Filters








520 Hits in 6.4 sec

Distance Bounding Facing Both Mafia and Distance Frauds

Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine
2014 IEEE Transactions on Wireless Communications  
This article introduces a noise-resilient distance-bounding protocol that resists to both mafia and distance frauds.  ...  Contactless technologies such as RFID, NFC, and sensor networks are vulnerable to mafia and distance frauds.  ...  However, none of the current DB protocols are lightweight and resistance to both mafia and distance frauds.  ... 
doi:10.1109/twc.2014.2323979 fatcat:75jym6uoc5fqjlium5pb34dczi

Forensic accounting and fraud investigation for non-experts

2012 ChoiceReviews  
In 1996, the ACFE published Report to the Nation on Occupational Fraud and Abuse based on occupational fraud cases reported by its members.  ...  Mafia.  ...  The Art of Testifying Experts often present highly technical information to nontechnical individuals.  ... 
doi:10.5860/choice.50-0964 fatcat:pvlxlab36bdsvoc37szo2q2wyu

Forensic accounting and fraud investigation for non-experts

2007 ChoiceReviews  
In 1996, the ACFE published Report to the Nation on Occupational Fraud and Abuse based on occupational fraud cases reported by its members.  ...  Mafia.  ...  The Art of Testifying Experts often present highly technical information to nontechnical individuals.  ... 
doi:10.5860/choice.44-5747 fatcat:lspbxrupvnhizp7fmerbcej3km

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Moreover, we present a novel distance-bounding protocol based on graphs that is extremely low-resource consuming.  ...  Some of them arise from the technology itself, such as distance checking, but others are related to the potential of RFID systems to gather huge amount of tracking data.  ...  The Poulidor Distance-bounding Protocol This chapter describes a novel distance-bounding protocol resistant to both mafia and distance fraud.  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

Returns to Education in Criminal Organizations: Did Going to College Help Michael Corleone?

Nadia Campaniello, Rowena Gray, Giovanni Mastrobuoni
2016 Social Science Research Network  
We use as a case study one of the longest running criminal corporations in history: the Italian-American mafia.  ...  . • Such returns are similar to those of white men of similar age living in the same neighborhood and are larger than those of immigrants, of Italian immigrants, and of US residents of Italian descent.  ...  Technical Report, National Bureau of Economic Research Mincer, Jacob (1974) 'Schooling, experience, and earnings. human behavior & social institutions no. 2.'  ... 
doi:10.2139/ssrn.2740211 fatcat:cri5avp7tnau7ovzcq2brnd6eu

Returns to education in criminal organizations: Did going to college help Michael Corleone?

Nadia Campaniello, Rowena Gray, Giovanni Mastrobuoni
2016 Economics of Education Review  
We use as a case study one of the longest running criminal corporations in history: the Italian-American mafia.  ...  . • Such returns are similar to those of white men of similar age living in the same neighborhood and are larger than those of immigrants, of Italian immigrants, and of US residents of Italian descent.  ...  Technical Report, National Bureau of Economic Research Mincer, Jacob (1974) 'Schooling, experience, and earnings. human behavior & social institutions no. 2.'  ... 
doi:10.1016/j.econedurev.2016.03.003 fatcat:eqlzomm2yje2rcwd5dfxzzhcae

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum
2009 Information Systems Frontiers  
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications.  ...  This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures  ...  Acknowledgements We would like to thank Michael Beye for providing valuable comments and discussions and Christos Dimitrakakis for additional proofreading.  ... 
doi:10.1007/s10796-009-9210-z fatcat:ssm2czwm3fbdxjqfket4ieyxha

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments [article]

Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes
2016 arXiv   pre-print
transactions provides an empirical foundation to categorically answer whether ambient sensors provide a strong proximity detection mechanism for security sensitive applications like banking, transport and  ...  Thus both devices reporting the values as "far".  ...  It should be noted, however, that the use of a PIN or biometric may not counter a relay attack effectively in certain situations (notably the Mafia fraud attack [16] ).  ... 
arXiv:1601.07101v2 fatcat:h7im424k65gzbfcsseqwwfyr3e

