A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
IACR Cryptology ePrint Archive
Our notion of cosmic security considers a reduction-based notion of security that models attackers as arbitrary unbounded stateful algorithms; we also consider a more relaxed notion of cosmic security ... We define a framework for analyzing the security of cryptographic protocols that makes minimal assumptions about what a "realistic model of computation is". ... Theorem 1.14 (Standard Security from Cosmic Security; Informal). Assume there exists a cosmic reduction from C to C w.r.t., restartable adversaries. ...dblp:journals/iacr/ChanFP22 fatcat:s7n54vb5jjcttiyej27cxgizfy
Advanced civilizations will likely migrate into rich clusters of galaxies, which host the largest reservoirs of matter bound by gravity against the accelerated cosmic expansion. ... Can we see signs for their long journeys across the cosmic web as their spacecrafts flock collectively on their way towards clusters of galaxies? ... The added benefit of naturally-produced clusters is that they contain stars of all masses, much like a cosmic bag that collected everything from its environment. ...arXiv:1806.07170v1 fatcat:2zkdn3fmbndkdo4b6d62iyceei
In this paper, we explore the use of COSMIC method -ISO/IEC 19761 to quantify and evaluate security change requests. ... Changes in non-functional requirements affect the ISO/IEC 25010 quality characteristics such as security, portability, etc. ... et al.,  COSMIC Security Abran et al.,  COSMIC Portability Hakim et al.,  Combination of functional and structural size Security Meridji et al.,  NFR model based on COSMIC Security ...doi:10.1109/seaa.2019.00049 dblp:conf/euromicro/HaouesSBD19 fatcat:m2rorswxufbprmrzcmkmrnnhsm
It is also known that the cosmic ray flux is far from isotropic. ... Cosmic Rays Cosmic rays, a term originally coined by Robert Millikan around 1914 following their discovery by Victor Hess in 1911-12, refer to a variety of extra-terrestrial phenomena. ...doi:10.1145/3407023.3409188 dblp:conf/IEEEares/Overill20 fatcat:4udtgrxqabg6xjwqdmu5pcyf7u
Cosmic farming, being promoted by us is based on systematic and synergistic mediating of everlasting source of energy by few simple techniques. ... Horticultural crops are well suited for cosmic production and consumption. The same technique is equally effective for all crops and in each ecological situation. ... Cosmic Farming Cosmic energy is the fundamental source of plant growth. The Vedic answer is that cosmic energy is behind all mysteries of nature. ...doi:10.18811/ijpen.v6i04.01 fatcat:f24pwoltzjdhdl24cuwyeugi4e
Simulation results show that COSMIC is able to increase the network lifetime by 25% Index Terms-Cooperative relaying, relay selection, energy efficiency, wireless sensor networks. ... In this paper we propose a CSMA/CA based MAC protocol that supports cooperative communication with a minimum overhead: COSMIC (A Cooperative MAC Protocol for WSN with Minimal Control Messages). ... In COSMIC relay selection is based on both the channel state information (CSI) and the remaining energy. ...doi:10.1109/ntms.2011.5721060 dblp:conf/ntms/NacefSGB11 fatcat:zpfbtonkozftff4vejgmdpdcw4
We present a new technique that overcomes these limitations by obtaining tomographic images using the multiple scattering of cosmic radiation as it transits each vehicle. ... Additionally, we have used the GEANT Monte Carlo Transport program to validate reconstruction and detection algorithms for muon tomography for border security applications. ... The Tomographic Imaging with Cosmic Ray Muons 51 Figure 13 : A schematic view of how a counting station might look. ...doi:10.1080/08929880802335758 fatcat:cshdmxalfbgu7hfxtscx6atqeu
COSMIC project will identify the most effective ways in which these new technologies and applications are being used by citizens and governments. ... The project will also provide instruments for all relevant stakeholders to use new information and communication technologies for the benefit of the security of all citizens. ... COSMIC will review information and communication needs, infrastructure bottlenecks, security priorities and major stakeholders associated with crisis situations, particularly those involved in search and ...doi:10.5281/zenodo.16099 fatcat:pmx2jwsqcrgqjmy756rn2mvrbu
This list provides useful insights for software developers and practitioners in identifying security risks so that it can be encountered as security cost in the application. ... Software houses are now keen to provide secure software as requested by customers' desire with respect to security and quality of their products especially related to the software costing estimation in ... COSMIC-FFP The new release COSMIC-FPP (COSMIC, 2007) has changed this method's name to COSMIC Method. ...doi:10.5539/ijef.v1n1p183 fatcat:o35vqqkntfannhbeoh75jsknze
Sage Urban Studies Abstracts
of cosmic harmony. ... Believing that an individual must arrange his life in perfect harmony with cosmic order, the Balinese create their indigenous dwellings according to a centuries-old tra- dition generated by their idea ...
The Living Age
“The real and eternal dig- nity of Humanity is so bound up with this cosmic order of holiness that man would be diviner if he were broken maintaining its honor, than if his mere existence were secured ... We are in an age which teems with cosmic science, expands with cosmic ideals, and glows with cosmic emotion. That on the one hand. ...
God sets the cosmic infrastructures and boundaries firmly in place, all to maintain the world’s stability. The universe is a cosmic construction zone in which God builds an inviolably secure place. ... THE BOOK OF PROVERBS Interpretation 287 made safe and secure. Wisdom recounts God at work in carving, anchoring, stabilizing, establishing, circumscribing, securing, and setting boundaries. ...
To the soul in search of spiritual security amid hostile forces, these intimations are far from satisfying—no clear trace of a cosmic father who loves and cares as well as a cosmic architect who plans ... WICKENDEN In our search for spiritual security we cast aside every material circumstance and in nakedness of soul ask the universe if there is not something in man too valuable for it to abandon or destroy ...
The main goal of the first direction of study is to improve the security of underground civilian and industrial infrastructures, by starting the development of a new, innovative detection system that can ... For the second direction of study, the method proposed is based on the detection and analysis of the cosmic muon flux. ... The second one is proposing to improve the security of underground civilian and industrial infrastructures, by using information provided by a detector placed underground that measures directional cosmic ...doi:10.1098/rsta.2018.0137 pmid:30530545 pmcid:PMC6335306 fatcat:lk5wznorlzbjdpjc4k6dezlwoe
Recovery of equipment is not necessary to secure the record so that observa- tions may be made at any point where a satis- factory receiving station can be erected. ... These ascensions were undertaken to test the equipment under all usual operating conditions and to secure data at this latitude to compare with similar data obtained near the magnetic equator and reported ...
« Previous Showing results 1 — 15 out of 41,789 results