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv
2016-01-01
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.
Dai, Guangming
2016-01-01
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373
Code of Federal Regulations, 2012 CFR
2012-10-01
... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...
Code of Federal Regulations, 2013 CFR
2013-10-01
... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...
Code of Federal Regulations, 2014 CFR
2014-10-01
... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...
Binding of DNA hairpins to an assembler-strand as part of a primordial translation device
NASA Astrophysics Data System (ADS)
Baumann, Ulrich
1987-09-01
A crucial event in the process leading to the origin of life is the emergence of a simple translation device. To approach experimental realization of this device the binding ability of short DNA hairpins to complementary oligonucleotides fixed on a solid support was investigated. The binding is achieved by base pairing between the loop nucleotides of the hairpins containing different numbers of adenosine residues and oligothymidylates covalently linked to cellulose. The loop has to consist of at least five nucleotides to achieve binding. The exact number of established base pairs was determined in two ways. First, the elution temperatures of hairpins and those of oligoadenylates which had the length of the loop were compared. Secondly, the architecture of the loop was analyzed by means of the single-strand-specific nuclease from mung bean acting as structural probe. Onlyn-2 of n loop nucleotides of a hairpin are able to form base pairs. Therefore, a strong evidence for the formation of a triplet of base pairs between primeval tRNA and mRNA sufficient to stabilize the complex enzyme-free is given.
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
NASA Astrophysics Data System (ADS)
Takahashi, Junko; Fukunaga, Toshinori
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
Secure steganography designed for mobile platforms
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
2006-05-01
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
Near-space flight of a correlated photon system
Tang, Zhongkan; Chandrasekara, Rakhitha; Sean, Yau Yong; Cheng, Cliff; Wildfeuer, Christoph; Ling, Alexander
2014-01-01
We report the successful test flight of a device for generating and monitoring correlated photon pairs under near-space conditions up to 35.5 km altitude. Data from ground based qualification tests and the high altitude experiment demonstrate that the device continues to operate even under harsh environmental conditions. The design of the rugged, compact and power-efficient photon pair system is presented. This design enables autonomous photon pair systems to be deployed on low-resource platforms such as nanosatellites hosting remote nodes of a quantum key distribution network. These results pave the way for tests of entangled photon technology in low earth orbit. PMID:25219935
Designing Security-Hardened Microkernels For Field Devices
NASA Astrophysics Data System (ADS)
Hieb, Jeffrey; Graham, James
Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.
Female-directed violence as a form of sexual coercion in humans (Homo sapiens).
Barbaro, Nicole; Shackelford, Todd K
2016-11-01
Male-perpetrated female-directed violence (FDV) may be associated with greater sexual access to a female. Accordingly, FDV is expected to be associated with greater copulation frequency. Research on nonhuman primates affirms this hypothesis, but no previous research has investigated this relationship in humans (Homo sapiens). The current research tests the hypothesis that FDV is associated with in-pair copulation frequency and, thus, may function as a form of sexual coercion. It was predicted that men who perpetrate FDV will secure more in-pair copulations than men who do not perpetrate violence (Prediction 1a), and that average monthly rates of FDV would positively correlate with in-pair copulation frequency (Prediction 1b). Male participants (n = 355) completed a survey, reporting limited demographic information (e.g., age, relationship length), in-pair copulation frequency, and history of physical violence perpetration. As predicted, violent men secured more in-pair copulations, on average, than nonviolent men, and monthly rates of violence positively correlated with in-pair copulation frequency. In humans, as in nonhuman primates, FDV by males may facilitate greater sexual access to a female. We discuss the implications of the current research for an evolutionary perspective on partner violence, and draw on research on nonhuman primates to highlight profitable avenues of research on FDV in humans. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L... Secure Mobile Devices, --Panel Discussion on cyber R&D Strategy, and --Update of NIST Computer Security... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
Creation of backdoors in quantum communications via laser damage
NASA Astrophysics Data System (ADS)
Makarov, Vadim; Bourgoin, Jean-Philippe; Chaiwongkhot, Poompong; Gagné, Mathieu; Jennewein, Thomas; Kaiser, Sarah; Kashyap, Raman; Legré, Matthieu; Minshull, Carter; Sajeed, Shihan
2016-09-01
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.
Survey on Security Issues in File Management in Cloud Computing Environment
NASA Astrophysics Data System (ADS)
Gupta, Udit
2015-06-01
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Heat Conduction Analysis of Randomly Dispersed Single-Walled Carbon Nanotubes
2007-06-01
Tersoff-Brenner Potential , Lennard Jones Potential 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...25 Table 3. Lennard - Jones Potential Results for (6, 6) SWNT...various relative 5 positions using the Lennard - Jones pair potential for van der Waals interaction between adjacent SWNTs. Finally, using the data
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Towards Device-Independent Information Processing on General Quantum Networks
NASA Astrophysics Data System (ADS)
Lee, Ciarán M.; Hoban, Matty J.
2018-01-01
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
Towards Device-Independent Information Processing on General Quantum Networks.
Lee, Ciarán M; Hoban, Matty J
2018-01-12
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
Rodrigues, Roberta R; Cheema, Hammad; Delcamp, Jared H
2018-05-04
The development of high voltage solar cells is an attractive way to use sunlight for solar-to-fuel devices, multijunction solar-to-electric systems, and to power limited-area consumer electronics. By designing a low-oxidation-potential organic dye (RR9)/redox shuttle (Fe(bpy) 3 3+/2+ ) pair for dye-sensitized solar-cell (DSSC) devices, the highest single device photovoltage (1.42 V) has been realized for a DSSC not relying on doped TiO 2 . Additionally, Fe(bpy) 3 3+/2+ offers a robust, readily tunable ligand platform for redox potential tuning. RR9 can be regenerated with a low driving force (190 mV), and by utilizing the RR9/Fe(bpy) 3 3+/2+ redox shuttle pair in a subcell for a sequential series multijunction (SSM)-DSSC system, one of the highest known three subcell photovoltage was attained for any solar-cell technology (3.34 V, >1.0 V per subcell). © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
van Schooten, Kipp J.; Baird, Douglas L.; Limes, Mark E.; Lupton, John M.; Boehme, Christoph
2015-01-01
Weakly coupled electron spin pairs that experience weak spin–orbit interaction can control electronic transitions in molecular and solid-state systems. Known to determine radical pair reactions, they have been invoked to explain phenomena ranging from avian magnetoreception to spin-dependent charge-carrier recombination and transport. Spin pairs exhibit persistent spin coherence, allowing minute magnetic fields to perturb spin precession and thus recombination rates and photoreaction yields, giving rise to a range of magneto-optoelectronic effects in devices. Little is known, however, about interparticle magnetic interactions within such pairs. Here we present pulsed electrically detected electron spin resonance experiments on poly(styrene-sulfonate)-doped poly(3,4-ethylenedioxythiophene) (PEDOT:PSS) devices, which show how interparticle spin–spin interactions (magnetic-dipolar and spin-exchange) between charge-carrier spin pairs can be probed through the detuning of spin-Rabi oscillations. The deviation from uncoupled precession frequencies quantifies both the exchange (<30 neV) and dipolar (23.5±1.5 neV) interaction energies responsible for the pair's zero-field splitting, implying quantum mechanical entanglement of charge-carrier spins over distances of 2.1±0.1 nm. PMID:25868686
Quantum tagging for tags containing secret classical data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian
Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less
NASA Technical Reports Server (NTRS)
Economu, M. A. (Inventor)
1978-01-01
An insulation stripper is described which is especially useful for shielded wire, the stripper including a first pair of jaws with blades extending substantially perpendicular to the axis of the wire, and a second pair of jaws with blades extending substantially parallel to the axis of the wire. The first pair of jaws is pressed against the wire so the blades cut into the insulation, and the device is turned to form circumferential cuts in the insulation. Then the second pair of jaws is pressed against the wire so the blades cut into the insulation, and the wire is moved through the device to form longitudinal cuts that permit easy removal of the insulation. Each of the blades is located within the concave face of a V-block, to center the blades on the wire and to limit the depth of blade penetration.
Effect of total shoulder replacements on airport security screening in the post-9/11 era.
Dines, Joshua S; Elkousy, Hussein; Edwards, T Bradley; Gartsman, Gary M; Dines, David M
2007-01-01
There are few reports in the literature on the effect of orthopaedic implants on airport security devices and none on shoulder arthroplasty implants after September 11, 2001. Since 9/11, airport security screening devices have become more sensitive in response to the increasing threat of terrorism. Often, patients with joint implants activate the metal detectors and are subsequently subjected to more intensive screening. We assess the effects of shoulder joint implants on different airport security devices and what effect the results had on passenger travel. In this study, 154 patients who had previously undergone shoulder replacement responded to a questionnaire regarding their travel experiences after 9/11. Of these, 85 had flown during the time period studied (47 men and 38 women; mean age, 67.8 years); 79 had traveled domestically (mean, 7 flights), and 22 had taken international flights (mean, 6.1 flights). The questionnaire addressed each patient's height/weight, the number of flight segments flown (domestic and international), the number of times that a patient activated the doorway alarm/wand alarm, and the effect of a card stating that the patient had joint replacement (when applicable). On average, patients with shoulder replacement traveling domestically activated the security gate 52% of the time. The average for international travel was 42%. Of the patients who flew both domestically and internationally, there was a high correlation of activation (R = 0.54). Twenty-six patients had multiple joint implants (mean, 2.8). Multiple joint implants caused increased alarm activation (P < .001). All patients reported that their travel was delayed during the instances of security activation. There was no statistically significant effect of body mass index, height, weight, age, or sex on security device activation. Of the patients, 71% were told by their doctor that the shoulder replacement may activate security devices. Of these, 46 were given a card by their doctor indicating the presence of a total joint implant. In only 30% of the security encounters of these patients did the card expedite the screening process. This is the largest study on the effects of joint implants, and shoulder implants in particular, on airport security devices and the only one that has analyzed the data of post-9/11 travel. Patients traveling after total shoulder replacement are often delayed and subjected to more rigorous screening when traveling, especially in the post-9/11 environment. Doctors often warn their patients of potential problems and may try to avert this by giving them cards documenting the presence of a joint implant. The acceptance of these cards is sporadic. This study raises the importance of notifying patients of potential security delays, especially those with multiple joint implants, as they may directly affect travel plans. In addition, these patients may benefit from the establishment of an international joint registry.
