25 resultados para Secure connection

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes are known to enable multiparty computation protocols secure against general (nonthreshold) adversaries.Two open problems related to the complexity of multiplicative LSSSs are considered in this paper. The first one deals with strongly multiplicative LSSSs. As opposed to the case of multiplicative LSSSs, it is not known whether there is an efficient method to transform an LSSS into a strongly multiplicative LSSS for the same access structure with a polynomial increase of the complexity. A property of strongly multiplicative LSSSs that could be useful in solving this problem is proved. Namely, using a suitable generalization of the well-known Berlekamp–Welch decoder, it is shown that all strongly multiplicative LSSSs enable efficient reconstruction of a shared secret in the presence of malicious faults. The second one is to characterize the access structures of ideal multiplicative LSSSs. Specifically, the considered open problem is to determine whether all self-dual vector space access structures are in this situation. By the aforementioned connection, this in fact constitutes an open problem about matroid theory, since it can be restated in terms of representability of identically self-dual matroids by self-dual codes. A new concept is introduced, the flat-partition, that provides a useful classification of identically self-dual matroids. Uniform identically self-dual matroids, which are known to be representable by self-dual codes, form one of the classes. It is proved that this property also holds for the family of matroids that, in a natural way, is the next class in the above classification: the identically self-dual bipartite matroids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L'objectiu d'aquest projecte és estudiar i implementar una solució segura de connectivitat sense fil a la infraestructura actual aprofitant al màxim tots els sistemes ja implementats, de manera que no pateixin greus canvis estructurals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the design and implementation of QRP, an open source proof-of-concept authentication system that uses a two-factorauthentication by combining a password and a camera-equipped mobile phone, acting as an authentication token. QRP is extremely secure asall the sensitive information stored and transmitted is encrypted, but it isalso an easy to use and cost-efficient solution. QRP is portable and can be used securely in untrusted computers. Finally, QRP is able to successfully authenticate even when the phone is offline.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cobre Las Cruces is a renowned copper mining company located in Sevilla, with unexpected problems in wireless communications that have a direct affectation in production. Therefore, the main goals are to improve the WiFi infrastructure, to secure it and to detect and prevent from attacks and from the installation of rogue (and non-authorized) APs. All of that integrated with the current ICT infrastructure.This project has been divided into four phases, although only two of them have been included into the TFC; they are the analysis of the current situation and the design of a WLAN solution.Once the analysis part was finished, some weaknesses were detected. Subjects such as lack of connectivity and control, ignorance about installed WiFi devices and their localization and state and, by and large, the use of weak security mechanisms were some of the problems found. Additionally, due to the fact that the working area became larger and new WiFi infrastructures were added, the first phase took more time than expected.As a result of the detailed analysis, some goals were defined to solve and it was designed a centralized approach able to cope with them. A solution based on 802.11i and 802.1x protocols, digital certificates, a probe system running as IDS/IPS and ligthweight APs in conjunction with a Wireless LAN Controller are the main features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resorting to four waves of the European Community Household Panel, this research explores the association between temporary employment and the likelihood of being over-educated. Such an association has been largely ignored by the literature explaining over-education, more inclined to attribute such a mismatch to the system of education. Selecting three similarly standarised and stratified systems of education (France, Italy and Spain) and controlling for many other variables likely to affect over-education, like gender, age, tenure, job change, firm size or sector, the paper demonstrates that such an association between temporary employment and over-education exists. Being a stepping stone towards a more stable and adjusted position in the labour market, holding a temporary employment may be associated to a higher likelihood of being over-educated. Such an association is more likely in Italy and France. Yet, the opposite sign prevails where permanent employment becomes such a valuable asset as to make individuals trade human capital by employment security. This is the case of Spain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Context.LS 5039 has been observed with several X-ray instruments so far showing quite steady emission in the long term and no signatures of accretion disk. The source also presents X-ray variability at orbital timescales in flux and photon index. The system harbors an O-type main sequence star with moderate mass-loss. At present, the link between the X-rays and the stellar wind is unclear. Aims.We study the X-ray fluxes, spectra, and absorption properties of LS 5039 at apastron and periastron passages during an epoch of enhanced stellar mass-loss, and the long term evolution of the latter in connection with the X-ray fluxes. Methods.New XMM-Newton observations were performed around periastron and apastron passages in September 2005, when the stellar wind activity was apparently higher. April 2005 Chandra observations on LS 5039 were revisited. Moreover, a compilation of H EW data obtained since 1992, from which the stellar mass-loss evolution can be approximately inferred, was carried out. Results.XMM-Newton observations show higher and harder emission around apastron than around periastron. No signatures of thermal emission or a reflection iron line indicating the presence of an accretion disk are found in the spectrum, and the hydrogen column density () is compatible with being the same in both observations and consistent with the interstellar value. 2005 Chandra observations show a hard X-ray spectrum, and possibly high fluxes, although pileup effects preclude conclusive results from being obtained. The H EW shows yearly variations of 10%, and does not seem to be correlated with X-ray fluxes obtained at similar phases, unlike what is expected in the wind accretion scenario. Conclusions.2005 XMM-Newton and Chandra observations are consistent with 2003 RXTE/PCA results, namely moderate flux and spectral variability at different orbital phases. The constancy of the seems to imply that either the X-ray emitter is located at 1012 cm from the compact object, or the density in the system is 3 to 27 times smaller than that predicted by a spherical symmetric wind model. We suggest that the multiwavelength non-thermal emission of LS 5039 is related to the observed extended radio jets and is unlikely to be produced inside the binary system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers empirical evidence from Spain of a connection between the tax administration and the political power. Firstly, the regional tax administration is not immune to the budgetary situation of regional government, and tends to exert a greater (or lesser) effort in tax collection the greater (or lower) the (expected) public deficit. At the same time, the system of unconditional grants from the central layer of government provokes an ¿income effect¿ which disincentivises the efforts of the tax administration. Secondly, these efforts also decrease when the margin to lose a parliamentary seat in an electoral district is cut, although the importance of this disincentive decreases according to the parliamentary strength of the incumbent

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers empirical evidence from Spain of a connection between the tax administration and the political power. Firstly, the regional tax administration is not immune to the budgetary situation of regional government, and tends to exert a greater (or lesser) effort in tax collection the greater (or lower) the (expected) public deficit. At the same time, the system of unconditional grants from the central layer of government provokes an ¿income effect¿ which disincentivises the efforts of the tax administration. Secondly, these efforts also decrease when the margin to lose a parliamentary seat in an electoral district is cut, although the importance of this disincentive decreases according to the parliamentary strength of the incumbent

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the gains from increased wage flexibility and their dependence on exchange rate policy, using a small open economy model with staggered price andwage setting. Two results stand out: (i) the impact of wage adjustments on employment is smaller the more the central bank seeks to stabilize the exchange rate,and (ii) an increase in wage flexibility often reduces welfare, and more likely so ineconomies under an exchange rate peg or an exchange rate-focused monetary policy.Our findings call into question the common view that wage flexibility is particularlydesirable in a currency union.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El objetivo de este trabajo es implementar una herramienta segura, intuitiva y útil de dispositivo electrónico móvil para que un alumno interactúe con el entorno educativo virtual creado por el Campus de Trabajo UOC. La herramienta ayuda al alumno a trabajar con la UOC sin necesidad de conectarse directamente desde un portátil, desde cualquier lugar, siempre y cuando, se tenga conexión a Internet. El TFG está enfocado a desarrollarse en el entorno de Windows Phone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.