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

Martin Strohmeier, Vincent Lenders, Ivan Martinovic
2015 IEEE Communications Surveys and Tutorials  
This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security.  ...  The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community.  ...  attacks on distance bounding schemes given in the literature, among them a number of relay attacks such as the so-called distance fraud, Mafia fraud and terrorist fraud [97] as well as the newer distance  ... 
doi:10.1109/comst.2014.2365951 fatcat:iayryj2wevdwrjkw7as7634acu

Representations of power

Theresa Catalano, Linda R. Waugh
2016 Journal of Language and Politics  
While both offenders are portrayed with equal social distance and gaze, Bernard Madoff is smiling while the offender from Ch. 7 has a scowl on his face.  ...  For example, white collar/corporate criminals and Mafia groups both have substantial political and economic power in both countries and are both naturalized in media reports.  ...  knowledge… it must be rejected, altered, and exposed.‖ (Tony Morrison cited in Santa Ana, 2002, p.1) .  ... 
doi:10.1075/jlp.15.6.07cat fatcat:jlvi2wsmtbhrtcz7rrrg7inhnu

QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities

Dimitrios Kounas, Orfefs Voutyras, Georgios Palaiokrassas, Antonios Litke, Theodora Varvarigou
2020 Applied System Innovation  
We implement and validate the protocol for Android devices, showing that ultrasound-based profiles offer a better performance in terms of maximum receiving distance than audible profiles, and discuss its  ...  These services mainly rely on the sincerity of users, who can spoof the location they report to them.  ...  This specification is met by combining non-transferability, resistance to distance fraud, mafia fraud, and distance hijacking.  ... 
doi:10.3390/asi3020019 fatcat:va5buhksffhpxnzmletgxyiede

Mobilios lietuvių nusikaltėlių grupės Nyderlanduose

DINA SIEGEL
2015 Kriminologijos studijos  
According to the reports, these groups commit crimes against property, they are highly professional and well-organized.  ...  Since the end of the 1990s, the police in the Netherlands has regularly reported on the criminal activities of Lithuanian itinerant groups as part of the mobile banditry phenomenon.  ...  gambling and prostitution, but also on a much higher level in hi-tech fraud, cybercrime, and other non-conventional Mafia activities.  ... 
doi:10.15388/crimlithuan.2014.2.5088 fatcat:q7qonqzveng3lmtxivh2btkkry

Faking Science: A True Story of Academic Fraud

Diederik Stapel
unpublished
The Committee of Inquiry made a few reports to the media about its progress, brought out an interim report, and kept the eager public up to date with its discoveries of evidence of the scale of the fraud  ...  The first reports, describing my fraud in detail, have started to appear. Big photographs of me in the paper and on TV. We're having a party.  ...  Afterword I want to thank everybody who made this book possible, and whose contributions, remarks, and frank criticism made it much better than it would otherwise have been. You know who you are.  ... 
fatcat:lnaaosrv5zfuvhupcbu7ejkuai

Organised Crime, Captured Politicians and the Allocation of Public Resources

Marco Di Cataldo, Nicola Mastrorocco
2017 Social Science Research Network  
the mafia.  ...  In addition, we uncover key elements of local elections associated with mafia-government collusion.  ...  Appendix A.7 report the estimates for both capital and current expenditure.  ... 
doi:10.2139/ssrn.3124949 fatcat:xrpoz5tbkngtvibia47plspgd4

The New Direct Proximate Cause: How the United States Supreme Court Has Attempted to Limit Civil Rico in a Manner Congress Aimed to Protect

Gregory M. Zarin
2007 Social Science Research Network  
Both situations provide facts that, on their face, fall squarely under the RICO statute.  ...  fraud defendants "because securities laws generally provide adequate remedies for those injured by securities fraud, [and Congress believed] it [was] both unnecessary and unfair to expose defendants in  ... 
doi:10.2139/ssrn.962894 fatcat:53pa6hzs2fgubp7xq7pmq3ipom
« Previous Showing results 1 — 15 out of 520 results