970 resultados para Partage de secrets quantiques à seuil
Resumo:
Secrets & Lies is an Australian drama television series that first screened on Network Ten on 3 March 2014. The series has aired in the Republic of Ireland on RTÉ TWO HD from 30 March, 2014 at 9.30pm. The series also debuted in Canada on the CBC in July 2014. It premiered in The Netherlands on RTL on 24 August 2014. Started in the UK on 23 September 2014 on Channel 5 and in France from January the 26 to February the 2 on France2. On 4 February 2014, the production company behind this version announced that a US version with the same title was in the works for ABC and would be co-produced with ABC Studios with a series penalty if the project is held back or not greenlighted by the network. The series premiered in the U.S. on 1 March 2015. Ryan Phillippe and Juliette Lewis stars in this adaptation. The series follows the story of a family man who finds the body of a young boy and quickly becomes the prime murder suspect. He has no choice but to try to find the real killer as his marriage, his kids, his reputation and his sanity are all at stake.
Resumo:
Leaked Trans-Pacific Partnership documents show the US is pushing for unprecedented penalties for those (like journalists) who expose trade secrets. Will Australia go along with the proposal?
Resumo:
This paper introduces the notion of half-truths, a term used to describe the communication of technically truthful information that has been, or has the potential to be, undermined by the omission of key information. By using an illustrative, exemplar case this study shows how an organization’s transparency and credibility in relation to its corporate social responsibility communication can be undermined, despite presenting technically truthful information
Resumo:
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
Resumo:
For more than 25 years all sea turtle products have been prohibited from international commerce by the 170-member nations of the Convention on International Trade in Endangered Species (CITES). Sea turtles continue to be threatened by direct take (including poaching) and illegal trade despite multi-national protection efforts. Although take may contribute significantly to sea turtle decline, illegal take is difficult to measure since there are few quantified records associated with legal fisheries and fewer still for illegal take (poaching). We can, however, quantify one portion of the illegal sea turtle trade by determining how many illegal products were seized at United States ports of entry over a recent 10-year period. The United States Fish and Wildlife Service (USFWS) oversees the import and export of wildlife and wildlife products, ensuring that wildlife trade complies with United States laws and international treaties. Additionally, the USFWS has legal authority to target suspected illegal wildlife activity through undercover and field investigations. In an effort to assess the scale of illegal sea turtle take and trade, we have conducted a 10-year (1994 – 2003) review of the law enforcement database maintained by the USFWS. This database tracks the number and type of wildlife cases, the quantity of seized products, and the penalties assessed against violators. These data are minimum estimates of the sea turtle products passing through the United States borders, as smuggled wildlife is oftentimes not detected.
Resumo:
This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external FLASH-type ROM. The presence of the secret boot block is camouflaged by a decoy boot block in the external ROM. The code contained within the secret boot block is transferred to the CPU in the clear over a set of high-speed busses where it can be extracted using simple custom hardware. The paper concludes with recommendations for improving the Xbox security system. One lesson of this study is that the use of a high-performance bus alone is not a sufficient security measure, given the advent of inexpensive, fast rapid prototyping services and high-performance FPGAs.