Search results for: CRYPTOGRAPHIC PROTOCOLS
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
Computer Networks EN 2022
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
Computer Networks EN 2023
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
INFOGEST inter-laboratory recommendations for assaying gastric and pancreatic lipases activities prior to in vitro digestion studies
PublicationIn vitro digestion studies often use animal digestive enzyme extracts as substitutes of human gastric and pancreatic secretions. Pancreatin from porcine origin is thus commonly used to provide relevant pancreatic enzymes such as proteases, amylase and lipase. Rabbit gastric extracts (RGE) have been recently introduced to provide gastric lipase in addition to pepsin. Before preparing simulated gastric and pancreatic extracts with...
-
Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities
PublicationThe phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...
-
Internet Technologies in Infosystems - lecture 2022/23
e-Learning CoursesThe aim of the course "Internet technologies in infosystems" is to familiarize students with issues related to the use of Internet technologies in the implementation of infosystems, including languages and web development tools, as well as application and transmission protocols.
-
Internet Technologies in Infosystems
e-Learning CoursesThe aim of the course "Internet technologies in infosystems" is to familiarize students with issues related to the use of Internet technologies in the implementation of infosystems, including languages and web development tools, as well as application and transmission protocols.
-
Power equalization of AES FPGA implementation
PublicationThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublicationThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
The role of electrolysis and enzymatic hydrolysis treatment in the enhancement of the electrochemical properties of 3D-printed carbon black/poly(lactic acid) structures
PublicationAdditive manufacturing, also known as 3D printing, is beginning to play an unprecedented role in developing many applications for industrial or personalized products. The conductive composite structures require additional treatment to achieve an electroactive surface useful for electrochemical devices. In this paper, the surfaces of carbon black/poly(lactic acid) CB-PLA printouts were activated by electrolysis or enzymatic digestion...
-
Robust amplification of Santha-Vazirani sources with three devices
PublicationWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
PublicationA class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...
-
Quantum entanglement
PublicationAll our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...
-
International Conference on Pairing-based Cryptography
Conferences -
IMA International Conference on Cryptography and Coding
Conferences -
The Claude Shannon Workshop on Coding and Cryptography
Conferences -
Workshop on Fault Diagnosis and Tolerance in Cryptography
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
International Conference on Information Security and Cryptography
Conferences -
Workshop on Cryptography for Ad hoc Networks
Conferences -
International Workshop on Post-Quantum Cryptography
Conferences -
Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network
PublicationIn recent times, visible light communication is an emerging technology that supports high speed data communication for wireless communication systems. However, the performance of the visible light communication system is impaired by inter symbol interference, the time dispersive nature of the channel, and nonlinear features of the light emitting diode that significantly reduces the bit error rate performance. To address these problems,...
-
ITS1 and ITS2 sequences alignment of Oncidium Sw. species
Open Research DataComparison of internal transcribed spacer ( ITS1; ITS2) sequences of 40 species of Oncidium S..w. Alignment was created using Clustal Omega ver.1.2.4 in SnapGene software 7.1.1.
-
Towards hardware built-in support for computer system safety
PublicationArtykuł omawia dostępne technologie wirtualizacji zasobów pamięci i systemów I/O w systemach komputerowych takie jak Execute Disable Bit (EDB) capability i Virtual Machine Architecture (VMA). Nastepnie wprowadza założenia na rozszerzenie tych technologii w celu uzyskania funkcjonalności Safe Call Execution dzieki technologii Execution Disabling Policies (EDP). Wprowadzono również założenia na funkcjonalność Memory Virtualization...
-
Semi-definite programming and quantum information
PublicationThis paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Analiza porównawcza wybranych hierarchicznych algorytmów trasowania w sieciach ad hoc
PublicationW referacie przybliżono ogólną zasadę działania algorytmów hierarchicznych stosowanych w sieciach ad hoc. Szczegółowo omówiono dwa hierarchiczne protokoły trasowania: Cluster Based Routing Protocol oraz Zone Routing Protocol. Osobny punkt referatu poświęcono analizie porównawczej obu protokołów. W podsumowaniu przeanalizowano zasadność zastosowania wspomnianych protokołów w Zautomatyzowanym Systemie Radarowego Nadzoru Polskich...