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
Generation of Single Photons and Entangled Photon Pairs from a Quantum Dot
NASA Astrophysics Data System (ADS)
Yamamoto, Y.; Pelton, M.; Santori, C.; Solomon, G. S.
2002-10-01
Current quantum cryptography systems are limited by the Poissonian photon statistics of a standard light source: a security loophole is opened up by the possibility of multiple-photon pulses. By replacing the source with a single-photon emitter, transmission rates of secure information can be improved. A single photon source is also essential to implement a linear optics quantum computer. We have investigated the use of single self-assembled InAs/GaAs quantum dots as such single-photon sources, and have seen a hundred-fold reduction in the multi-photon probability as compared to Poissonian pulses. An extension of our experiment should also allow for the generation of triggered, polarizationentangled photon pairs.
Center for Coastline Security Technology, Year 3
2008-05-01
Polarization control for 3D Imaging with the Sony SRX-R105 Digital Cinema Projectors 3.4 HDMAX Camera and Sony SRX-R105 Projector Configuration for 3D...HDMAX Camera Pair Figure 3.2 Sony SRX-R105 Digital Cinema Projector Figure 3.3 Effect of camera rotation on projected overlay image. Figure 3.4...system that combines a pair of FAU’s HD-MAX video cameras with a pair of Sony SRX-R105 digital cinema projectors for stereo imaging and projection
A Review of the Security of Insulin Pump Infusion Systems
Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C
2011-01-01
Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues. PMID:22226278
A review of the security of insulin pump infusion systems.
Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C
2011-11-01
Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues. © 2011 Diabetes Technology Society.
Analysis of Security Protocols for Mobile Healthcare.
Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga
2016-11-01
Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.
Fougère, S; Beydon, L; Saulnier, F
2008-10-01
Medical devices are known to carry risks from design to scrap. Accident reports in ICU show that medical device account for only 20% of accidents. Formation of users and providing a postmarketing incident reporting are thus essential in health institutions. Clinical and engineering departments should cooperate to produce and secure procedures which should be applied during the lifetime of each clinical device. Several points should be especially fulfilled: close cooperation between clinical departments and biomedical engineering departments with available technicians, computer-based inventory of all devices, evaluation of specifications required before purchasing a new device, education of users on utilisation and maintenance, technical follow-up of devices and keeping maintenance and repair logs, ability to provide users with replacement devices, provision of check-lists before use, forging criteria to decide when device should be discarded. These principles are simple and should be considered as mandatory in order to improve medical device related security.
Detector-device-independent quantum key distribution: Security analysis and fast implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less
Detector-device-independent quantum key distribution: Security analysis and fast implementation
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...
2016-08-09
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less
Security of BB84 with weak randomness and imperfect qubit encoding
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Fang, Xi; Han, Zheng-Fu; Huang, Wei
2018-03-01
The main threats for the well-known Bennett-Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
2012-12-01
of MARSEC 2 13 Causing a fire or explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device...or explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device without port approval X X X X X X...explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device without port approval X X X X X X X Non
Fluid-driven reciprocating apparatus and valving for controlling same
Whitehead, John C.; Toews, Hans G.
1993-01-01
A control valve assembly for alternately actuating a pair of fluid-driven free-piston devices by using fluid pressure communication therebetween. Each control valve is switched by a pressure signal depending on the state of its counterpart's piston. The communication logic is arranged to provide overlap of the forward strokes of the pistons, so that at least one of the pair will always be pressurized. Thus, uninterrupted pumping of liquid is made possible from a pair of free-piston pumps. In addition, the speed and frequency of piston stroking is entirely dependent on the mechanical power load applied. In the case of a pair of pumps, this enables liquid delivery at a substantially constant pressure over the full range of flow rates, from zero to maximum flow. One embodiment of the invention utilized two pairs of fluid-driven free-piston devices whereby a bipropellant liquid propulsion system may be operated, so as to provide continuous flow of both fuel and oxidizer liquids when used in rocket applications, for example.
Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions
NASA Astrophysics Data System (ADS)
Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.
2016-05-01
The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.
Wallace, Matthew C; Britton, SSgt Tyler; Meek, Robbie; Walsh-Hart, Sharon; Carter, Col Todd E; Lisco, Steven J
2017-01-01
The critically ill or injured patient undergoing military medical evacuation may require emergent intubation. Intubation may be life-saving, but it carries risks. The novice or infrequent laryngoscopist has a distinct disadvantage because experience is critical for the rapid and safe establishment of a secured airway. This challenge is compounded by the austere environment of the back of an aircraft under blackout conditions. This study determined which of five different video-assisted intubation devices (VAIDs) was best suited for in-flight use by U.S. Air Force Critical Care Air Transport Teams by comparing time to successful intubation between novice and expert laryngoscopists under three conditions, Normal Airway Lights on (NAL), Difficult Airway Lights on (DAL) and Difficult Airway Blackout (DAB), using manikins on a standard military transport stanchion and the floor with a minimal amount of setup time and extraneous light emission. A convenience sample size of 40 participants (24 novices and 16 experts) attempted intubation with each of the 5 different video laryngoscopic devices on high-fidelity airway manikins. Time to tracheal intubation and number of optimization maneuvers used were recorded. Kruskal-Wallis testing determined significant differences between the VAIDs in time to intubation for each particular scenario. Devices with significant differences underwent pair-wise comparison testing using rank-sum analysis to further clarify the difference. Device assembly times, startup times and the amount of light emitted were recorded. Perceived ease of use was surveyed. Novices were fastest with the Pentax AWS in all difficult airway scenarios. Experts recorded the shortest median times consistently using 3 of the 5 devices. The AWS was superior overall in 4 of the 6 scenarios tested. Experts and novices subjectively judged the GlideScope Ranger as easiest to use. The light emitted by all the devices was less than the USAF-issued headlamp. Novices intubated fastest with the Pentax AWS in all difficult airway scenarios. The GlideScope required the shortest setup time, and participants judged this device as the easiest to use. The GlideScope and AWS exhibited the two fastest total setup times. Both devices are suitable for in-flight use by infrequent and seasoned laryngoscopists.
Dual drain MOSFET detector for crosstie memory systems
NASA Astrophysics Data System (ADS)
Bluzer, N.
1985-03-01
This patent application, which discloses a circuit for detecting binary information in crosstie memory systems includes a dual drain MOSFET device having a single channel with a common source and an integrated, thin-film strip of magnetic material suitable for the storage and propagation of Bloch line-crosstie pairs acting as both a shift register and the device's gate. Current flowing through the device, in the absence of a magnetic field, is equally distributed to each drain; however, changing magnetic fields, normal to the plane of the device and generated by Bloch line-crosstie pairs in the strip, interact with the current such that a distribution imbalance exists and one drain or the other receives a disproportionate fraction of the current depending upon the direction of the magnetic field.
Collimator with attachment mechanism and system
Kross, Brian J [Yorktown, VA; McKisson, John [Hampton, VA; Stolin, Aleksandr [Morgantown, WV; Weisenberger, Andrew G [Yorktown, VA; Zorn, Carl [Yorktown, VA
2012-07-10
A self-aligning collimator for a radiation imaging device that is secured and aligned through the use of a plurality of small magnets. The collimator allows for the rapid exchange, removal, or addition of collimators for the radiation imaging device without the need for tools. The accompanying method discloses the use of magnets and accompanying magnetic fields to align and secure collimators in a radiation imaging assembly.
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. PMID:25202737
Time pattern locking scheme for secure multimedia contents in human-centric device.
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.
Gate drive latching circuit for an auxiliary resonant commutation circuit
NASA Technical Reports Server (NTRS)
Delgado, Eladio Clemente (Inventor); Kheraluwala, Mustansir Hussainy (Inventor)
1999-01-01
A gate drive latching circuit for an auxiliary resonant commutation circuit for a power switching inverter includes a current monitor circuit providing a current signal to a pair of analog comparators to implement latching of one of a pair of auxiliary switching devices which are used to provide commutation current for commutating switching inverters in the circuit. Each of the pair of comparators feeds a latching circuit which responds to an active one of the comparators for latching the associated gate drive circuit for one of the pair of auxiliary commutating switches. An initial firing signal is applied to each of the commutating switches to gate each into conduction and the resulting current is monitored to determine current direction and therefore the one of the switches which is carrying current. The comparator provides a latching signal to the one of the auxiliary power switches which is actually conducting current and latches that particular power switch into an on state for the duration of current through the device. The latching circuit is so designed that the only time one of the auxiliary switching devices can be latched on is during the duration of an initial firing command signal.
Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara
2003-08-29
The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.
Secure Infrastructure-Less Network (SINET)
2017-06-01
Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the
DOT National Transportation Integrated Search
2010-03-17
The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...
Multiprocessor switch with selective pairing
Gara, Alan; Gschwind, Michael K; Salapura, Valentina
2014-03-11
System, method and computer program product for a multiprocessing system to offer selective pairing of processor cores for increased processing reliability. A selective pairing facility is provided that selectively connects, i.e., pairs, multiple microprocessor or processor cores to provide one highly reliable thread (or thread group). Each paired microprocessor or processor cores that provide one highly reliable thread for high-reliability connect with a system components such as a memory "nest" (or memory hierarchy), an optional system controller, and optional interrupt controller, optional I/O or peripheral devices, etc. The memory nest is attached to a selective pairing facility via a switch or a bus
You mob my owl, I'll mob yours: birds play tit-for-tat game.
