Filters








41,789 Hits in 0.98 sec

Cosmic Security [article]

Benjamin Chan, Cody Freitag, Rafael Pass
2022 IACR Cryptology ePrint Archive  
Our notion of cosmic security considers a reduction-based notion of security that models attackers as arbitrary unbounded stateful algorithms; we also consider a more relaxed notion of cosmic security  ...  We define a framework for analyzing the security of cryptographic protocols that makes minimal assumptions about what a "realistic model of computation is".  ...  Theorem 1.14 (Standard Security from Cosmic Security; Informal). Assume there exists a cosmic reduction from C to C w.r.t., restartable adversaries.  ... 
dblp:journals/iacr/ChanFP22 fatcat:s7n54vb5jjcttiyej27cxgizfy

Securing Fuel for Our Frigid Cosmic Future [article]

Abraham Loeb
2018 arXiv   pre-print
Advanced civilizations will likely migrate into rich clusters of galaxies, which host the largest reservoirs of matter bound by gravity against the accelerated cosmic expansion.  ...  Can we see signs for their long journeys across the cosmic web as their spacecrafts flock collectively on their way towards clusters of galaxies?  ...  The added benefit of naturally-produced clusters is that they contain stars of all masses, much like a cosmic bag that collected everything from its environment.  ... 
arXiv:1806.07170v1 fatcat:2zkdn3fmbndkdo4b6d62iyceei

Evaluating Software Security Change Requests: A COSMIC-Based Quantification Approach

Mariem Haoues, Asma Sellami, Hanene Ben-Abdallah, Onur Demirors
2019 2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)  
In this paper, we explore the use of COSMIC method -ISO/IEC 19761 to quantify and evaluate security change requests.  ...  Changes in non-functional requirements affect the ISO/IEC 25010 quality characteristics such as security, portability, etc.  ...  et al., [2] COSMIC Security Abran et al., [4] COSMIC Portability Hakim et al., [26] Combination of functional and structural size Security Meridji et al., [28] NFR model based on COSMIC Security  ... 
doi:10.1109/seaa.2019.00049 dblp:conf/euromicro/HaouesSBD19 fatcat:m2rorswxufbprmrzcmkmrnnhsm

Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?

Richard E. Overill
2020 International Conference on Availability, Reliability and Security  
It is also known that the cosmic ray flux is far from isotropic.  ...  Cosmic Rays Cosmic rays, a term originally coined by Robert Millikan around 1914 following their discovery by Victor Hess in 1911-12, refer to a variety of extra-terrestrial phenomena.  ... 
doi:10.1145/3407023.3409188 dblp:conf/IEEEares/Overill20 fatcat:4udtgrxqabg6xjwqdmu5pcyf7u

Cosmic Farming: A Ray of Hope for Sustainable Horticulture Production and Health Security

Ram Kripal Pathak, Ram Awadh Ram
2020 International Journal of Plant and Environment  
Cosmic farming, being promoted by us is based on systematic and synergistic mediating of everlasting source of energy by few simple techniques.  ...  Horticultural crops are well suited for cosmic production and consumption. The same technique is equally effective for all crops and in each ecological situation.  ...  Cosmic Farming Cosmic energy is the fundamental source of plant growth. The Vedic answer is that cosmic energy is behind all mysteries of nature.  ... 
doi:10.18811/ijpen.v6i04.01 fatcat:f24pwoltzjdhdl24cuwyeugi4e

COSMIC: A Cooperative MAC Protocol for WSN with Minimal Control Messages

A B Nacef, S Senouci, Y Ghamri-Doudane, Andre Beylot
2011 2011 4th IFIP International Conference on New Technologies, Mobility and Security  
Simulation results show that COSMIC is able to increase the network lifetime by 25% Index Terms-Cooperative relaying, relay selection, energy efficiency, wireless sensor networks.  ...  In this paper we propose a CSMA/CA based MAC protocol that supports cooperative communication with a minimum overhead: COSMIC (A Cooperative MAC Protocol for WSN with Minimal Control Messages).  ...  In COSMIC relay selection is based on both the channel state information (CSI) and the remaining energy.  ... 
doi:10.1109/ntms.2011.5721060 dblp:conf/ntms/NacefSGB11 fatcat:zpfbtonkozftff4vejgmdpdcw4

Tomographic Imaging with Cosmic Ray Muons

C. L. MORRIS, C. C. ALEXANDER, J. D. BACON, K. N. BOROZDIN, D. J. CLARK, R. CHARTRAND, C. J. ESPINOZA, A. M. FRASER, M. C. GALASSI, J. A. GREEN, J. S. GONZALES, J. J. GOMEZ (+14 others)
2008 Science and Global Security  
We present a new technique that overcomes these limitations by obtaining tomographic images using the multiple scattering of cosmic radiation as it transits each vehicle.  ...  Additionally, we have used the GEANT Monte Carlo Transport program to validate reconstruction and detection algorithms for muon tomography for border security applications.  ...  The Tomographic Imaging with Cosmic Ray Muons 51 Figure 13 : A schematic view of how a counting station might look.  ... 
doi:10.1080/08929880802335758 fatcat:cshdmxalfbgu7hfxtscx6atqeu

