119 resultados para Deutscher Bund (Secret society)

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Language is a unique aspect of human communication because it can be used to discuss itself in its own terms. For this reason, human societies potentially have superior capacities of co-ordination, reflexive self-correction, and innovation than other animal, physical or cybernetic systems. However, this analysis also reveals that language is interconnected with the economically and technologically mediated social sphere and hence is vulnerable to abstraction, objectification, reification, and therefore ideology – all of which are antithetical to its reflexive function, whilst paradoxically being a fundamental part of it. In particular, in capitalism, language is increasingly commodified within the social domains created and affected by ubiquitous communication technologies. The advent of the so-called ‘knowledge economy’ implicates exchangeable forms of thought (language) as the fundamental commodities of this emerging system. The historical point at which a ‘knowledge economy’ emerges, then, is the critical point at which thought itself becomes a commodified ‘thing’, and language becomes its “objective” means of exchange. However, the processes by which such commodification and objectification occurs obscures the unique social relations within which these language commodities are produced. The latest economic phase of capitalism – the knowledge economy – and the obfuscating trajectory which accompanies it, we argue, is destroying the reflexive capacity of language particularly through the process of commodification. This can be seen in that the language practices that have emerged in conjunction with digital technologies are increasingly non-reflexive and therefore less capable of self-critical, conscious change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Examines how society allocates support for species’ conservation when numbers involved are large and resources are limited. Rational behaviour suggests that species in urgent need of conservation will receive more support than those species that are common. However, we demonstrate that in the absence of balanced knowledge common species will receive support more than they would otherwise receive despite society placing high existence values on all species. Twenty four species, both common and endangered and some with a restricted distribution, are examined. We demonstrate that balanced information is vital in order to direct more support for species that are endangered than those that are not. Implications for conservation stemming from the findings are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“When cultural life is re-defined as a perpetual round of entertainments, when serious public conversation becomes a form of baby talk, when, in short, a people become an audience and their public business a vaudeville act, then a nation finds itself at risk.” (Postman) The dire tones of Postman quoted in Janet Cramer’s Media, History, Society: A Cultural History of US Media introduce one view that she canvasses, in the debate of the moment, as to where popular culture is heading in the digital age. This is canvassed, less systematically, in Thinking Popular Culture: War Terrorism and Writing by Tara Brabazon, who for example refers to concerns about a “crisis of critical language” that is bothering professionals—journalists and academics or elsewhere—and deplores the advent of the Internet, as a “flattening of expertise in digital environments”.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thousands of Australian children are sexually abused every year, and the effects can be severe and long lasting. Not only is child sexual abuse a public health problem, but the acts inflicted are criminal offences. Child sexual abuse usually occurs in private, typically involving relationships featuring a massive imbalance in power and an abuse of that power. Those who inflict child sexual abuse seek to keep it secret, whether by threats or more subtle persuasion. As a method of responding to this phenomenon and in an effort to uncover cases of sexual abuse that otherwise would not come to light, governments in Australian States and Territories have enacted legislation requiring designated persons to report suspected child sexual abuse. With Western Australia’s new legislation having commenced on 1 January 2009, every Australian State and Territory government has now passed these laws, so that there is now, for the first time, an almost harmonious legislative approach across Australia to the reporting of child sexual abuse. Yet there remain differences in the State and Territory laws regarding who has to make reports, which cases of sexual abuse are required to be reported, and whether suspected future abuse must be reported. These differences indicate that further refinement of the laws is required

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This book focuses on issues in literacy and technology at the K-12 level in a holistic manner so that the needs of teachers and researchers can be addressed through the use of state-of-the-art perspectives"

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper extends Appadurai’s notion of “scapes” to delineate what we see as “iScapes”. We contend that iScapes captures the way online technologies shape interactions that invariably filter into offline contexts, giving shape and meaning to human actions and motivations. By drawing on research on high school students’ online activities we examine the flow of iScapes they inhabit in the process of constructing identities and forming social relations.