Krama, Tatjana; Vrublevska, Jolanta; Freeberg, Todd M; Kullberg, Cecilia; Rantala, Markus J; Krams, Indrikis
2012-01-01
Reciprocity is fundamental to cooperative behaviour and has been verified in theoretical models. However, there is still limited experimental evidence for reciprocity in non-primate species. Our results more decisively clarify that reciprocity with a tit-for-tat enforcement strategy can occur among breeding pied flycatchers Ficedula hypoleuca separate from considerations of byproduct mutualism. Breeding pairs living in close proximity (20-24 m) did exhibit byproduct mutualism and always assisted in mobbing regardless of their neighbours' prior actions. However, breeding pairs with distant neighbours (69-84 m) either assisted or refused to assist in mobbing a predatory owl based on whether or not the distant pair had previously helped them in their own nest defense against the predator. Clearly, these birds are aware of their specific spatial security context, remember their neighbours' prior behaviour, and choose a situation-specific strategic course of action, which could promote their longer-term security, a capacity previously thought unique to primates.
You mob my owl, I'll mob yours: birds play tit-for-tat game
Krama, Tatjana; Vrublevska, Jolanta; Freeberg, Todd M.; Kullberg, Cecilia; Rantala, Markus J.; Krams, Indrikis
2012-01-01
Reciprocity is fundamental to cooperative behaviour and has been verified in theoretical models. However, there is still limited experimental evidence for reciprocity in non-primate species. Our results more decisively clarify that reciprocity with a tit-for-tat enforcement strategy can occur among breeding pied flycatchers Ficedula hypoleuca separate from considerations of byproduct mutualism. Breeding pairs living in close proximity (20–24 m) did exhibit byproduct mutualism and always assisted in mobbing regardless of their neighbours' prior actions. However, breeding pairs with distant neighbours (69–84 m) either assisted or refused to assist in mobbing a predatory owl based on whether or not the distant pair had previously helped them in their own nest defense against the predator. Clearly, these birds are aware of their specific spatial security context, remember their neighbours' prior behaviour, and choose a situation-specific strategic course of action, which could promote their longer-term security, a capacity previously thought unique to primates. PMID:23150772
NASA Astrophysics Data System (ADS)
Cabral, Alexandre; Rebordão, José M.
2011-05-01
In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
12 CFR 555.210 - What precautions must I take?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Implement security measures designed to ensure secure operations. Such measures must be adequate to: (1) Prevent unauthorized access to your records and your customers' records; (2) Prevent financial fraud through the use of electronic means or facilities; and (3) Comply with applicable security devices...
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao
2010-11-01
Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.
Terahertz detectors and focal plane arrays
NASA Astrophysics Data System (ADS)
Rogalski, A.; Sizov, F.
2011-09-01
Terahertz (THz) technology is one of emerging technologies that will change our life. A lot of attractive applications in security, medicine, biology, astronomy, and non-destructive materials testing have been demonstrated already. However, the realization of THz emitters and receivers is a challenge because the frequencies are too high for conventional electronics and the photon energies are too small for classical optics. As a result, THz radiation is resistant to the techniques commonly employed in these well established neighbouring bands. In the paper, issues associated with the development and exploitation of THz radiation detectors and focal plane arrays are discussed. Historical impressive progress in THz detector sensitivity in a period of more than half century is analyzed. More attention is put on the basic physical phenomena and the recent progress in both direct and heterodyne detectors. After short description of general classification of THz detectors, more details concern Schottky barrier diodes, pair braking detectors, hot electron mixers and field-effect transistor detectors, where links between THz devices and modern technologies such as micromachining are underlined. Also, the operational conditions of THz detectors and their upper performance limits are reviewed. Finally, recent advances in novel nanoelectronic materials and technologies are described. It is expected that applications of nanoscale materials and devices will open the door for further performance improvement in THz detectors.
EMP Threats to US National Security: Congressional Responses
NASA Astrophysics Data System (ADS)
Huessy, Peter
2011-04-01
The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.
Programmable electroacoustic filter apparatus and method for its manufacture
Nordquist, Christopher; Olsson, Roy H.; Scott, Sean Michael; Wojciechowski, Kenneth; Branch, Darren W.
2016-03-01
An acoustically coupled frequency selective radio frequency (RF) device is provided. The device includes a piezoelectric substrate overlain by a plurality of electrodes. The device further includes a pair of RF input terminals at least one of which is electrically connected to at least one of the electrodes, and a pair of output RF terminals, at least one of which is electrically connected to at least one other of the electrodes. At least one of the electrodes is electromechanically reconfigurable between a state in which it is closer to a face of the piezoelectric substrate and at least one state in which it is farther from the face of the piezoelectric substrate.
Launch Lock Assemblies with Reduced Preload and Spacecraft Isolation Systems Including the Same
NASA Technical Reports Server (NTRS)
Barber, Tim Daniel (Inventor); Young, Ken (Inventor); Hindle, Timothy (Inventor)
2016-01-01
Launch lock assemblies with reduced preload are provided. The launch lock assembly comprises first and second mount pieces, a releasable clamp device, and a pair of retracting assemblies. Each retracting assembly comprises a pair of toothed members having interacting toothed surfaces. The releasable clamp device normally maintains the first and second mount pieces in clamped engagement. When the releasable clamp device is actuated, the first and second mount pieces are released from clamped engagement and one toothed member of each retracting assembly moves in an opposite direction relative to the other one toothed member of the other retracting assembly to define an axial gap on each side of the first mount piece.
Rewritable ferroelectric vortex pairs in BiFeO3
NASA Astrophysics Data System (ADS)
Li, Yang; Jin, Yaming; Lu, Xiaomei; Yang, Jan-Chi; Chu, Ying-Hao; Huang, Fengzhen; Zhu, Jinsong; Cheong, Sang-Wook
2017-08-01
Ferroelectric vortex in multiferroic materials has been considered as a promising alternative to current memory cells for the merit of high storage density. However, the formation of regular natural ferroelectric vortex is difficult, restricting the achievement of vortex memory device. Here, we demonstrated the creation of ferroelectric vortex-antivortex pairs in BiFeO3 thin films by using local electric field. The evolution of the polar vortex structure is studied by piezoresponse force microscopy at nanoscale. The results reveal that the patterns and stability of vortex structures are sensitive to the poling position. Consecutive writing and erasing processes cause no influence on the original domain configuration. The Z4 proper coloring vortex-antivortex network is then analyzed by graph theory, which verifies the rationality of artificial vortex-antivortex pairs. This study paves a foundation for artificial regulation of vortex, which provides a possible pathway for the design and realization of non-volatile vortex memory devices and logical devices.
Prediction of Spin-Polarization Effects in Quantum Wire Transport
NASA Astrophysics Data System (ADS)
Fasol, Gerhard; Sakaki, Hiroyuki
1994-01-01
We predict a new effect for transport in quantum wires: spontaneous spin polarization. Most work on transport in mesoscopic devices has assumed a model of non interacting, spin-free electrons. We introduce spin, electron pair scattering and microscopic crystal properties into the design of mesoscopic devices. The new spin polarization effect results from the fact that in a single mode quantum wire, electron and hole bands still have two spin subbands. In general, these two spin subbands are expected to be split even in zero magnetic field. At sufficiently low temperatures the electron pair scattering rates for one spin subband ( e.g., the spin-down) can be much larger than for the other spin subband. This effect can be used for an active spin polarizer device: hot electrons in one subband ( e.g., `spin up') pass with weak pair scattering, while electrons in the opposite subband ( e.g., `spin down'), have high probability of scattering into the `spin-up' subband, resulting in spin polarization of a hot electron beam.
Long-range coupling of electron-hole pairs in spatially separated organic donor-acceptor layers
Nakanotani, Hajime; Furukawa, Taro; Morimoto, Kei; Adachi, Chihaya
2016-01-01
Understanding exciton behavior in organic semiconductor molecules is crucial for the development of organic semiconductor-based excitonic devices such as organic light-emitting diodes and organic solar cells, and the tightly bound electron-hole pair forming an exciton is normally assumed to be localized on an organic semiconducting molecule. We report the observation of long-range coupling of electron-hole pairs in spatially separated electron-donating and electron-accepting molecules across a 10-nanometers-thick spacer layer. We found that the exciton energy can be tuned over 100 megaelectron volts and the fraction of delayed fluorescence can be increased by adjusting the spacer-layer thickness. Furthermore, increasing the spacer-layer thickness produced an organic light-emitting diode with an electroluminescence efficiency nearly eight times higher than that of a device without a spacer layer. Our results demonstrate the first example of a long-range coupled charge-transfer state between electron-donating and electron-accepting molecules in a working device. PMID:26933691
Secure entanglement distillation for double-server blind quantum computation.
Morimae, Tomoyuki; Fujii, Keisuke
2013-07-12
Blind quantum computation is a new secure quantum computing protocol where a client, who does not have enough quantum technologies at her disposal, can delegate her quantum computation to a server, who has a fully fledged quantum computer, in such a way that the server cannot learn anything about the client's input, output, and program. If the client interacts with only a single server, the client has to have some minimum quantum power, such as the ability of emitting randomly rotated single-qubit states or the ability of measuring states. If the client interacts with two servers who share Bell pairs but cannot communicate with each other, the client can be completely classical. For such a double-server scheme, two servers have to share clean Bell pairs, and therefore the entanglement distillation is necessary in a realistic noisy environment. In this Letter, we show that it is possible to perform entanglement distillation in the double-server scheme without degrading the security of blind quantum computing.
A quantum optical firewall based on simple quantum devices
NASA Astrophysics Data System (ADS)
Amellal, H.; Meslouhi, A.; Hassouni, Y.; El Baz, M.
2015-07-01
In order to enhance the transmission security in quantum communications via coherent states, we propose a quantum optical firewall device to protect a quantum cryptosystem against eavesdropping through optical attack strategies. Similar to the classical model of the firewall, the proposed device gives legitimate users the possibility of filtering, controlling (input/output states) and making a decision (access or deny) concerning the traveling states. To prove the security and efficiency of the suggested optical firewall, we analyze its performances against the family of intercept and resend attacks, especially against one of the most prominent attack schemes known as "Faked State Attack."
Koelle, A.R.; Landt, J.A.
An instrument is disclosed for mapping vertical conductive fractures in a resistive bedrock, magnetically inducing eddy currents by a pair of vertically oriented, mutually perpendicular, coplanar coils. The eddy currents drive magnetic fields which are picked up by a second, similar pair of coils.
NASA Technical Reports Server (NTRS)
Gardner, W. C.
