A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cosmic Security
[article]
2022
IACR Cryptology ePrint Archive
Our notion of cosmic security considers a reduction-based notion of security that models attackers as arbitrary unbounded stateful algorithms; we also consider a more relaxed notion of cosmic security ...
We define a framework for analyzing the security of cryptographic protocols that makes minimal assumptions about what a "realistic model of computation is". ...
Theorem 1.14 (Standard Security from Cosmic Security; Informal). Assume there exists a cosmic reduction from C to C w.r.t., restartable adversaries. ...
dblp:journals/iacr/ChanFP22
fatcat:s7n54vb5jjcttiyej27cxgizfy
Securing Fuel for Our Frigid Cosmic Future
[article]
2018
arXiv
pre-print
Advanced civilizations will likely migrate into rich clusters of galaxies, which host the largest reservoirs of matter bound by gravity against the accelerated cosmic expansion. ...
Can we see signs for their long journeys across the cosmic web as their spacecrafts flock collectively on their way towards clusters of galaxies? ...
The added benefit of naturally-produced clusters is that they contain stars of all masses, much like a cosmic bag that collected everything from its environment. ...
arXiv:1806.07170v1
fatcat:2zkdn3fmbndkdo4b6d62iyceei
Evaluating Software Security Change Requests: A COSMIC-Based Quantification Approach
2019
2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
In this paper, we explore the use of COSMIC method -ISO/IEC 19761 to quantify and evaluate security change requests. ...
Changes in non-functional requirements affect the ISO/IEC 25010 quality characteristics such as security, portability, etc. ...
et al., [2] COSMIC Security Abran et al., [4] COSMIC Portability Hakim et al., [26] Combination of functional and structural size
Security Meridji et al., [28] NFR model based on COSMIC Security ...
doi:10.1109/seaa.2019.00049
dblp:conf/euromicro/HaouesSBD19
fatcat:m2rorswxufbprmrzcmkmrnnhsm
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?
2020
International Conference on Availability, Reliability and Security
It is also known that the cosmic ray flux is far from isotropic. ...
Cosmic Rays Cosmic rays, a term originally coined by Robert Millikan around 1914 following their discovery by Victor Hess in 1911-12, refer to a variety of extra-terrestrial phenomena. ...
doi:10.1145/3407023.3409188
dblp:conf/IEEEares/Overill20
fatcat:4udtgrxqabg6xjwqdmu5pcyf7u
Cosmic Farming: A Ray of Hope for Sustainable Horticulture Production and Health Security
2020
International Journal of Plant and Environment
Cosmic farming, being promoted by us is based on systematic and synergistic mediating of everlasting source of energy by few simple techniques. ...
Horticultural crops are well suited for cosmic production and consumption. The same technique is equally effective for all crops and in each ecological situation. ...
Cosmic Farming Cosmic energy is the fundamental source of plant growth. The Vedic answer is that cosmic energy is behind all mysteries of nature. ...
doi:10.18811/ijpen.v6i04.01
fatcat:f24pwoltzjdhdl24cuwyeugi4e
COSMIC: A Cooperative MAC Protocol for WSN with Minimal Control Messages
2011
2011 4th IFIP International Conference on New Technologies, Mobility and Security
Simulation results show that COSMIC is able to increase the network lifetime by 25% Index Terms-Cooperative relaying, relay selection, energy efficiency, wireless sensor networks. ...
In this paper we propose a CSMA/CA based MAC protocol that supports cooperative communication with a minimum overhead: COSMIC (A Cooperative MAC Protocol for WSN with Minimal Control Messages). ...
In COSMIC relay selection is based on both the channel state information (CSI) and the remaining energy. ...
doi:10.1109/ntms.2011.5721060
dblp:conf/ntms/NacefSGB11
fatcat:zpfbtonkozftff4vejgmdpdcw4
Tomographic Imaging with Cosmic Ray Muons
2008
Science and Global Security
We present a new technique that overcomes these limitations by obtaining tomographic images using the multiple scattering of cosmic radiation as it transits each vehicle. ...
