Towards proactive event-driven computing

Y Engel, O Etzion - Proceedings of the 5th ACM international conference …, 2011 - dl.acm.org
Event driven architecture is a paradigm shift from traditional computing architectures which
employ synchronous, request-response interactions. In this paper we introduce a conceptual …

An efficient and secure RFID authentication protocol using elliptic curve cryptography

N Dinarvand, H Barati - Wireless Networks, 2019 - Springer
Radio frequency identification (RFID) is a relatively new technology widely deployed in
many applications. Due to several advantages of the technology including decreased costs …

Proactive event processing in action: a case study on the proactive management of transport processes (industry article)

Z Feldman, F Fournier, R Franklin… - Proceedings of the 7th …, 2013 - dl.acm.org
Proactive event processing constitutes the next phase in the evolution of complex event
processing. Proactive event processing makes it possible to anticipate potential issues …

Predictive analytics by using Bayesian model averaging for large-scale Internet of Things

X Zhu, F Kui, Y Wang - International Journal of Distributed …, 2013 - journals.sagepub.com
Massive events can be produced today because of the rapid development of the Internet of
Things (IoT). Complex event processing, which can be used to extract high-level patterns …

[PDF][PDF] Extending Event-Driven Architecture for Proactive Systems.

F Fournier, A Kofman, I Skarbovsky… - EDBT/ICDT …, 2015 - academia.edu
ABSTRACT Proactive Event-Driven Computing is a new paradigm, in which a decision is not
made due to explicit users' requests nor is it made as a response to past events. Rather, the …

On physical obfuscation of cryptographic algorithms

J Bringer, H Chabanne, T Icart - International Conference on Cryptology in …, 2009 - Springer
We describe a solution for physically obfuscating the representation of a cipher, to augment
chips resistance against physical threats, by combining ideas from masking techniques and …

Securing the communications of home health care systems based on RFID sensor networks

W Tounsi, J Garcia-Alfaro… - 2010 8th Annual …, 2010 - ieeexplore.ieee.org
We address security solutions to protect the communication of the wireless components of a
home health care system. We analyze especially the problem of exchanging secrets to …

Towards efficient private distributed computation on unbounded input streams

S Dolev, J Garay, N Gilboa, V Kolesnikov… - Journal of …, 2015 - degruyter.com
In the problem of private “swarm” computing, n agents wish to securely and distributively
perform a computation on common inputs, in such a way that even if the entire memory …

Security threat mitigation trends in low-cost RFID systems

J Garcia-Alfaro, M Barbeau, E Kranakis - International Workshop on Data …, 2009 - Springer
The design and implementation of security threat mitigation mechanisms in RFID systems,
specially in low-cost RFID tags, are gaining great attention in both industry and academia …

Nested Merkle's Puzzles against Sampling Attacks

S Dolev, N Fandina, X Li - International Conference on Information …, 2012 - Springer
We propose a new private key establishment protocol which is based on the Merkle's
puzzles scheme. This protocol is designed to provide the honest parties the ability to …