1973-01-01
Connector pair consists of two iron cores brought together a short distance from each other. Each core is wound with insulated wire. Ac signal is connected through the pair across the gap by magnetic induction. Device can be used underwater or in flammable atmosphere.
ERIC Educational Resources Information Center
Kim, Eun Sil; Kim, Byeong Seok
2009-01-01
The purpose of this study was to explore how social support, mother's psychological status, and maternal sensitivity affected attachment security in children with disabilities by using the structural equation model (SEM). Subjects were 141 pairs of children with disabilities and theirs mothers. Empirical data was obtained through a series of…
van Schooten, Kipp J.; Baird, Douglas L.; Limes, Mark E.; ...
2015-04-14
Here, weakly coupled electron spin pairs that experience weak spin–orbit interaction can control electronic transitions in molecular and solid-state systems. Known to determine radical pair reactions, they have been invoked to explain phenomena ranging from avian magnetoreception to spin-dependent charge-carrier recombination and transport. Spin pairs exhibit persistent spin coherence, allowing minute magnetic fields to perturb spin precession and thus recombination rates and photoreaction yields, giving rise to a range of magneto-optoelectronic effects in devices. Little is known, however, about interparticle magnetic interactions within such pairs. Here we present pulsed electrically detected electron spin resonance experiments on poly(styrene-sulfonate)-doped poly(3,4-ethylenedioxythiophene) (PEDOT:PSS) devices,more » which show how interparticle spin–spin interactions (magnetic-dipolar and spin-exchange) between charge-carrier spin pairs can be probed through the detuning of spin-Rabi oscillations. The deviation from uncoupled precession frequencies quantifies both the exchange (<30 neV) and dipolar (23.5±1.5 neV) interaction energies responsible for the pair’s zero-field splitting, implying quantum mechanical entanglement of charge-carrier spins over distances of 2.1±0.1 nm.« less
How To Keep Your Schools Safe and Secure.
ERIC Educational Resources Information Center
Gilbert, Christopher B.
1996-01-01
Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…
46 CFR 111.40-15 - Overcurrent device.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Overcurrent device. 111.40-15 Section 111.40-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-15 Overcurrent device. The total load on any overcurrent device located in a...
46 CFR 111.40-15 - Overcurrent device.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Overcurrent device. 111.40-15 Section 111.40-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-15 Overcurrent device. The total load on any overcurrent device located in a...
46 CFR 111.40-15 - Overcurrent device.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Overcurrent device. 111.40-15 Section 111.40-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-15 Overcurrent device. The total load on any overcurrent device located in a...
46 CFR 111.40-15 - Overcurrent device.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Overcurrent device. 111.40-15 Section 111.40-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-15 Overcurrent device. The total load on any overcurrent device located in a...
46 CFR 111.40-15 - Overcurrent device.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Overcurrent device. 111.40-15 Section 111.40-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-15 Overcurrent device. The total load on any overcurrent device located in a...
Device for imaging scenes with very large ranges of intensity
Deason, Vance Albert [Idaho Falls, ID
2011-11-15
A device for imaging scenes with a very large range of intensity having a pair of polarizers, a primary lens, an attenuating mask, and an imaging device optically connected along an optical axis. Preferably, a secondary lens, positioned between the attenuating mask and the imaging device is used to focus light on the imaging device. The angle between the first polarization direction and the second polarization direction is adjustable.
Bahrain: Reform, Security, and U.S. Policy
2017-09-29
responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one
Security of six-state quantum key distribution protocol with threshold detectors
Kato, Go; Tamaki, Kiyoshi
2016-01-01
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610
33 CFR 104.210 - Company Security Officer (CSO).
Code of Federal Regulations, 2011 CFR
2011-07-01
... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (xi...
33 CFR 104.210 - Company Security Officer (CSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (xi...
A Secure Framework for Location Verification in Pervasive Computing
NASA Astrophysics Data System (ADS)
Liu, Dawei; Lee, Moon-Chuen; Wu, Dan
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
Detector-device-independent quantum key distribution: Security analysis and fast implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boaron, Alberto; Korzh, Boris; Boso, Gianluca
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
Encryption Characteristics of Two USB-based Personal Health Record Devices
Wright, Adam; Sittig, Dean F.
2007-01-01
Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a Microsoft Access database. Due to a flaw in the encryption of this database, recovering the user’s password can be accomplished with minimal effort. Our analysis also showed that, rather than encrypting health information with the password chosen by the user, the devices stored the user’s password as a string in the database and then encrypted that database with a common password set by the manufacturer. This is another serious vulnerability. This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices. PMID:17460132
Neurosecurity: security and privacy for neural devices.
Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi
2009-07-01
An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.
Design Methodology for Automated Construction Machines
1987-12-11
along with the design of a pair of machines which automate framework installation.-,, 20. DISTRIBUTION IAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY... Development Assistant Professor of Civil Engineering and Laura A . Demsetz, David H. Levy, Bruce Schena Graduate Research Assistants December 11, 1987 U.S...are discussed along with the design of a pair of machines which automate framework installation. Preliminary analysis and testing indicate that these
Best Practices for the Security of Radioactive Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less
Topouchian, Jirar A; El Assaad, Mohamed A; Orobinskaia, Ludmila V; El Feghali, Ramzi N; Asmar, Roland G
2006-06-01
Two electronic devices for self-measurement of blood pressure - a brachial monitor, the Omron M6, and a wrist monitor, the Omron R7 - were evaluated in two separate studies according to the International Protocol of the European Society of Hypertension. The International Validation Protocol is divided into two phases: the first phase is performed on 15 selected participants (45 pairs of blood pressure measurements); if the device passes this phase, 18 supplementary participants are included (54 pairs of blood pressure measurements) making a total number of 33 participants (99 pairs of blood pressure measurements) on whom the final validation is performed. The same methodology recommended by the European Society of Hypertension protocol was applied for both studies. In each study and for each participant, four blood pressure measurements were taken simultaneously by two trained observers using mercury sphygmomanometers alternately with three measurements taken by the tested device. The difference between the blood pressure value given by the device and that obtained by the two observers (mean of the two observers) was calculated for each measure. The 99 pairs of blood pressure differences were classified into three categories (
33 CFR 106.220 - Security training for all other OCS facility personnel.
Code of Federal Regulations, 2011 CFR
2011-07-01
... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...
33 CFR 106.220 - Security training for all other OCS facility personnel.
Code of Federal Regulations, 2010 CFR
2010-07-01
... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...
Development of a Secure Mobile GPS Tracking and Management System
ERIC Educational Resources Information Center
Liu, Anyi
2012-01-01
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Computer Security Primer: Systems Architecture, Special Ontology and Cloud Virtual Machines
ERIC Educational Resources Information Center
Waguespack, Leslie J.
2014-01-01
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
NASA Astrophysics Data System (ADS)
Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.
2015-05-01
It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.
The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.
Busdicker, Mike; Upendra, Priyanka
2017-09-02
This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.
Information Security due to Electromagnetic Environments
NASA Astrophysics Data System (ADS)
Sekiguchi, Hidenori; Seto, Shinji
Generally, active electronic devices emit slightly unintentional electromagnetic noise. From long ago, electromagnetic emission levels have been regulated from the aspect of electromagnetic compatibility (EMC). Also, it has been known the electromagnetic emissions have been generated from the ON/OFF of signals in the device. Recently, it becomes a topic of conversation on the information security that the ON/OFF on a desired signal in the device can be reproduced or guessed by receiving the electromagnetic emission. For an example, a display image on a personal computer (PC) can be reconstructed by receiving and analyzing the electromagnetic emission. In sum, this fact makes known information leakage due to electromagnetic emission. “TEMPEST" that has been known as a code name originated in the U. S. Department of Defense is to prevent the information leakage caused by electromagnetic emissions. This paper reports the brief summary of the information security due to electromagnetic emissions from information technology equipments.
Smart Cards and remote entrusting
NASA Astrophysics Data System (ADS)
Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad
Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.
Quantum Secure Conditional Direct Communication via EPR Pairs
NASA Astrophysics Data System (ADS)
Gao, Ting; Yan, Fengli; Wang, Zhixi
Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.
A quantum light-emitting diode for the standard telecom window around 1,550 nm.
Müller, T; Skiba-Szymanska, J; Krysa, A B; Huwer, J; Felle, M; Anderson, M; Stevenson, R M; Heffernan, J; Ritchie, D A; Shields, A J
2018-02-28
Single photons and entangled photon pairs are a key resource of many quantum secure communication and quantum computation protocols, and non-Poissonian sources emitting in the low-loss wavelength region around 1,550 nm are essential for the development of fibre-based quantum network infrastructure. However, reaching this wavelength window has been challenging for semiconductor-based quantum light sources. Here we show that quantum dot devices based on indium phosphide are capable of electrically injected single photon emission in this wavelength region. Using the biexciton cascade mechanism, they also produce entangled photons with a fidelity of 87 ± 4%, sufficient for the application of one-way error correction protocols. The material system further allows for entangled photon generation up to an operating temperature of 93 K. Our quantum photon source can be directly integrated with existing long distance quantum communication and cryptography systems, and provides a promising material platform for developing future quantum network hardware.
No-cloning of quantum steering
NASA Astrophysics Data System (ADS)
Chiu, Ching-Yi; Lambert, Neill; Liao, Teh-Lu; Nori, Franco; Li, Che-Ming
2016-06-01
Einstein-Podolsky-Rosen (EPR) steering allows two parties to verify their entanglement, even if one party’s measurements are untrusted. This concept has not only provided new insights into the nature of non-local spatial correlations in quantum mechanics, but also serves as a resource for one-sided device-independent quantum information tasks. Here, we investigate how EPR steering behaves when one-half of a maximally entangled pair of qudits (multidimensional quantum systems) is cloned by a universal cloning machine. We find that EPR steering, as verified by a criterion based on the mutual information between qudits, can only be found in one of the copy subsystems but not both. We prove that this is also true for the single-system analogue of EPR steering. We find that this restriction, which we term ‘no-cloning of quantum steering’, elucidates the physical reason why steering can be used to secure sources and channels against cloning-based attacks when implementing quantum communication and quantum computation protocols.