Additionally, we have used the GEANT Monte Carlo Transport program to validate reconstruction and detection algorithms for muon tomography for border security applications. ...
The Tomographic Imaging with Cosmic Ray Muons 51 Figure 13 : A schematic view of how a counting station might look. ...
doi:10.1080/08929880802335758
fatcat:cshdmxalfbgu7hfxtscx6atqeu
Cosmic Brochure And Poster
2015
Zenodo
COSMIC project will identify the most effective ways in which these new technologies and applications are being used by citizens and governments. ...
The project will also provide instruments for all relevant stakeholders to use new information and communication technologies for the benefit of the security of all citizens. ...
COSMIC will review information and communication needs, infrastructure bottlenecks, security priorities and major stakeholders associated with crisis situations, particularly those involved in search and ...
doi:10.5281/zenodo.16099
fatcat:pmx2jwsqcrgqjmy756rn2mvrbu
Estimating Software Cost with Security Risk Potential
2009
International Journal of Economics and Finance
This list provides useful insights for software developers and practitioners in identifying security risks so that it can be encountered as security cost in the application. ...
Software houses are now keen to provide secure software as requested by customers' desire with respect to security and quality of their products especially related to the software costing estimation in ...
COSMIC-FFP The new release COSMIC-FPP (COSMIC, 2007) has changed this method's name to COSMIC Method. ...
doi:10.5539/ijef.v1n1p183
fatcat:o35vqqkntfannhbeoh75jsknze
Page 434 of Sage Urban Studies Abstracts Vol. 29, Issue 4
[page]
2001
Sage Urban Studies Abstracts
of cosmic harmony. ...
Believing that an individual must arrange his life in perfect harmony with cosmic order, the Balinese create their indigenous dwellings according to a centuries-old tra- dition generated by their idea ...
Page 781 of The Living Age Vol. 261, Issue 3390
[page]
1909
The Living Age
“The real and eternal dig- nity of Humanity is so bound up with this cosmic order of holiness that man would be diviner if he were broken maintaining its honor, than if his mere existence were secured ...
We are in an age which teems with cosmic science, expands with cosmic ideals, and glows with cosmic emotion. That on the one hand. ...
Page 287 of Interpretation Vol. 63, Issue 3
[page]
2009
Interpretation
God sets the cosmic infrastructures and boundaries firmly in place, all to maintain the world’s stability. The universe is a cosmic construction zone in which God builds an inviolably secure place. ...
THE BOOK OF PROVERBS Interpretation 287
made safe and secure. Wisdom recounts God at work in carving, anchoring, stabilizing, establishing, circumscribing, securing, and setting boundaries. ...
Page 162 of Journal of the Scientific Laboratories, Denison University Vol. 32, Issue
[page]
1937
Journal of the Scientific Laboratories, Denison University
To the soul in search of spiritual security amid hostile forces, these intimations are far from satisfying—no clear trace of a cosmic father who loves and cares as well as a cosmic architect who plans ...
WICKENDEN
In our search for spiritual security we cast aside every material circumstance and in nakedness of soul ask the universe if there is not something in man too valuable for it to abandon or destroy ...
Muography applications developed by IFIN-HH
2018
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
The main goal of the first direction of study is to improve the security of underground civilian and industrial infrastructures, by starting the development of a new, innovative detection system that can ...
For the second direction of study, the method proposed is based on the detection and analysis of the cosmic muon flux. ...
The second one is proposing to improve the security of underground civilian and industrial infrastructures, by using information provided by a detector placed underground that measures directional cosmic ...
doi:10.1098/rsta.2018.0137
pmid:30530545
pmcid:PMC6335306
fatcat:lk5wznorlzbjdpjc4k6dezlwoe
Page 23 of Physical Review Vol. 53, Issue 1
[page]
1938
Physical Review
Recovery of equipment is not necessary to secure the record so that observa- tions may be made at any point where a satis- factory receiving station can be erected. ...
These ascensions were undertaken to test the equipment under all usual operating conditions and to secure data at this latitude to compare with similar data obtained near the magnetic equator and reported ...
« Previous
Showing results 1 — 15 out of 41,789 results