2015
Autores
Vilela, JP; Sousa, JS;
Publicação
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)
Abstract
Most of current physical-layer security techniques rely on a degraded eavesdropper, thus warranting some sort of advantage that can be relied upon to achieve higher levels of security. We consider instead non-degraded eavesdroppers, that possess equal or better capabilities than legitimate receivers. Under this challenging setup, most of current physical-layer security techniques become hard to administer and new dimensions to establish advantageous periods of communication are needed. For that, we characterize the secrecy level of two schemes for physical-layer security under non-degraded eavesdroppers: a spread spectrum uncoordinated frequency hopping scheme, and a jamming receiver with self-interference cancellation.
2015
Autores
Sarmento, D; Vilela, J; Harrison, WK; Gomes, M;
Publicação
2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings
Abstract
We propose a coding scheme based on the combination of interleaving with systematic channel codes for secrecy. The basic idea consists of generating a random interleaving key that is used to shuffle/interleave information at the source. The message and the interleaving key are then both encoded with a systematic code and the part related to the interleaving key is removed/punctured before being sent to the channel, hence operating as a hidden key for any receiver (legitimate or not) that needs to deinterleave the message. Successfully obtaining the original message then depends on determining the interleaving key, which can only be done through the parity bits that result from jointly encoding the interleaving key and the message. We provide a method to determine the necessary signal-to-noise ratio difference that enables successful reception at the legitimate receiver without the eavesdropper having access to the message. In addition, we provide evidence that this scheme may also be used to turn a realistic channel into a discrete memoryless channel, thus providing a first practical implementation of an abstract channel that can be employed with a wiretap code to provide information-theoretic security guarantees. © 2015 IEEE.
2015
Autores
Sarmento, D; Vilela, JP; Harrison, WK; Gomes, M;
Publicação
2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS)
Abstract
We propose a coding scheme based on the combination of interleaving with systematic channel codes for secrecy. The basic idea consists of generating a random interleaving key that is used to shuffle/interleave information at the source. The message and the interleaving key are then both encoded with a systematic code and the part related to the interleaving key is removed/punctured before being sent to the channel, hence operating as a hidden key for any receiver (legitimate or not) that needs to deinterleave the message. Successfully obtaining the original message then depends on determining the interleaving key, which can only be done through the parity bits that result from jointly encoding the interleaving key and the message. We provide a method to determine the necessary signal-to-noise ratio difference that enables successful reception at the legitimate receiver without the eavesdropper having access to the message. In addition, we provide evidence that this scheme may also be used to turn a realistic channel into a discrete memoryless channel, thus providing a first practical implementation of an abstract channel that can be employed with a wiretap code to provide information-theoretic security guarantees.
2014
Autores
Figueira, A; Pereira, R;
Publicação
2014 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE)
Abstract
Group work is an essential activity during both graduate and undergraduate formation. Students develop a set of skills, and employ criticism which helps them to better handle future interpersonal situations. There is a vast theoretical literature and numerous case studies about group work, but we haven't yet seen much development concerning the assessment of individual group participants. It is not always easy to have the perception of each student contribution to the whole work. Nevertheless, more than frequently, the assessment of the group is transposed to each group participant, which in turn results in each student having the same final mark. We propose and describe a tool to manage and assess individual group work taking into account the amount of work, interaction, quality, and the temporal evolution of each group participant. The module features the possibility to create two types of activities: collaborative or cooperative group work. We describe the conceptual design of our tool and present the two operating modes of the module, which is based on events, alerts and conditions. We then describe the methodology for the assessment in the two operating modes and how these two major approaches can be deployed through our module into pedagogical situations.
2014
Autores
Pinto Ribeiro, PM; Silva, FMA;
Publicação
Complex Networks V - Proceedings of the 5th Workshop on Complex Networks CompleNet 2014, Bologna, Italy, March 12-14, 2014
Abstract
Network motifs are small over represented patterns that have been used successfully to characterize complex networks. Current algorithmic approaches focus essentially on pure topology and disregard node and edge nature. However, it is often the case that nodes and edges can also be classified and separated into different classes. This kind of networks can be modeled by colored (or labeled) graphs. Here we present a definition of colored motifs and an algorithm for efficiently discovering them.We use g-tries, a specialized data-structure created for finding sets of subgraphs. G-Tries encapsulate common sub-structure, and with the aid of symmetry breaking conditions and a customized canonization methodology, we are able to efficiently search for several colored patterns at the same time. We apply our algorithm to a set of representative complex networks, showing that it can find colored motifs and outperform previous methods. © 2014 Springer International Publishing Switzerland.
2014
Autores
Silva, FMA; Castro Dutra, Id; Costa, VS;
Publicação
Euro-Par
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.