Learn More
Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related applications. Due to their inherent dependency on the physical properties of the device that contains them, they can be used to uniquely bind an application to a particular device for the purpose of IP protection. This is crucial for the(More)
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the pioneering work of Song, Wagner, and Perrig (IEEE S&P '00), the field of provably secure SE has expanded to(More)
Strains of a new species in the genus Acetobacter, for which we propose the name A. intermedius sp. nov., were isolated and characterized in pure culture from different sources (Kombucha beverage, cider vinegar, spirit vinegar) and different countries (Switzerland, Slovenia). The isolated strains grow in media with 3% acetic acid and 3% ethanol as does A.(More)
The 16S rRNA sequences from the Gluconobacter species G. asaii, G. cerinus and G. frateurii were determined and compared with homologous sequences from published databases and sequences of G. oxydans and Acetobacter species previously described [Sievers, M., Ludwig, W. and Teuber, M. (1994) System. Appl. Microbiol. 17, 189-196]. The Gluconobacter species(More)
The 16S-23S ribosomal RNA spacer regions of Acetobacter europaeus DSM 6160, A. xylinum NCIB 11664 and A. xylinum CL27 were amplified by PCR. Specific PCR products were obtained from each strain and their nucleotide sequences determined. The spacer region of A. europaeus comprises 768 nucleotides (nt), that of A. xylinum 778 nt and that of A. xylinum CL27(More)
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images. To detect and mitigate the distribution of illegal images, for instance(More)
We propose the concept of selective document retrieval (SDR) from an encrypted database which allows a client to store encrypted data on a third-party server and perform efficient search remotely. We propose a new SDR scheme based on the recent advances in fully homomorphic encryption schemes. The proposed scheme is secure in our security model and can be(More)
Most proposals for security of vehicular networks foresee the generation of a comparatively large number of changing pseudonyms to prevent vehicles from being identified or tracked. Most proposals rely on communication with backend pseudonym providers to refill a vehicle's pseudonym pool which creates a number of problems, one being secure storage and(More)
This paper reports on a between-subject, comparative online study of three information visualization demonstrators that each displayed the same dataset by way of an identical scatterplot technique, yet were different in style in terms of visual and interactive embellishment. We validated stylistic adherence and integrity through a separate experiment in(More)