Towards proactive event-driven computing
Event driven architecture is a paradigm shift from traditional computing architectures which
employ synchronous, request-response interactions. In this paper we introduce a conceptual …
employ synchronous, request-response interactions. In this paper we introduce a conceptual …
An efficient and secure RFID authentication protocol using elliptic curve cryptography
N Dinarvand, H Barati - Wireless Networks, 2019 - Springer
Radio frequency identification (RFID) is a relatively new technology widely deployed in
many applications. Due to several advantages of the technology including decreased costs …
many applications. Due to several advantages of the technology including decreased costs …
Proactive event processing in action: a case study on the proactive management of transport processes (industry article)
Proactive event processing constitutes the next phase in the evolution of complex event
processing. Proactive event processing makes it possible to anticipate potential issues …
processing. Proactive event processing makes it possible to anticipate potential issues …
Predictive analytics by using Bayesian model averaging for large-scale Internet of Things
X Zhu, F Kui, Y Wang - International Journal of Distributed …, 2013 - journals.sagepub.com
Massive events can be produced today because of the rapid development of the Internet of
Things (IoT). Complex event processing, which can be used to extract high-level patterns …
Things (IoT). Complex event processing, which can be used to extract high-level patterns …
[PDF][PDF] Extending Event-Driven Architecture for Proactive Systems.
F Fournier, A Kofman, I Skarbovsky… - EDBT/ICDT …, 2015 - academia.edu
ABSTRACT Proactive Event-Driven Computing is a new paradigm, in which a decision is not
made due to explicit users' requests nor is it made as a response to past events. Rather, the …
made due to explicit users' requests nor is it made as a response to past events. Rather, the …
On physical obfuscation of cryptographic algorithms
We describe a solution for physically obfuscating the representation of a cipher, to augment
chips resistance against physical threats, by combining ideas from masking techniques and …
chips resistance against physical threats, by combining ideas from masking techniques and …
Securing the communications of home health care systems based on RFID sensor networks
We address security solutions to protect the communication of the wireless components of a
home health care system. We analyze especially the problem of exchanging secrets to …
home health care system. We analyze especially the problem of exchanging secrets to …
Towards efficient private distributed computation on unbounded input streams
In the problem of private “swarm” computing, n agents wish to securely and distributively
perform a computation on common inputs, in such a way that even if the entire memory …
perform a computation on common inputs, in such a way that even if the entire memory …
Security threat mitigation trends in low-cost RFID systems
The design and implementation of security threat mitigation mechanisms in RFID systems,
specially in low-cost RFID tags, are gaining great attention in both industry and academia …
specially in low-cost RFID tags, are gaining great attention in both industry and academia …
Nested Merkle's Puzzles against Sampling Attacks
We propose a new private key establishment protocol which is based on the Merkle's
puzzles scheme. This protocol is designed to provide the honest parties the ability to …
puzzles scheme. This protocol is designed to provide the honest parties the ability to …