980 resultados para Official secrets


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The issue of how individual patients and their doctors should act in relation to the knowledge that the patient has a genetic condition— specifically, whether the patient and/or the doctor should or must inform relevant members of the patient’s family—is a looming area of medicolegal controversy. Over the last fifteen years or so, the issue of confidentiality versus disclosure has been particularly controversial in relation to HIV/AIDS patients.1 It has been argued that medical information about genetic disease gives rise to special problems vis-à-vis blood relatives. Because genetic disease is transmitted only by way of procreation, information about genetic disease is unique in that there is a propensity (which is highly variable and depends upon a variety of factors) for the condition to be shared by members of a family who are biologically related. Thus, genetic information about an individual may reveal information about relatives of that individual which is ‘specific (that the person has or will develop a genetic disease); or predictive (that the person has an unspecified risk of developing the disease)’

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WikiLeaks has become a global phenomenon, and its founder and spokesman Julian Assange an international celebrity (or terrorist, depending on one’s perspective). But perhaps this focus on Assange and his website is as misplaced as the attacks against Napster and its founders were a decade ago: WikiLeaks itself only marks a new phase in a continuing shift in the balance of power between states and citizens, much as Napster helped to undermine the control of major music labels over the music industry. If the history of music filesharing is any guide, no level of punitive action against WikiLeaks and its supporters is going to re-contain the information WikiLeaks has set loose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WikiLeaks has become a global phenomenon, and its founder and spokesman Julian Assange an international celebrity (or terrorist, depending on one’s perspective). But perhaps this focus on Assange and his website is as misplaced as the attacks against Napster and its founders were a decade ago: WikiLeaks itself only marks a new phase in a continuing shift in the balance of power between states and citizens, much as Napster helped to undermine the control of major music labels over the music industry. If the history of music filesharing is any guide, no level of punitive action against WikiLeaks and its supporters is going to re-contain the information WikiLeaks has set loose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secrets & Lies is an Australian drama television series that first screened on Network Ten on 3 March 2014. The series has aired in the Republic of Ireland on RTÉ TWO HD from 30 March, 2014 at 9.30pm. The series also debuted in Canada on the CBC in July 2014. It premiered in The Netherlands on RTL on 24 August 2014. Started in the UK on 23 September 2014 on Channel 5 and in France from January the 26 to February the 2 on France2. On 4 February 2014, the production company behind this version announced that a US version with the same title was in the works for ABC and would be co-produced with ABC Studios with a series penalty if the project is held back or not greenlighted by the network. The series premiered in the U.S. on 1 March 2015. Ryan Phillippe and Juliette Lewis stars in this adaptation. The series follows the story of a family man who finds the body of a young boy and quickly becomes the prime murder suspect. He has no choice but to try to find the real killer as his marriage, his kids, his reputation and his sanity are all at stake.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Leaked Trans-Pacific Partnership documents show the US is pushing for unprecedented penalties for those (like journalists) who expose trade secrets. Will Australia go along with the proposal?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces the notion of half-truths, a term used to describe the communication of technically truthful information that has been, or has the potential to be, undermined by the omission of key information. By using an illustrative, exemplar case this study shows how an organization’s transparency and credibility in relation to its corporate social responsibility communication can be undermined, despite presenting technically truthful information

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines the Chinese press discussion about democratic centralism in 1978-1981 in newspapers, political journals and academic journals distributed nationwide. It is thus a study of intellectual trends during the Hua Guofeng period and of methods, strategies, and techniques of public political discussion of the time. In addition, this study presents democratic centralism as a comprehensive theory of democracy and evaluates this theory. It compares the Chinese theory of democratic centralism with Western traditions of democracy, not only with the standard liberal theory but also with traditions of participatory and deliberative democracy, in order to evaluate whether the Chinese theory of democratic centralism forms a legitimate theory of democracy. It shows that the Chinese theory comes close to participatory types of democracy and shares a conception of democracy as communication with the theory of deliberative democracy. Therefore, the Chinese experience provides some empirical evidence of the practicability of these traditions of democracy. Simultaneously, this study uses experiences of participatory democracies outside of China to explain some earlier findings about the Chinese practices. This dissertation also compares Chinese theory with some common Western theories and models of Chinese society as well as with Western understandings of Chinese political processes. It thus aims at opening more dialogue between Chinese and Western political theories and understandings about Chinese polity. This study belongs to scholarly traditions of the history of ideas, political philosophy, comparative politics, and China studies. The main finding of this study is that the Chinese theory of democratic centralism is essentially a theory about democracy, but whether its scrupulous practicing alone would be sufficient for making a country a democracy depends on which established definition of democracy one applies and on what kind of democratic deficits are seen as being acceptable within a truly democratic system. Nevertheless, since the Chinese theory of democratic centralism fits well with some established definitions of democracy and since democratic deficits are a reality in all actual democracies, the Chinese themselves are talking about democracy in terms acceptable to Western political philosophy as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Official habits of Rabbi and Cantor as introduced by the Beden Oberrat der Israeliten (Central Council of Jews) in 1843. The distinction of the Rabbi is expressed in his wearing a silk mantle over his wool coat and a white double collar, representing the tablets of Moses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

10 coin set. Official Uncirculated coin set (5 coins): 1 Agora; 5 Agorot; 10 Agorot; 1/2 New Sheqel; 1 New Sheqel. Hanukka coin set (5 coins): 1 Agora; 5; Agorot; 10 Agorot; 1/2 New Sheqel; 1 New Sheqel. All Hanukka coins have on the obverse side Hanukkiyot and word Hanukka.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

8 coin set. 1 Sheqel; 5 Sheqalim; 10 Sheqalim; 2 times 50 Sheqalim-one with a portrait of David Ben-Gurion on the reverse side, one normal coin; 3 times 100 Sheqalim-one with a portrait of Ze'ev Jabotinsky on the reverse side, one with Hanukkah lamp on the obverse side, one normal plain coin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Obverse: Canada state emblem, a maple leaf, within the leaf there is a group of trees. Reverse: The area abounds in tree tops, all of them bending toward the center of the medal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.