3 resultados para Hidden, Samuel.
em AMS Tesi di Laurea - Alm@DL - Università di Bologna
Resumo:
Il concetto di mobilita' delle persone, assieme alla sempre maggior dipendenza di queste ai servizi offerti da Internet,ha fatto nascere la necessita' di rimanere connessi ad Internet indipendentemente dai propri spostamenti, mantenendo inalterate le prestazioni delle connessioni. HPforMSC, l'oggetto di questa tesi, e' un'architettura basata su hidden proxy che permette in maniera del tutto trasparente all'utente di utilizzare contemporaneamente le varie interfacce di rete a disposizione mantenendo inalterate le performance di tutte le comunicazioni in essere durante un handover, sia esso orizzontale o verticale.
Resumo:
Approaching the world of the fairy tale as an adult, one soon realizes that things are not what they once seemed during story time in bed. Something that once appeared so innocent and simple can become rather complex when digging into its origin. A kiss, for example, can mean something else entirely. I can clearly remember my sister, who is ten years older than I am, telling me that the fairy tales I was told had a mysterious hidden meaning I could not understand. I was probably 9 or 10 when she told me that the story of Sleeping Beauty, which I used to love so much in Disney’s rendering, was nothing more than the story of an adolescent girl, with all the necessary steps needed to become a woman, the bleeding of menstruation and the sexual awakening - even though she did not really put it in these terms. This shocking news troubled me for a while, so much so that I haven’t watched that movie since. But in reality it was not fear that my sister had implanted in me: it was curiosity, the feeling that I was missing something terribly important behind the words and images. But it was not until last year during my semester abroad in Germany, where I had the chance to take a very interesting English literature seminar, that I fully understood what I had been looking for all these years. Thanks to what I learned from the work of Bruno Bettelheim, Jack Zipes, Vladimir Propp, and many other authors that wrote extensively about the subject, I feel I finally have the right tools to really get to know this fairy tale. But what I also know now is that the message behind fairy tales is not to be searched for behind only one version: on the contrary, since they come from oral traditions and their form was slowly shaped by centuries of recountals and retellings, the more one digs, the more complete the understanding of the tale will be. I will therefore look for Sleeping Beauty’s hidden meaning by looking for the reason why it did stick so consistently throughout time. To achieve this goal, I have organized my analysis in three chapters: in the first chapter, I will analyze the first known literary version of the tale, the French Perceforest, and then compare it with the following Italian version, Basile’s Sun, Moon, and Talia; in the second chapter, I will focus on the most famous and by now classical literary versions of Sleeping Beauty, La Belle Au Bois Dormant, written by the Frenchman, Perrault, and the German Dornröschen, recorded by the Brothers Grimm’s; finally, in the last chapter, I will analyze Almodovar’s film Talk to Her as a modern rewriting of this tale, which after a closer look, appears closely related to the earliest version of the story, Perceforest.
Resumo:
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.