Refine
Departments, institutes and facilities
- Fachbereich Informatik (18)
- Institut für Cyber Security & Privacy (ICSP) (10)
- Institute of Visual Computing (IVC) (10)
- Institut für funktionale Gen-Analytik (IFGA) (5)
- Fachbereich Angewandte Naturwissenschaften (2)
- Fachbereich Ingenieurwissenschaften und Kommunikation (2)
- Fachbereich Wirtschaftswissenschaften (2)
- Institut für Verbraucherinformatik (IVI) (2)
Document Type
- Conference Object (70) (remove)
Year of publication
- 2008 (70) (remove)
Has Fulltext
- no (70)
Keywords
- AES hardware (1)
- Agent-oriented software engineering (1)
- Bicycle Simulator (1)
- DPA (1)
- Differential side-channel analysis (1)
- Equipment and services (1)
- Fourier transforms (1)
- Heterodyning (1)
- Immersive Visualization Environment (1)
- Optics (1)
Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, problematic as a straightforward adoption of SOAP with MTOM introduces considerable inefficiencies in the signature generation process when large data sets are involved. This paper proposes a non-blocking, signature generation approach enabling a stream-like processing with considerable performance enhancements.
This paper presents the security architecture of the @neurIST medical information system. @neurIST aims at a research and decision support system for treating diseases that unites multiple medical institutions and service providers offering technical solutions based on the Service Oriented Architecture (SOA) paradigm. The security architecture provides secure access to federated medical data spread across multiple sites and protects the privacy of the patients by pseudonymisation of the medical data required for the study.
In recent years a new category of digital signature algorithms based on Elliptic Curve Cryptography (ECC) has taken place besides well known schemes as RSA or DSA. So far it is, however, still not obvious how ECC-based signature schemes can be integrated in X.509-based Public Key Infrastructures (PKI).This paper briefly introduces cryptographic basics of signature schemes based on elliptic curves and points out the necessary cryptography parameters that are important in this context. Afterwards the structure and the encoding of X.509 certificates and Certificate Revocation Lists (CRL) are discussed regarding the integration of ECC public keys and ECC signatures respectively. The paper closes with exemplary implementations of ECC-based security systems.
The @neurIST project
(2008)
OpCog: an industrial development approach for cognitive agent systems in military UAV applications
(2008)
Known and novel techniques are described to implement a Fast Fourier Transform (FFT) in hardware, such that parallelized data can be processed. The usage of both - real and imaginary FFT-input - can help saving hardware. Based on the different techniques, flexible to use FFT-implementations have been developed by combining standard FFT-components (partly IP) and are compared, according to their hardware utilization. Finally, applicability has been demonstrated in practice by a FFTimplementation with 8192 channels as part of a FPGAspectrometer with a total bandwidth of 1.5 GHz.