Cosmic Brochure And Poster

COSMIC Consortium
2015 Zenodo  
COSMIC project will identify the most effective ways in which these new technologies and applications are being used by citizens and governments.  ...  The project will also provide instruments for all relevant stakeholders to use new information and communication technologies for the benefit of the security of all citizens.  ...  COSMIC will review information and communication needs, infrastructure bottlenecks, security priorities and major stakeholders associated with crisis situations, particularly those involved in search and  ... 
doi:10.5281/zenodo.16099 fatcat:pmx2jwsqcrgqjmy756rn2mvrbu

Estimating Software Cost with Security Risk Potential

Nur Atiqah Sia Abdullah, Rusli Abdullah, Hasan Selamat, Azmi Jaafar, Kamaruzaman Jusoff
2009 International Journal of Economics and Finance  
This list provides useful insights for software developers and practitioners in identifying security risks so that it can be encountered as security cost in the application.  ...  Software houses are now keen to provide secure software as requested by customers' desire with respect to security and quality of their products especially related to the software costing estimation in  ...  COSMIC-FFP The new release COSMIC-FPP (COSMIC, 2007) has changed this method's name to COSMIC Method.  ... 
doi:10.5539/ijef.v1n1p183 fatcat:o35vqqkntfannhbeoh75jsknze

Page 434 of Sage Urban Studies Abstracts Vol. 29, Issue 4 [page]

2001 Sage Urban Studies Abstracts  
of cosmic harmony.  ...  Believing that an individual must arrange his life in perfect harmony with cosmic order, the Balinese create their indigenous dwellings according to a centuries-old tra- dition generated by their idea  ... 

Page 781 of The Living Age Vol. 261, Issue 3390 [page]

1909 The Living Age  
“The real and eternal dig- nity of Humanity is so bound up with this cosmic order of holiness that man would be diviner if he were broken maintaining its honor, than if his mere existence were secured  ...  We are in an age which teems with cosmic science, expands with cosmic ideals, and glows with cosmic emotion. That on the one hand.  ... 

Page 287 of Interpretation Vol. 63, Issue 3 [page]

2009 Interpretation  
God sets the cosmic infrastructures and boundaries firmly in place, all to maintain the world’s stability. The universe is a cosmic construction zone in which God builds an inviolably secure place.  ...  THE BOOK OF PROVERBS Interpretation 287 made safe and secure. Wisdom recounts God at work in carving, anchoring, stabilizing, establishing, circumscribing, securing, and setting boundaries.  ... 

Page 162 of Journal of the Scientific Laboratories, Denison University Vol. 32, Issue [page]

1937 Journal of the Scientific Laboratories, Denison University  
To the soul in search of spiritual security amid hostile forces, these intimations are far from satisfying—no clear trace of a cosmic father who loves and cares as well as a cosmic architect who plans  ...  WICKENDEN In our search for spiritual security we cast aside every material circumstance and in nakedness of soul ask the universe if there is not something in man too valuable for it to abandon or destroy  ... 

Muography applications developed by IFIN-HH

Bogdan Mitrica, Denis Stanca, Bogdan Cautisanu, Mihai Niculescu-Oglinzanu, Alexandru Balaceanu, Alexandru Gherghel-Lascu, Andreea Munteanu, Alexandra Saftoiu, Toma Mosu, Romul Margineanu, Bashar Alkotbe
2018 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
The main goal of the first direction of study is to improve the security of underground civilian and industrial infrastructures, by starting the development of a new, innovative detection system that can  ...  For the second direction of study, the method proposed is based on the detection and analysis of the cosmic muon flux.  ...  The second one is proposing to improve the security of underground civilian and industrial infrastructures, by using information provided by a detector placed underground that measures directional cosmic  ... 
doi:10.1098/rsta.2018.0137 pmid:30530545 pmcid:PMC6335306 fatcat:lk5wznorlzbjdpjc4k6dezlwoe

Page 23 of Physical Review Vol. 53, Issue 1 [page]

1938 Physical Review  
Recovery of equipment is not necessary to secure the record so that observa- tions may be made at any point where a satis- factory receiving station can be erected.  ...  These ascensions were undertaken to test the equipment under all usual operating conditions and to secure data at this latitude to compare with similar data obtained near the magnetic equator and reported  ... 
« Previous Showing results 1 — 15 out of 41,789 results