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
...: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely...
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
...: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely...
Measurement-Device-Independent Quantum Cryptography
NASA Astrophysics Data System (ADS)
Tang, Zhiyuan
Quantum key distribution (QKD) enables two legitimate parties to share a secret key even in the presence of an eavesdropper. The unconditional security of QKD is based on the fundamental laws of quantum physics. Original security proofs of QKD are based on a few assumptions, e.g., perfect single photon sources and perfect single-photon detectors. However, practical implementations of QKD systems do not fully comply with such assumptions due to technical limitations. The gap between theory and implementations leads to security loopholes in most QKD systems, and several attacks have been launched on sophisticated QKD systems. Particularly, the detectors have been found to be the most vulnerable part of QKD. Much effort has been put to build side-channel-free QKD systems. Solutions such as security patches and device-independent QKD have been proposed. However, the former are normally ad-hoc, and cannot close unidentified loopholes. The latter, while having the advantages of removing all assumptions on devices, is impractical to implement today. Measurement-device-independent QKD (MDI-QKD) turns out to be a promising solution to the security problem of QKD. In MDI-QKD, all security loopholes, including those yet-to-be discovered, have been removed from the detectors, the most critical part in QKD. In this thesis, we investigate issues related to the practical implementation and security of MDI-QKD. We first present a demonstration of polarization-encoding MDI-QKD. Taking finite key effect into account, we achieve a secret key rate of 0.005 bit per second (bps) over 10 km spooled telecom fiber, and a 1600-bit key is distributed. This work, together with other demonstrations, shows the practicality of MDI-QKD. Next we investigate a critical assumption of MDI-QKD: perfect state preparation. We apply the loss-tolerant QKD protocol and adapt it to MDI-QKD to quantify information leakage due to imperfect state preparation. We then present an experimental demonstration of MDI-QKD over 10 km and 40 km of spooled fiber, which for the first time considers the impact of inaccurate polarization state preparation on the secret key rate. This would not have been possible under previous security proofs, given the same amount of state preparation flaws.
Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2015-10-01
Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.
Skogen, Erik J [Albuquerque, NM; Tauke-Pedretti, Anna [Albuquerque, NM
2011-09-06
An optical NOR gate is formed from two pair of optical waveguide devices on a substrate, with each pair of the optical waveguide devices consisting of an electroabsorption modulator electrically connected in series with a waveguide photodetector. The optical NOR gate utilizes two digital optical inputs and a continuous light input to provide a NOR function digital optical output. The optical NOR gate can be formed from III-V compound semiconductor layers which are epitaxially deposited on a III-V compound semiconductor substrate, and operates at a wavelength in the range of 0.8-2.0 .mu.m.
Investigating Quantum Data Encrypted Modulation States
2014-11-01
propagation of entangled photon pairs through a hyper spectral filter device originally designed for multi-access laser communications between a hub...and multiple spokes. 15. SUBJECT TERMS Coherent optical detection, Long wavelength infrared, combined optical/RF link, entangled photon pairs , Lyot...Figure 36. Entangled photon pair amplitudes enter one port of a beam splitter (BS). There they split into two paths. They recombine when entering a
Establishment of a biomimetic device based on tri-layer polymer actuators--propulsion fins.
Alici, Gursel; Spinks, Geoffrey; Huynh, Nam N; Sarmadi, Laleh; Minato, Rick
2007-06-01
We propose to use bending type tri-layer polymer actuators as propulsion fins for a biomimetic device consisting of a rigid body, like a box fish having a carapace, and paired fins running through the rigid body, like a fish having pectoral fins. The fins or polymer bending actuators can be considered as individually controlled flexible membranes. Each fin is activated with sinusoidal inputs such that there is a phase lag between the movements of successive fins to create enough thrust force for propulsion. Eight fins with 0.125 aspect ratio have been used along both sides of the rigid body to move the device in the direction perpendicular to the longitudinal axis of the body. The designed device with the paired fins was successfully tested, moving in an organic solution consisting of solvent, propylene carbonate (PC), and electrolyte. The design procedure outlined in this study is offered as a guide to making functional devices based on polymer actuators and sensors.
Vacuum chamber for ion manipulation device
Chen, Tsung-Chi; Tang, Keqi; Ibrahim, Yehia M; Smith, Richard D; Anderson, Gordon A; Baker, Erin M
2014-12-09
An ion manipulation method and device is disclosed. The device includes a pair of substantially parallel surfaces. An array of inner electrodes is contained within, and extends substantially along the length of, each parallel surface. The device includes a first outer array of electrodes and a second outer array of electrodes. Each outer array of electrodes is positioned on either side of the inner electrodes, and is contained within and extends substantially along the length of each parallel surface. A DC voltage is applied to the first and second outer array of electrodes. A RF voltage, with a superimposed electric field, is applied to the inner electrodes by applying the DC voltages to each electrode. Ions either move between the parallel surfaces within an ion confinement area or along paths in the direction of the electric field, or can be trapped in the ion confinement area. A predetermined number of pairs of surfaces are disposed in one or more chambers, forming a multiple-layer ion mobility cyclotron device.
Secure quantum key distribution using continuous variables of single photons.
Zhang, Lijian; Silberhorn, Christine; Walmsley, Ian A
2008-03-21
We analyze the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are inadequate. A specific simple eavesdropping attack is analyzed to illuminate how secret information may be distilled well beyond the bounds of the usual CV-QKD measures.
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...
Using Zigbee to integrate medical devices.
Frehill, Paul; Chambers, Desmond; Rotariu, Cosmin
2007-01-01
Wirelessly enabling Medical Devices such as Vital Signs Monitors, Ventilators and Infusion Pumps allows central data collection. This paper discusses how data from these types of devices can be integrated into hospital systems using wireless sensor networking technology. By integrating devices you are protecting investment and opening up the possibility of networking with similar devices. In this context we present how Zigbee meets our requirements for bandwidth, power, security and mobility. We have examined the data throughputs for various medical devices, the requirement of data frequency, security of patient data and the logistics of moving patients while connected to devices. The paper describes a new tested architecture that allows this data to be seamlessly integrated into a User Interface or Healthcare Information System (HIS). The design supports the dynamic addition of new medical devices to the system that were previously unsupported by the system. To achieve this, the hardware design is kept generic and the software interface for different types of medical devices is well defined. These devices can also share the wireless resources with other types of sensors being developed in conjunction on this project such as wireless ECG (Electrocardiogram) and Pulse-Oximetry sensors.
Investigations of Crossed Andreev Reflection in Hybrid Superconductor-Ferromagnet Structures
ERIC Educational Resources Information Center
Colci O'Hara, Madalina
2009-01-01
Cooper pair splitting is predicted to occur in hybrid devices where a superconductor is coupled to two ferromagnetic wires placed at a distance less than the superconducting coherence length. This thesis searches for signatures of this process, called crossed Andreev reflection (CAR), in three device geometries. The first devices studied are…
Circulating current battery heater
Ashtiani, Cyrus N.; Stuart, Thomas A.
2001-01-01
A circuit for heating energy storage devices such as batteries is provided. The circuit includes a pair of switches connected in a half-bridge configuration. Unidirectional current conduction devices are connected in parallel with each switch. A series resonant element for storing energy is connected from the energy storage device to the pair of switches. An energy storage device for intermediate storage of energy is connected in a loop with the series resonant element and one of the switches. The energy storage device which is being heated is connected in a loop with the series resonant element and the other switch. Energy from the heated energy storage device is transferred to the switched network and then recirculated back to the battery. The flow of energy through the battery causes internal power dissipation due to electrical to chemical conversion inefficiencies. The dissipated power causes the internal temperature of the battery to increase. Higher internal temperatures expand the cold temperature operating range and energy capacity utilization of the battery. As disclosed, either fixed frequency or variable frequency modulation schemes may be used to control the network.
NASA Technical Reports Server (NTRS)
Jhabvala, M.; Lin, H. C.
1989-01-01
Hearing-aid device indicates visually whether sound is coming from left, right, back, or front. Device intended to assist individuals who are deaf in at least one ear and unable to discern naturally directions to sources of sound. Device promotes safety in street traffic, on loading docks, and in presence of sirens, alarms, and other warning sounds. Quadraphonic version of device built into pair of eyeglasses and binaural version built into visor.
33 CFR 159.131 - Safety: Incinerating device.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety: Incinerating device. 159.131 Section 159.131 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION MARINE SANITATION DEVICES Design, Construction, and Testing § 159.131 Safety...
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
Khera, Mandeep
2017-03-01
Ready or not, the Internet of things (IoT) is here. No longer just a buzz term, it'll continue to grow at an unprecedented pace over the next few years expecting to reach over 25 billion connected devices by 2020. History shows us that most fast growth technology solutions focus on solving business problems first and security is an afterthought. Unfortunately, IoT is following the same trend. Most IoT devices, apps, and infrastructure were developed without security in mind and are likely going to become targets of hackers. According to some security experts, major cyberattacks against the IoT devices are looming. According to the FBI, criminals can gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispensed medicines. Once criminals have breached such devices, they gain access to any personal or medical information stored on the devices, as well as the power to change the coding that controls the dispense mechanism of medicines or health data collection. This can result in major health issues and potential loss of lives. Are organizations ready to protect themselves? What are the key vulnerable points? There are various steps that companies can take to raise the barrier. In this article, we'll talk about the background, issues, potential attack vectors liable to be hacked, protection strategies, and more.
Khera, Mandeep
2017-01-01
Ready or not, the Internet of things (IoT) is here. No longer just a buzz term, it’ll continue to grow at an unprecedented pace over the next few years expecting to reach over 25 billion connected devices by 2020. History shows us that most fast growth technology solutions focus on solving business problems first and security is an afterthought. Unfortunately, IoT is following the same trend. Most IoT devices, apps, and infrastructure were developed without security in mind and are likely going to become targets of hackers. According to some security experts, major cyberattacks against the IoT devices are looming. According to the FBI, criminals can gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispensed medicines. Once criminals have breached such devices, they gain access to any personal or medical information stored on the devices, as well as the power to change the coding that controls the dispense mechanism of medicines or health data collection. This can result in major health issues and potential loss of lives. Are organizations ready to protect themselves? What are the key vulnerable points? There are various steps that companies can take to raise the barrier. In this article, we’ll talk about the background, issues, potential attack vectors liable to be hacked, protection strategies, and more. PMID:27920270
How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.
