3 resultados para secret shopping

em CORA - Cork Open Research Archive - University College Cork - Ireland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing evidence pertaining to Ireland’s Nine Years’ War (1594–1603) strongly lends itself to the impression that the majority of Old English Palesmen, at least those of higher social status, chose to support the English crown during this conflict rather than their co-religionist Gaelic Irish countrymen. Loyalties, however, were anything but straightforward and could depend on any number of cultural values, social concerns, and economic incentives. Nevertheless, James Fitzpiers Fitzgerald, a ‘Bastard Geraldine’ who served as sheriff of Kildare, seemed to have been driven by a genuine sense of duty to the English crown and establishment. With the outbreak of hostilities in the 1590s, Fitzpiers proved to be a devout crown servitor, risking life and limb to confront the English queen’s Irish enemies. But, in late 1598 he suddenly, and somewhat inexplicably, threw his lot in with the Irish confederacy, defying the government he had once championed. During the ensuing investigation, the Dublin administration accumulated much damning evidence against Fitzpiers, including a patriotic plea from rebel leader Hugh O’Neill which urged Fitzpiers to defend his Irish homeland from the oppressions of English Protestant rule. Yet, at the very same time, a counter case was made by Fitzpiers’s controversial English friend, Captain Thomas Lee, which argued that Fitzpiers’s actions were more loyal than anyone could have imagined. Through an examination of Fitzpiers’s perplexing case, this paper will explore the complicated nature of allegiances in 1590s Ireland and how loyalties were not always what they seemed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study contexualises the relationship between the armed forces and the civil authority in Ireland using and revising the theoretical framework advanced by Huntington. It tracks the evolution of the idea of a representive body for soldiers in the late 1980s, to the setting up of statutory associations under the Defence Amendment Act 1990. The study considers Irish soldiers political agitation and their use of peaceful democratic activities to achieve their aims. It highlights the fundamental policy arguments that were made against the idea of representation for the army and positions those arguments in the study of civil-military relations. Utilising unique access to secret Department of Defence files, it reveals in-depth ideological arguments advanced by the military authories in Ireland against independent representation. This thesis provides an academic study of the establishment of PDFORRA. It answers key questions regarding the change in the position of Irish government who were categorically opposed to the idea of representation in the army. It illustrates the involvement of other agencies such as the European Organisation of Military Associations (Euromil) reveals reciprocal support by the Irish associations to other emerging groups in Spain. Accessing as yet unpublished Department of Defence files, study analyses tension between the military authorities and the government. It highlights for the first time the role of enlisted personnel in the shaping of new state structures and successfully dismmisses Huntingtons theoretical contention that enlisted personnel are of no consequence in the study of civil-military relations. It fills a gap in our understanding, identified by Finer, as to how politicisation of soldiers takes place. This thesis brings a new dimension to the discipline of civil-military relations and creates new knowledge that will enhance our understanding of an area not covered previously.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.