899 Hits in 8.3 sec

Security Goals: Packet Trajectories and Strand Spaces [chapter]

Joshua D. Guttman
2001 Lecture Notes in Computer Science  
One problem area is the "packet protection problem," concerning how to use the security services provided by routers-services such as packet filtering and the IP security protocols-to achieve useful protection  ...  Mathematical modeling allows us to develop algorithms and proof methods to ensure that the mechanisms achieve particular security goals.  ...  The security goal here is to prevent the delivery of certain packets, and the definition of which packets involves two different types of information.  ... 
doi:10.1007/3-540-45608-2_4 fatcat:xszh7rjml5arnd2qm3rtdoojwq

Security and Fear: The Geopolitics of Intimate Partner Violence Policing

Dana Cuomo
2013 Geopolitics  
Through a feminist geographic analytic, I examine how these two practices affect intimate partner violence survivors' holistic security needs and ability to act as autonomous individuals.  ...  Women experiencing intimate partner violence had little recourse from state institutions for security or legal justice.  ...  ACKNOWLEDGEMENTS I am thankful to the National Science Foundation and the Society of Women Geographers for funding this research, and to the American Association of University Women for funding my final  ... 
doi:10.1080/14650045.2013.811642 fatcat:nntlyx5nqffpzmmafn7hjkapwu

A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems

Farooq Shaikh, Mohamed Rahouti, Nasir Ghani, Kaiqi Xiong, Elias Bou-Harb, Jamal Haque
2019 IEEE Access  
However, due to the complex and multidimensional nature of aviation operations, no single technology can achieve the above goal.  ...  Note that the topics related to military aviation security are not considered here.  ...  ACKNOWLEDGMENT The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of NSF.  ... 
doi:10.1109/access.2019.2916617 fatcat:ri4hayamyzbnxjhj5u7gd2u4ei

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security.  ...  The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  No [115] 2009 -Strand spaces model [149] -Authentication and Key Agreement -Confidentiality -Analyze security performance of the authentication and key agreement protocol.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Availability of Network Improvement for Ship's Optical Communication Range

Ganesh Kumar, A. Arivazhagan Arivazhagan
2017 Indonesian Journal of Electrical Engineering and Computer Science  
A few system accessibility structures and assurance situations are exhibited and the accessibility assessed.  ...  Introduction Upgrading people's expediency and congregation some data for securing could be more noteworthy than the sailing technique.  ...  Optical strands for use on shipping vessels must be impervious to water, oil and consumption, they should not manage consuming, they should have low outflow of smoke and expanded adaptability and mechanical  ... 
doi:10.11591/ijeecs.v8.i2.pp552-554 fatcat:axeuxspagzhpjoc6e6l2syccma

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
We emphasize the challenges involved in non-media watermarking in terms of common watermarking properties, including invisibility, capacity, robustness, and security.  ...  INDEX TERMS Digital watermarking, information hiding, data mining, data security, big data.  ...  Spatiotemporal is a particular form of spatial data related to both space and time such as trajectories of a moving object.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Forgotten people: poverty, risk and social security in Indonesia: the case of the Madurese

2015 ChoiceReviews  
, and secondary information sources, such as abstracting and indexing services including databases.  ...  Koninklijke Brill nv incorporates the imprints Brill, Brill Nijhoff and Hotei Publishing.  ...  As long as general goals and general solutions are presented as solutions to people's specific problems without taking diversity into account, then social security and anti-poverty programmes will never  ... 
doi:10.5860/choice.190286 fatcat:roh7ku4jhfh55guhe73ryhi74y

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
Moreover, this paper discussed the processing of packets forwarding within DAIM model as well as the risk scenarios of the DAIM model.  ...  Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs.  ...  focuses in forwarding packets. • Security: DAIM is supporting security by using network security protocols.  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

Mobile Clustering Scheme for Pedestrian Contact Tracing: The Covid-19 Case Study

Mario E. Rivero-Angeles, Víctor Barrera-Figueroa, José E. Malfavón-Talavera, Yunia V. García-Tejeda, Izlian Y. Orea-Flores, Omar Jiménez-Ramírez, José A. Bermúdez-Sosa
2021 Entropy  
Our proposal shows an increased success packet transmission probability and a reduced collision and idle slot probability, effectively improving the performance of the system compared to the case of direct  ...  Hence, we propose a mobile clustering scheme where only a selected number of pedestrians (Cluster Heads) collect the information of the people around them (Cluster Members) in their trajectory inside the  ...  The benefits of such specific devices are the additional security and privacy compared to using mobile phones.  ... 
doi:10.3390/e23030326 pmid:33802131 pmcid:PMC7999408 fatcat:dprsb5ypnrfoppfnvurwrdpkqe