-
Marek Czachor prof. dr hab.
People -
Anna Brillowska-Dąbrowska dr hab. inż.
PeopleAnna Brillowska-Dąbrowska, born in 1971 in Gdańsk, Poland, graduated in 1996 in Biotechnology from the Faculty of Chemistry, Gdańsk University of Technology (GUT). In 2001 she got her PhD, in 2013 became a DSc (habilitation). She was employed in 2004 as a researcher in Statens Serum Institut in Denmark. Currently she is an Associate Professor (adiunkt) in the Department of Molecular Biotechnology and Microbiology and Vice-dean...
-
International Conference on Internet Monitoring and Protection (International Conference on Internet Monitoring and Protocol)
Conferences -
Advanced surveillance and operational communication system employing mobile terminals
PublicationDistributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
International Workshop on Boolean Functions: Cryptography and Applications
Conferences -
International Conference on Applied Cryptography and Network Security
Conferences -
All Nonclassical Correlations Can Be Activated into Distillable Entanglement
PublicationWe devise a protocol in which general nonclassical multipartite correlations produce a physically relevant effect, leading to the creation of bipartite entanglement. In particular, we show that the relative entropy of quantumness, which measures all nonclassical correlations among subsystems of a quantum system, is equivalent to and can be operationally interpreted as the minimum distillable entanglement generated between the system...
-
IFIP Joint International Conference on Formal Description Techniques and Protocol Specification, Testing, And Verification
Conferences -
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublicationQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublicationOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Quantum-state transfer in spin chains via isolated resonance of terminal spins
PublicationWe propose a quantum-state transfer protocol in a spin chain that requires only the control of the spins at the ends of the quantum wire. The protocol is to a large extent insensitive to inhomogeneity caused by local magnetic fields and perturbation of exchange couplings. Moreover, apart from the free evolution regime, it allows one to induce an adiabatic spin transfer, which provides the possibility of performing the transfer...
-
Next generation automatic IP configuration deployment issues
PublicationAlthough Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved problems and new options yet to be defined. One example of such case is Fully Qualified Domain Name (FQDN) option, which final version has been published in late 2007. It describes DHCPv6 client...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Results of modeling of pharmaceuticals mixtures toxicity with deviation ratio and best-fit functions models using Saccharomyces cerevisiae yeast as model organism
Open Research DataThe research was concerned with verifying the impact of binary mixtures of nine pharmaceuticals against a selected organism, i.e., the yeast Saccharomyces cerevisiae. S cerevisiae is used as a model organism in the monitoring of endocrine disruptors in environmental and reference samples in Xenometrix® systems - XenoScreen®. Tested pharmaceuticals,...
-
Highly stable CsFAPbIBr perovskite solar cells with dominant bulk recombination at real operating temperatures
PublicationMixed-cation mixed-halide perovskite solar cells have been characterized in DC at different temperatures (from −20 °C up to 50 °C) and the time evolution of the device efficiency has been assessed using different degradation protocols (indoors and outdoors). The completely planar p–i–n structure is ITO/CuNiOx/PTAA/CsFAPbIBr/PCBM/PEI/Ag. Pristine current–voltage characteristics barely show hysteresis, at any temperature. Open circuit...
-
Stanisław Barański
PeopleStanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...
-
Bogdan Wiszniewski prof. dr hab. inż.
PeopleBogdan Wiszniewski graduated from Gdansk University of Technology in 1977 and was awarded an MSc in computer science and engineering with honours. In 1984 and 1998, respectively, has got his PhD and DSc. In 2006 was awarded a Professor title by the President of Poland. Lectured at the universities in Canada, US and UK. Principal investigator or coordinator in many national and international R&D projects with the significant...
-
International Conference on Practice and Theory in Public Key Cryptography
Conferences -
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements
PublicationRecently the quantum information science community devoted a lot of attention to the theoretical and practical aspects of generalized measurements, the formalism of all possible quantum operations leading to acquisition of classical information. On the other hand, due to imperfections present in quantum devices, and limited thrust to them, a trend of formulating quantum information tasks in a semi-device-independent manner emerged....