28 resultados para Conference on Security and Cooperation in Europe (1972-1975 : Helsinki, Finland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Friction stir processing was carried out on the Al-Mg-Mn alloy to achieve ultrafine grained microstructure. The evolution of microstructure and micro-texture was studied in different regions of the deformed sample, namely nugget zone, thermo-mechanically affected zone (TMAZ) and base metal. The average grain sizes of the nugget zone, TMAZ and base metal are 1.5 mu m +/- 0.5 mu m, 15 mu m +/- 8 mu m, and 80 mu m +/- 10 mu m, respectively. The TMAZ exhibits excessive deformation banding structure and sub-grain formation. The orientation gradient within the sub-grain is dependent on grain size, orientation, and distance from nugget zone. The microstructure was partitioned based on the grain orientation spread and grain size values to separate the recrystallized fraction from the deformed region in order to understand the micromechanism of grain refinement. The texture of both deformed and recrystallized regions are similar in nature. Microstructure and texture analysis suggest that the restoration processes are different in different regions of the processed sample. The transition region between nugget zone and TMAZ exhibits large elongated grains surrounded by fine equiaxed grains of different orientation which indicate the process of discontinuous dynamic recrystallization. Within the nugget zone, similar texture between deformed and recrystallized grain fraction suggests that the restoration mechanism is a continuous process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grain growth kinetics was studied for commercially pure magnesium subjected to equal channel angular extrusion (ECAE). The specimens were ECAE processed upto 4 passes at 523 K following all the three important routes, namely A, 13, and C. Texture and microstructures of the samples were studied using Electron Back Scattered Diffraction (EBSD) technique in a Field Emission Gun Scanning Electron Microscope (FEG-SEM). It was observed that the grain size significantly reduces after ECAE. ECAE process produces a slightly rotated B and C-2 fiber. Static annealing leads to normal grain growth with unimodal distribution of grains through out the temperature range. Average activation energy for grain growth in the temperature range studied is found to be less than the activation energy for lattice diffusion and grain boundary diffusion of magnesium. No significant change in texture during isochronal annealing for 1 hour i.e., the predominant deformation texture remains same.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Studies of the reaction of metal chlorides, MCl2 (M = Mn, Co, Ni, Cu, Zn) with PPHF at room temperature have shown that Mn, Co and Zn form the corresponding metal fluorides, MF2, while Ni and Cu form their dipyridine metal(II) dichloride complexes. Nickel and copper complexes further undergo fluorination and complexation by potassium hydrogen fluoride in PPHF to form KNiF3 and KCuF3.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A hexagonal mesoporous phase based on SnO2 is synthesized for the first time by using an anionic surfactant; hexagonal phases of TiO2 are prepared with neutral amine surfactants.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.