Leaky Apps and Data Shots: Technologies of Leakage and Insertion in NSA-Surveillance

Lonneke Van der Velden
2015 Surveillance & Society  
Taking a post-Foucauldian trajectory within surveillance theory as a point of reference, in which conceptual frameworks tended to emphasize data bodies and data flows, this article argues that the leaks  ...  potentially open new conceptual repertoires and research sites.  ...  Acknowledgments I would like to thank Sabine Niederer, Liliana Bounegru, Ernst van den Hemel, Maxigas, and the anonymous reviewers for their useful comments on this paper and Matthijs Koot and Rejo Zenger  ... 
doi:10.24908/ss.v13i2.5315 fatcat:brwzzn5majcsdjazcnznv6mldy

A fully implantable 96-channel neural data acquisition system

Michael Rizk, Chad A Bossetti, Thomas A Jochum, Stephen H Callender, Miguel A L Nicolelis, Dennis A Turner, Patrick D Wolf
2009 Journal of Neural Engineering  
The system was implanted acutely in sheep and successfully recorded, processed, and transmitted neural data.  ...  This system performs spike detection and extraction within the body and wirelessly transmits data to an external unit. Power is supplied wirelessly through the use of inductively-coupled coils.  ...  Won, and H. Arora for their work on integrated-circuit design; and D. Bastakoty for his work on the interface to the spike sorting software.  ... 
doi:10.1088/1741-2560/6/2/026002 pmid:19255459 pmcid:PMC2680289 fatcat:2tr6egahenfk3pqfxs2evibeim

Secure Neighbor Discovery and Ranging in Wireless Networks

Marcin Poturalski
These countermeasures allow the system designer to trade off security, ranging precision and cost in terms of transmission power and packet length.  ...  This thesis addresses the security of two fundamental elements of wireless networking: neighbor discovery and ranging.  ...  The authors of [146] extend the strand space formalism [145] with notions of message propagation time and device location to be able to reason about the security of simple DB and related protocols.  ... 
doi:10.5075/epfl-thesis-5131 fatcat:i3gowp4nyjgrhpf6dtukknceki

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

James P.G. Sterbenz, David Hutchison, Egemen K. Çetinkaya, Abdul Jabbar, Justin P. Rohrer, Marcus Schöller, Paul Smith
2010 Computer Networks  
It is widely recognised that the Internet is not sufficiently resilient, survivable, and dependable, and that significant research, development, and engineering is necessary to improve the situation.  ...  This paper provides an architectural framework for resilience and survivability in communication networks and provides a survey of the disciplines that resilience encompasses, along with significant past  ...  Commission under grants EU FP6-IST-27489 (Autonomic Network Architecture) and FP7-224619 (ResumeNet).  ... 
doi:10.1016/j.comnet.2010.03.005 fatcat:jlye7k7cjzg5hdics457bnxhbi

Simulation of Route Optimization with load balancing Using AntNet System

Ashish Kumar Sharma Ashish Kumar Sharma
2013 IOSR Journal of Computer Engineering  
The complete system model shows the scenario of Packet distribution between nodes, and if congestion occurs due to traffic then Packet to be failed.  ...  Packets between nodes are routed of the pheromone distributions at each next node. The performance of the network is proportional to packets which are failed.  ...  Chavhan and others who have contributed towards the preparation of the paper.  ... 
doi:10.9790/0661-1140107 fatcat:cj275itmxndyvomoapvvho5v3e

SCIENCE PEACE SECURITY '19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research

Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel
and Security) and CROSSING (DFG Collaborative Research Centre) at TU Darmstadt as well as FONAS (Research Association for Science, Disarmament and International Security) and the German Foundation for  ...  ACKNOWLEDGEMENTS The three-day conference was mainly organized by PEASEC (Science and Technology for Peace and Security) in cooperation with IANUS (Interdisciplinary Working Group on Science, Technology  ...  further argon atoms along their trajectory.  ... 
doi:10.25534/tuprints-00009164 fatcat:v6353gscpbeungviumxnedydf4
« Previous Showing results 1 — 15 out of 899 results