954 resultados para smart meter security evaluation


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The European Union (EU) has increasingly become a comprehensive security actor. With the development of the Common Foreign and Security Policy (CFSP), including the Common Security and Defence Policy (CSDP) as a reaction to the failure of the EU to act during the wars in Yugoslavia/Western Balkans in the 1990s, the EU has a wide range of instruments for crisis prevention, crisis management as well as post-crisis intervention at its disposal. Observers typically agree that “hard power” is no longer sufficient to address the complex security challenges of today’s world while the EU, often criticised for only utilising “soft power”, is now able to exercise “smart power”. Through a comprehensive approach, facilitated by the Lisbon Treaty, the EU can now use the various instruments at its disposal, such as diplomacy, development aid, humanitarian assistance, trade, sanctions, international cooperation and crisis management capabilities in a joined-up manner. This mix of tools and instruments is helping the EU to achieve the aim set out in its European Security Strategy: “a secure Europe in a better world”.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

"November 1970."

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Le applicazioni che offrono servizi sulla base della posizione degli utenti sono sempre più utilizzate, a partire dal navigatore fino ad arrivare ai sistemi di trasporto intelligenti (ITS) i quali permetteranno ai veicoli di comunicare tra loro. Alcune di questi servizi permettono perfino di ottenere qualche incentivo se l'utente visita o passa per determinate zone. Per esempio un negozio potrebbe offrire dei coupon alle persone che si trovano nei paraggi. Tuttavia, la posizione degli utenti è facilmente falsificabile, ed in quest'ultima tipologia di servizi, essi potrebbero ottenere gli incentivi in modo illecito, raggirando il sistema. Diviene quindi necessario implementare un'architettura in grado di impedire alle persone di falsificare la loro posizione. A tal fine, numerosi lavori sono stati proposti, i quali delegherebbero la realizzazione di "prove di luogo" a dei server centralizzati oppure collocherebbero degli access point in grado di rilasciare prove o certificati a quegli utenti che si trovano vicino. In questo lavoro di tesi abbiamo ideato un'architettura diversa da quelle dei lavori correlati, cercando di utilizzare le funzionalità offerte dalla tecnologia blockchain e dalla memorizzazione distribuita. In questo modo è stato possibile progettare una soluzione che fosse decentralizzata e trasparente, assicurando l'immutabilità dei dati mediante l'utilizzo della blockchain. Inoltre, verrà dettagliato un'idea di caso d'uso da realizzare utilizzando l'architettura da noi proposta, andando ad evidenziare i vantaggi che, potenzialmente, si potrebbero trarre da essa. Infine, abbiamo implementato parte del sistema in questione, misurando i tempi ed i costi richiesti dalle transazioni su alcune delle blockchain disponibili al giorno d'oggi, utilizzando le infrastrutture messe a disposizione da Ethereum, Polygon e Algorand.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work presents a critical analysis of methodologies to evaluate the effective (or generalized) electromechanical coupling coefficient (EMCC) for structures with piezoelectric elements. First, a review of several existing methodologies to evaluate material and effective EMCC is presented. To illustrate the methodologies, a comparison is made between numerical, analytical and experimental results for two simple structures: a cantilever beam with bonded extension piezoelectric patches and a simply-supported sandwich beam with an embedded shear piezoceramic. An analysis of the electric charge cancelation effect on the effective EMCC observed in long piezoelectric patches is performed. It confirms the importance of reinforcing the electrodes equipotentiality condition in the finite element model. Its results indicate also that smaller (segmented) and independent piezoelectric patches could be more interesting for energy conversion efficiency. Then, parametric analyses and optimization are performed for a cantilever sandwich beam with several embedded shear piezoceramic patches. Results indicate that to fully benefit from the higher material coupling of shear piezoceramic patches, attention must be paid to the configuration design so that the shear strains in the patches are maximized. In particular, effective square EMCC values higher than 1% were obtained embedding nine well-spaced short piezoceramic patches in an aluminum/foam/aluminum sandwich beam.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multifrequency bioimpedance analysis has the potential to provide a non-invasive technique for determining body composition in live cattle. A bioimpedance meter developed for use in clinical medicine was adapted and evaluated in 2 experiments using a total of 31 cattle. Prediction equations were obtained for total body water, extracellular body water, intracellular body water, carcass water and carcass protein. There were strong correlations between the results obtained through chemical markers and bioimpedance analysis when determined in cattle that had a wide range of liveweights and conditions. The r(2) values obtained were 0.87 and 0.91 for total body water and extracellular body water respectively. Bioimpedance also correlated with carcass water, measured by chemical analysis (r(2) = 0.72), but less well with carcass protein (r(2) = 0.46). These correlations were improved by inclusion of liveweight and sex as variables in multiple regression analysis. However, the resultant equations were poor predictors of protein and water content in the carcasses of a group of small underfed beef cattle, that had a narrow range of liveweights. In this case, although there was no statistical difference between the predicted and measured values overall, bioimpedance analysis did not detect the differences in carcass protein between the 2 groups that were apparent following chemical analysis. Further work is required to determine the sensitivity of the technique in small underfed cattle, and its potential use in heavier well fed cattle close to slaughter weight.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.