Stites, Mark; Pianykh, Oleg S
2016-04-01
Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.
Alerting device and method for reminding a person of a risk
Runyon, Larry [Richland, WA; Gunter, Wayne M [West Richland, WA; Pratt, Richard M [Richland, WA
2001-11-27
An alerting device and method to remind personnel of a risk is disclosed. The device has at least two sensors, a logic controller, a power source, and an annunciator that delivers a visual message, with or without an audible alarm, about a risk to a person when the sensors detect the person exiting a predetermined space. In particular, the present invention reminds a person of a security, safety, or health risk upon exiting a predetermined space. More particularly, the present invention reminds a person of an information security risk relating to sensitive, proprietary, confidential, trade secret, classified, or intellectual property information.
Negative differential conductance in doped-silicon nanoscale devices with superconducting electrodes
NASA Astrophysics Data System (ADS)
Shapovalov, A.; Shaternik, V.; Suvorov, O.; Zhitlukhina, E.; Belogolovskii, M.
2018-02-01
We present a proof-of-concept nanoelectronics device with a negative differential conductance, an attractive from the applied viewpoint functionality. The device, characterized by the decreasing current with increasing voltage in a certain voltage region above a threshold bias of about several hundred millivolts, consists of two superconducting electrodes with an amorphous 10-nm-thick silicon interlayer doped by tungsten nano-inclusions. We show that small changes in the W content radically modify the shape of the trilayer current-voltage dependence and identify sudden conductance switching at a threshold voltage as an effect of Andreev fluctuators. The latter entities are two-level systems at the superconductor-doped silicon interface where a Cooper pair tunnels from a superconductor and occupies a pair of localized electronic states. We argue that in contrast to previously proposed devices, our samples permit very large-scale integration and are practically feasible.
Osbourn, G.C.
1983-10-06
An intrinsic semiconductor electro-optical device comprises a p-n junction intrinsically responsive, when cooled, to electromagnetic radiation in the wavelength range of 8 to 12 ..mu..m. This radiation responsive p-n junction comprises a strained-layer superlattice (SLS) of alternating layers of two different III-V semiconductors. The lattice constants of the two semiconductors are mismatched, whereby a total strain is imposed on each pair of alternating semiconductor layers in the SLS structure, the proportion of the total strain which acts on each layer of the pair being proportional to the ratio of the layer thicknesses of each layer in the pair.
[Extendable Cords to Prevent Tumbling of a Suction Device during Craniotomy].
Shimizu, Satoru; Mochizuki, Takahiro; Osawa, Shigeyuki; Sekiguchi, Tomoko; Koizumi, Hiroyuki; Kumabe, Toshihiro
2016-02-01
Suction is necessary during craniotomy, and intraoperative tumbling of the suction device interrupts operative procedures. To avoid this, we developed a technique that would fasten the device to an extendable cord as is used to secure cell phones. We used this technique in more than 300 craniotomies at the specific point of time when the suction device tends to tumble, i. e., during the opening and closure of a wound, which requires frequent instrument exchanges. Extendable cords fastened to the tip of the suction hose using a gift tie were attached to the drapes to secure the suction device next to the operative field. During the operation, the extendable cord followed the suction device manipulations. Consequently, although there was some tension in the cord during its extension, the maneuverability of the suction device was maintained. As the hanging suction device was closer to the operative field than devices stored in conventional pockets, its manipulation was easier and quicker. Upon release, the suction device automatically returned to its original position without distracting the surgeon. Tumbling of the device was prevented, and there were no procedure-related complications. Our simple modification using extendable cords prevented tumbling, avoided unnecessary replacements, and eased the manipulation of a suction device.
To ensure secure gun storage and gun safety devices.
Rep. Jackson Lee, Sheila [D-TX-18
2013-07-11
House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Evans, William D [Cupertino, CA
2009-02-24
A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.
Security Belt for Wireless Implantable Medical Devices.
Kulaç, Selman
2017-09-19
In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.
Medical cyber-physical systems: A survey.
Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S
2018-03-10
Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.
Medical Devices Transition to Information Systems: Lessons Learned
Charters, Kathleen G.
2012-01-01
Medical devices designed to network can share data with a Clinical Information System (CIS), making that data available within clinician workflow. Some lessons learned by transitioning anesthesia reporting and monitoring devices (ARMDs) on a local area network (LAN) to integration of anesthesia documentation within a CIS include the following categories: access, contracting, deployment, implementation, planning, security, support, training and workflow integration. Areas identified for improvement include: Vendor requirements for access reconciled with the organizations’ security policies and procedures. Include clauses supporting transition from stand-alone devices to information integrated into clinical workflow in the medical device procurement contract. Resolve deployment and implementation barriers that make the process less efficient and more costly. Include effective field communication and creative alternatives in planning. Build training on the baseline knowledge of trainees. Include effective help desk processes and metrics. Have a process for determining where problems originate when systems share information. PMID:24199054
Design, development, and evaluation of a novel microneedle array-based continuous glucose monitor.
Jina, Arvind; Tierney, Michael J; Tamada, Janet A; McGill, Scott; Desai, Shashi; Chua, Beelee; Chang, Anna; Christiansen, Mark
2014-05-01
The development of accurate, minimally invasive continuous glucose monitoring (CGM) devices has been the subject of much work by several groups, as it is believed that a less invasive and more user-friendly device will result in greater adoption of CGM by persons with insulin-dependent diabetes. This article presents the results of preliminary clinical studies in subjects with diabetes of a novel prototype microneedle-based continuous glucose monitor. In this device, an array of tiny hollow microneedles is applied into the epidermis from where glucose in interstitial fluid (ISF) is transported via passive diffusion to an amperometric glucose sensor external to the body. Comparison of 1396 paired device glucose measurements and fingerstick blood glucose readings for up to 72-hour wear in 10 diabetic subjects shows the device to be accurate and well tolerated by the subjects. Overall mean absolute relative difference (MARD) is 15% with 98.4% of paired points in the A+B region of the Clarke error grid. The prototype device has demonstrated clinically accurate glucose readings over 72 hours, the first time a microneedle-based device has achieved such performance. © 2014 Diabetes Technology Society.
30 CFR 250.1615 - Securing of wells.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Securing of wells. 250.1615 Section 250.1615... § 250.1615 Securing of wells. A downhole-safety device such as a cement plug, bridge plug, or packer... evacuation of the drilling crew, prevent station keeping, or require repairs to major drilling units or well...
Cyber Security Applications: Freeware & Shareware
ERIC Educational Resources Information Center
Rogers, Gary; Ashford, Tina
2015-01-01
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Spin-enhanced organic bulk heterojunction photovoltaic solar cells.
Zhang, Ye; Basel, Tek P; Gautam, Bhoj R; Yang, Xiaomei; Mascaro, Debra J; Liu, Feng; Vardeny, Z Valy
2012-01-01
Recently, much effort has been devoted to improve the efficiency of organic photovoltaic solar cells based on blends of donors and acceptors molecules in bulk heterojunction architecture. One of the major losses in organic photovoltaic devices has been recombination of polaron pairs at the donor-acceptor domain interfaces. Here, we present a novel method to suppress polaron pair recombination at the donor-acceptor domain interfaces and thus improve the organic photovoltaic solar cell efficiency, by doping the device active layer with spin 1/2 radical galvinoxyl. At an optimal doping level of 3 wt%, the efficiency of a standard poly(3-hexylthiophene)/1-(3-(methoxycarbonyl)propyl)-1-1-phenyl)(6,6)C(61) solar cell improves by 18%. A spin-flip mechanism is proposed and supported by magneto-photocurrent measurements, as well as by density functional theory calculations in which polaron pair recombination rate is suppressed by resonant exchange interaction between the spin 1/2 radicals and charged acceptors, which convert the polaron pair spin state from singlet to triplet.
Lead Telluride Quantum Dot Solar Cells Displaying External Quantum Efficiencies Exceeding 120%
2015-01-01
Multiple exciton generation (MEG) in semiconducting quantum dots is a process that produces multiple charge-carrier pairs from a single excitation. MEG is a possible route to bypass the Shockley-Queisser limit in single-junction solar cells but it remains challenging to harvest charge-carrier pairs generated by MEG in working photovoltaic devices. Initial yields of additional carrier pairs may be reduced due to ultrafast intraband relaxation processes that compete with MEG at early times. Quantum dots of materials that display reduced carrier cooling rates (e.g., PbTe) are therefore promising candidates to increase the impact of MEG in photovoltaic devices. Here we demonstrate PbTe quantum dot-based solar cells, which produce extractable charge carrier pairs with an external quantum efficiency above 120%, and we estimate an internal quantum efficiency exceeding 150%. Resolving the charge carrier kinetics on the ultrafast time scale with pump–probe transient absorption and pump–push–photocurrent measurements, we identify a delayed cooling effect above the threshold energy for MEG. PMID:26488847
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Encapsulation of high temperature thermoelectric modules
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salvador, James R.; Sakamoto, Jeffrey; Park, Youngsam
A method of encapsulating a thermoelectric device and its associated thermoelectric elements in an inert atmosphere and a thermoelectric device fabricated by such method are described. These thermoelectric devices may be intended for use under conditions which would otherwise promote oxidation of the thermoelectric elements. The capsule is formed by securing a suitably-sized thin-walled strip of oxidation-resistant metal to the ceramic substrates which support the thermoelectric elements. The thin-walled metal strip is positioned to enclose the edges of the thermoelectric device and is secured to the substrates using gap-filling materials. The strip, substrates and gap-filling materials cooperatively encapsulate the thermoelectricmore » elements and exclude oxygen and water vapor from atmospheric air so that the elements may be maintained in an inert, non-oxidizing environment.« less
33 CFR 159.127 - Safety coliform count: Recirculating devices.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety coliform count: Recirculating devices. 159.127 Section 159.127 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION MARINE SANITATION DEVICES Design, Construction, and Testing § 159...
33 CFR 159.16 - Authorization to label devices.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Authorization to label devices. 159.16 Section 159.16 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION MARINE SANITATION DEVICES Certification Procedures § 159.16 Authorization to label...
33 CFR 159.17 - Changes to certified devices.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Changes to certified devices. 159.17 Section 159.17 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION MARINE SANITATION DEVICES Certification Procedures § 159.17 Changes to certified...
A comparative effectiveness analysis of three continuous glucose monitors.
Damiano, Edward R; El-Khatib, Firas H; Zheng, Hui; Nathan, David M; Russell, Steven J
2013-02-01
To compare three continuous glucose monitoring (CGM) devices in subjects with type 1 diabetes under closed-loop blood glucose (BG) control. Six subjects with type 1 diabetes (age 52 ± 14 years, diabetes duration 32 ± 14 years) each participated in two 51-h closed-loop BG control experiments in the hospital. Venous plasma glucose (PG) measurements (GlucoScout, International Biomedical) obtained every 15 min (2,360 values) were paired in time with corresponding CGM glucose (CGMG) measurements obtained from three CGM devices, the Navigator (Abbott Diabetes Care), the Seven Plus (DexCom), and the Guardian (Medtronic), worn simultaneously by each subject. Errors in paired PG-CGMG measurements and data reporting percentages were obtained for each CGM device. The Navigator had the best overall accuracy, with an aggregate mean absolute relative difference (MARD) of all paired points of 11.8 ± 11.1% and an average MARD across all 12 experiments of 11.8 ± 3.8%. The Seven Plus and Guardian produced aggregate MARDs of all paired points of 16.5 ± 17.8% and 20.3 ± 18.0%, respectively, and average MARDs across all 12 experiments of 16.5 ± 6.7% and 20.2 ± 6.8%, respectively. Data reporting percentages, a measure of reliability, were 76% for the Seven Plus and nearly 100% for the Navigator and Guardian. A comprehensive head-to-head-to-head comparison of three CGM devices for BG values from 36 to 563 mg/dL revealed marked differences in performance characteristics that include accuracy, precision, and reliability. The Navigator outperformed the other two in these areas.
Securing resource constraints embedded devices using elliptic curve cryptography
NASA Astrophysics Data System (ADS)
Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad
2014-06-01
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).
Laulicht, Bryan; Langer, Robert; Karp, Jeffrey M.
2012-01-01
Medical tape that provides secure fixation of life-sustaining and -monitoring devices with quick, easy, damage-free removal represents a longstanding unmet medical need in neonatal care. During removal of current medical tapes, crack propagation occurs at the adhesive–skin interface, which is also the interface responsible for device fixation. By designing quick-release medical tape to undergo crack propagation between the backing and adhesive layers, we decouple removal and device fixation, enabling dual functionality. We created an ordered adhesive/antiadhesive composite intermediary layer between the medical tape backing and adhesive for which we achieve tunable peel removal force, while maintaining high shear adhesion to secure medical devices. We elucidate the relationship between the spatial ordering of adhesive and antiadhesive regions to create a fully tunable system that achieves strong device fixation and quick, easy, damage-free device removal. We also described ways of neutralizing the residual adhesive on the skin and have observed that thick continuous films of adhesive are easier to remove than the thin islands associated with residual adhesive left by current medical tapes. PMID:23112196
Research on Design of Tri-color Shift Device
NASA Astrophysics Data System (ADS)
Xu, Ping; Yuan, Xia; Huang, Haixuan; Yang, Tuo; Huang, Yanyan; Zhu, Tengfei; Tang, Shaotuo; Peng, Wenda
2016-11-01
An azimuth-tuned tri-color shift device based on an embedded subwavelength one-dimensional rectangular structure with single period is proposed. High reflection efficiencies for both TE and TM polarizations can be achieved simultaneously. Under an oblique incidence of 60°, the reflection efficiencies can reach up to 85, 86, and 100 % in blue (azimuth of 24°), green (azimuth of 63°), and red (azimuth of 90°) waveband, respectively. Furthermore, the laws of influence of device period, groove depth, coating thickness, and incident angle on reflection characteristics are investigated and exposed, and feasibility of the device is demonstrated. The proposed device realizes tri-color shift for natural light using a simple structure. It exhibits high efficiency as well as good security. Such a device can be fabricated by the existing embossing and coating technique. All these break through the limit of bi-color shift anti-counterfeiting technology and have great applications in the field of optically variable image security.
NASA Astrophysics Data System (ADS)
Yan, Xing-Yu; Gong, Li-Hua; Chen, Hua-Ying; Zhou, Nan-Run
2018-05-01
A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.
VOLTTRON™: An Agent Platform for Integrating Electric Vehicles and Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haack, Jereme N.; Akyol, Bora A.; Tenney, Nathan D.
2013-12-06
The VOLTTRON™ platform provides a secure environment for the deployment of intelligent applications in the smart grid. VOLTTRON design is based on the needs of control applications running on small form factor devices, namely security and resource guarantees. Services such as resource discovery, secure agent mobility, and interacting with smart and legacy devices are provided by the platform to ease the development of control applications and accelerate their deployment. VOLTTRON platform has been demonstrated in several different domains that influenced and enhanced its capabilities. This paper will discuss the features of VOLTTRON and highlight its usage to coordinate electric vehiclemore » charging with home energy usage« less
Pair-bonding, romantic love, and evolution: the curious case of Homo sapiens.
Fletcher, Garth J O; Simpson, Jeffry A; Campbell, Lorne; Overall, Nickola C
2015-01-01
This article evaluates a thesis containing three interconnected propositions. First, romantic love is a "commitment device" for motivating pair-bonding in humans. Second, pair-bonding facilitated the idiosyncratic life history of hominins, helping to provide the massive investment required to rear children. Third, managing long-term pair bonds (along with family relationships) facilitated the evolution of social intelligence and cooperative skills. We evaluate this thesis by integrating evidence from a broad range of scientific disciplines. First, consistent with the claim that romantic love is an evolved commitment device, our review suggests that it is universal; suppresses mate-search mechanisms; has specific behavioral, hormonal, and neuropsychological signatures; and is linked to better health and survival. Second, we consider challenges to this thesis posed by the existence of arranged marriage, polygyny, divorce, and infidelity. Third, we show how the intimate relationship mind seems to be built to regulate and monitor relationships. Fourth, we review comparative evidence concerning links among mating systems, reproductive biology, and brain size. Finally, we discuss evidence regarding the evolutionary timing of shifts to pair-bonding in hominins. We conclude there is interdisciplinary support for the claim that romantic love and pair-bonding, along with alloparenting, played critical roles in the evolution of Homo sapiens. © The Author(s) 2014.
NO.sub.x sensing devices having conductive oxide electrodes
Montgomery, Frederick C.; West, David L.; Armstrong, Timothy R.; Maxey, Lonnie C.
2010-03-16
A NO.sub.x sensing device includes at least one pair of spaced electrodes, at least one of which is made of a conductive oxide, and an oxygen-ion conducting material in bridging electrical communication with the electrodes.
El Feghali, Ramzi N; Topouchian, Jirar A; Pannier, Bruno M; El Assaad, Hiba A; Asmar, Roland G
2007-06-01
A high percentage of hypertensive patients present an arm circumference of over 32 cm; the use of a large cuff is therefore recommended. Validation studies are usually performed in the general population using a standard-size cuff. The aim of this study was to assess the accuracy of the Omron M7 device in a population with an arm circumference ranging from 32 to 42 cm. A validation study was performed according to the International Protocol of the European Society of Hypertension. This protocol is divided into two phases: the first phase is performed on 15 selected participants (45 pairs of blood-pressure measurements); if the device passes this phase, 18 supplementary participants are included (54 pairs of blood-pressure measurements), making a total number of 33 participants (99 pairs of blood-pressure measurements), on whom the analysis is performed. For each participant, four blood-pressure measurements were performed simultaneously by two trained observers, using mercury sphygmomanometers fitted with a Y tube; the measurements alternated with three by the test device. The difference between the blood-pressure value given by the device and that obtained by the two observers (mean of the two observations) was calculated for each measure. The 99 pairs of blood-pressure differences were classified into three categories (
Error-correcting pairs for a public-key cryptosystem
NASA Astrophysics Data System (ADS)
Pellikaan, Ruud; Márquez-Corbella, Irene
2017-06-01
Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.
Implementing Diffie-Hellman key exchange using quantum EPR pairs
NASA Astrophysics Data System (ADS)
Mandal, Sayonnha; Parakh, Abhishek
2015-05-01
This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.
2012-11-01
that mobile application developers should reconsider implementing garbled circuits due to their extreme resource usage, and instead rely upon our equivalently secure and significantly more efficient alternative.
Procedures to cover Spillage of Classified Information Onto Unclassified Systems
The purpose of this is to implement the security control requirements and outline actions required when responding to electronic spillage of classified national security information (classified information) onto unclassified information systems or devices.
NASA Astrophysics Data System (ADS)
Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip R.; Floyd, Bertram; Lind, Alexander J.; Cavin, John D.; Helmick, Spencer R.
2016-09-01
A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nm pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nm photons are up-converted to a single 532-nm photon in the first stage. In the second stage, the 532-nm photon is down-converted to an entangled photon-pair at 800 nm and 1600 nm which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free space QKD experiment with the B92 protocol are also presented.
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip; Floyd, Bertram M.; Lind, Alexander J.;
2016-01-01
A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nanometer pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nanometer photons are up-converted to a single 532-nanometer photon in the first stage. In the second stage, the 532-nanometer photon is down-converted to an entangled photon-pair at 800 nanometer and 1600 nanometer which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.
ERIC Educational Resources Information Center
Fearon, R. M. Pasco; Van IJzendoorn, Marinus H.; Fonagy, Peter; Bakermans-Kranenburg, Marian J.; Schuengel, Carlo; Bokhorst, Caroline L.
2006-01-01
The current article presents results from a twin study of genetic and environmental components of maternal sensitivity and infant attachment and their association. The sample consisted of 136 twin pairs from 2 sites: Leiden, the Netherlands, and London, UK. Maternal sensitivity was assessed in the home at 9-10 months, and infant attachment…
Brainjacking: Implant Security Issues in Invasive Neuromodulation.
Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z
2016-08-01
The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.
Introduction to FPGA Devices and The Challenges for Critical Application - A User's Perspective
NASA Technical Reports Server (NTRS)
Berg, Melanie; LaBel, Kenneth
2015-01-01
This presentation is an introduction to Field Programmable Gate Array (FPGA) devices and the challenges of critical application including: safety, reliability, availability, recoverability, and security.
31 CFR 800.104 - Transactions or devices for avoidance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS General § 800.104 Transactions or devices for avoidance. Any...
NASA Astrophysics Data System (ADS)
Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.
2018-01-01
In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.
Geovisualization for Smart Video Surveillance
NASA Astrophysics Data System (ADS)
Oves García, R.; Valentín, L.; Serrano, S. A.; Palacios-Alonso, M. A.; Sucar, L. Enrique
2017-09-01
Nowadays with the emergence of smart cities and the creation of new sensors capable to connect to the network, it is not only possible to monitor the entire infrastructure of a city, including roads, bridges, rail/subways, airports, communications, water, power, but also to optimize its resources, plan its preventive maintenance and monitor security aspects while maximizing services for its citizens. In particular, the security aspect is one of the most important issues due to the need to ensure the safety of people. However, if we want to have a good security system, it is necessary to take into account the way that we are going to present the information. In order to show the amount of information generated by sensing devices in real time in an understandable way, several visualization techniques are proposed for both local (involves sensing devices in a separated way) and global visualization (involves sensing devices as a whole). Taking into consideration that the information is produced and transmitted from a geographic location, the integration of a Geographic Information System to manage and visualize the behavior of data becomes very relevant. With the purpose of facilitating the decision-making process in a security system, we have integrated the visualization techniques and the Geographic Information System to produce a smart security system, based on a cloud computing architecture, to show relevant information about a set of monitored areas with video cameras.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Wearable Technology in Medicine: Machine-to-Machine (M2M) Communication in Distributed Systems.
Schmucker, Michael; Yildirim, Kemal; Igel, Christoph; Haag, Martin
2016-01-01
Smart wearables are capable of supporting physicians during various processes in medical emergencies. Nevertheless, it is almost impossible to operate several computers without neglecting a patient's treatment. Thus, it is necessary to set up a distributed network consisting of two or more computers to exchange data or initiate remote procedure calls (RPC). If it is not possible to create flawless connections between those devices, it is not possible to transfer medically relevant data to the most suitable device, as well as to control a device with another one. This paper shows how wearables can be paired and what problems occur when trying to pair several wearables. Furthermore, it is described as to what interesting scenarios are possible in the context of emergency medicine/paramedicine.
12 CFR 16.32 - Fraudulent transactions and unsafe and unsound practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... operates as a fraud or deceit upon any person, in connection with the purchase or sale of any security of a... SECURITIES OFFERING DISCLOSURE RULES § 16.32 Fraudulent transactions and unsafe and unsound practices. (a) No person in the offer or sale of bank securities shall directly or indirectly: (1) Employ any device...
17 CFR 240.15c1-9 - Use of pro forma balance sheets.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Use of pro forma balance sheets. 240.15c1-9 Section 240.15c1-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... pro forma balance sheets. The term manipulative, deceptive, or other fraudulent device or contrivance...
17 CFR 240.15c1-9 - Use of pro forma balance sheets.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Use of pro forma balance sheets. 240.15c1-9 Section 240.15c1-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... pro forma balance sheets. The term manipulative, deceptive, or other fraudulent device or contrivance...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
.... Subordinated Debt Securities/ Notice of Issuance of Subordinated Debt or Mandatorily Redeemable Preferred Stock. 1550-0032 Interagency Notice of Change in 1557-0272 1557-0014. Control. 1550-0035 Securities Offering... to that Transferred to the Transferred to the FRB. FRB. 1550-0062 Minimum Security Devices and 1557...
Lippmann, M.
1964-04-01
A cascade particle impactor capable of collecting particles and distributing them according to size is described. In addition the device is capable of collecting on a pair of slides a series of different samples so that less time is required for the changing of slides. Other features of the device are its compactness and its ruggedness making it useful under field conditions. Essentially the unit consists of a main body with a series of transverse jets discharging on a pair of parallel, spaced glass plates. The plates are capable of being moved incremental in steps to obtain the multiple samples. (AEC)
Home security system using internet of things
NASA Astrophysics Data System (ADS)
Anitha, A.
2017-11-01
IoT refers to the infrastructure of connected physical devices which is growing at a rapid rate as huge number of devices and objects are getting associated to the Internet. Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontroller known as Arduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.
Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.
González-Tablas, Ana I; Tapiador, Juan E
2016-05-11
We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user's security preferences implicitly captured by policies already in place.
Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs
González-Tablas, Ana I.; Tapiador, Juan E.
2016-01-01
We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user’s security preferences implicitly captured by policies already in place. PMID:27187385
NASA Astrophysics Data System (ADS)
Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun
2018-07-01
In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.
Proof Compression and the Mobius PCC Architecture for Embedded Devices
NASA Technical Reports Server (NTRS)
Jensen, Thomas
2009-01-01
The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code.
ONCHIT security in distributed environments: a proposed model for implantable devices.
Lorence, Daniel; Lee, James; Richards, Michael
2010-08-01
Recent ONCHIT mandates call for increased individual health data collection efforts as well as heightened security measures. To date most healthcare organizations have been reluctant to exchange information, citing confidentiality concerns and unshared costs incurred by specific organizations. Implantable monitoring and treatment devices are rapidly emerging as data collection interface tools in response to such mandates. Proposed here is a translational, device-independent consumer-based solution, which focuses on information controlled by specific patients, and functions within a distributed (organization neutral) environment. While the conceptual applications employed in this technology set are provided by way of illustration, they may also serve as a transformative model for emerging EMR/EHR requirements.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Temple, Brian Allen; Pimentel, David A.
This document covers the various testing and modifications of the Device Modeler Tool Kit (DMTK) for project LANL12-RS-108J in FY14. The testing has been comprised of different device modelers and trainees for device modeling using DMTK on the secure network for a few test problems. Most of these problems have been synthetic data problems. There has been a local secure network training drill where one of the trainees has used DMTK for real data. DMTK has also been used on a laptop for a deployed real data training drill. Once DMTK gets into the home team, it will be usedmore » for more training drills (TDs) which will contain real data in the future.« less
Insecurity of Detector-Device-Independent Quantum Key Distribution.
Sajeed, Shihan; Huang, Anqi; Sun, Shihai; Xu, Feihu; Makarov, Vadim; Curty, Marcos
2016-12-16
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devices' imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus, free of malicious modifications, which is a key assumption in DDI-QKD.
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks
2017-01-01
In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.
Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho
2017-09-23
In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.
46 CFR 111.40-9 - Locking device.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...
46 CFR 111.40-9 - Locking device.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...
46 CFR 111.40-9 - Locking device.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...
46 CFR 111.40-9 - Locking device.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...
46 CFR 111.40-9 - Locking device.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Locking device. 111.40-9 Section 111.40-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Panelboards § 111.40-9 Locking device. The door of each panelboard enclosure that is accessible to...
46 CFR 108.646 - Marking of stowage locations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN... with symbols in accordance with IMO Resolution A.760(18), indicating the devices stowed in that location for that purpose. (b) If more than one device is stowed in that location, the number of devices...
27 CFR 19.188 - Measuring devices and proofing instruments.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Measuring devices and proofing instruments. 19.188 Section 19.188 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX..., and Security Requirements Measuring and Proofing Equipment Requirements § 19.188 Measuring devices and...
27 CFR 19.188 - Measuring devices and proofing instruments.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Measuring devices and proofing instruments. 19.188 Section 19.188 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX..., and Security Requirements Measuring and Proofing Equipment Requirements § 19.188 Measuring devices and...
27 CFR 19.188 - Measuring devices and proofing instruments.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Measuring devices and proofing instruments. 19.188 Section 19.188 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX..., and Security Requirements Measuring and Proofing Equipment Requirements § 19.188 Measuring devices and...
27 CFR 19.188 - Measuring devices and proofing instruments.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Measuring devices and proofing instruments. 19.188 Section 19.188 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX..., and Security Requirements Measuring and Proofing Equipment Requirements § 19.188 Measuring devices and...
46 CFR 58.20-10 - Pressure relieving devices.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 2 2014-10-01 2014-10-01 false Pressure relieving devices. 58.20-10 Section 58.20-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS Refrigeration Machinery § 58.20-10 Pressure relieving devices. (a) Each...
46 CFR 58.20-10 - Pressure relieving devices.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 2 2013-10-01 2013-10-01 false Pressure relieving devices. 58.20-10 Section 58.20-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS Refrigeration Machinery § 58.20-10 Pressure relieving devices. (a) Each...
46 CFR 58.20-10 - Pressure relieving devices.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Pressure relieving devices. 58.20-10 Section 58.20-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS Refrigeration Machinery § 58.20-10 Pressure relieving devices. (a) Each...
46 CFR 58.20-10 - Pressure relieving devices.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 2 2011-10-01 2011-10-01 false Pressure relieving devices. 58.20-10 Section 58.20-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS Refrigeration Machinery § 58.20-10 Pressure relieving devices. (a) Each...
46 CFR 58.20-10 - Pressure relieving devices.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 2 2012-10-01 2012-10-01 false Pressure relieving devices. 58.20-10 Section 58.20-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS Refrigeration Machinery § 58.20-10 Pressure relieving devices. (a) Each...
46 CFR 154.912 - Inerted spaces: Relief devices.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Inerted spaces: Relief devices. 154.912 Section 154.912 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Atmospheric Control in Cargo Containment Systems § 154.912 Inerted spaces: Relief devices. Inerted spaces must...
46 CFR 154.912 - Inerted spaces: Relief devices.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Inerted spaces: Relief devices. 154.912 Section 154.912 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Atmospheric Control in Cargo Containment Systems § 154.912 Inerted spaces: Relief devices. Inerted spaces must...