73 resultados para trick
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Follow-the-Leader (FTL) is an intuitive sequential prediction strategy that guarantees constant regret in the stochastic setting, but has poor performance for worst-case data. Other hedging strategies have better worst-case guarantees but may perform much worse than FTL if the data are not maximally adversarial. We introduce the FlipFlop algorithm, which is the first method that provably combines the best of both worlds. As a stepping stone for our analysis, we develop AdaHedge, which is a new way of dynamically tuning the learning rate in Hedge without using the doubling trick. AdaHedge refines a method by Cesa-Bianchi, Mansour, and Stoltz (2007), yielding improved worst-case guarantees. By interleaving AdaHedge and FTL, FlipFlop achieves regret within a constant factor of the FTL regret, without sacrificing AdaHedge’s worst-case guarantees. AdaHedge and FlipFlop do not need to know the range of the losses in advance; moreover, unlike earlier methods, both have the intuitive property that the issued weights are invariant under rescaling and translation of the losses. The losses are also allowed to be negative, in which case they may be interpreted as gains.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Pranks, hoaxes and practical jokes are co-creative cultural performance practices that appear across times, contexts and cultures. These practices include everyday play amongst families, friends and coworkers, entertainment programs such as Prank Patrol, Punked or Scare Tactics, and aesthetic and activist pranks perpetrated by situationist artists, guerrilla artists, and, most recently, culture ‘jammers’ or ‘hackers’ intent on turning capitalist systems back on themselves. Although it can, in common usage, describe almost any show off behaviour, a prank in the strictest definition of the term is a performance that deploys a very specific set of strategies. It is an act of trickery, mischief, or deceit, that must be taken as real, and momentarily cause real fear, anger or worry for an unwitting spectator-become-performer, who is meant to play along until the trick is revealed and their response can be represented back to the prankster, other spectators, or society as a whole, either for the sake of entertainment or for the sake of commentary on a cultural phenomenon. A prank, in this sense, deliberately blurs the boundaries between daily and dramatic performance. It creates a moment of uncertainty, in which both the prankster’s ability to be creative, clever, or culturally astute, and the prankee’s ability to play along, discern the trick, discern the point of the trick, and, in the end, be duped, be a good sport, or even play/pay the prankster back, are both put to the test. In this paper, I consider a number of pranking traditions popular where I am in Australia, from the community-building pranks of footballers, bucks parties and ‘drop bear’ tales told to tourists, to the more controversial pranks of radio shock jocks, activists and artists. I use performance, spectatorship and ethical theory to examine the engagement between prankster, pranked spectator, and other spectators, in this most distinctive sort of community-driven performance practice, and the way it builds and breaks status, social and other sorts of relationships within and between specific communities.
Resumo:
A common trick for designing faster quantum adiabatic algorithms is to apply the adiabaticity condition locally at every instant. However it is often difficult to determine the instantaneous gap between the lowest two eigenvalues, which is an essential ingredient in the adiabaticity condition. In this paper we present a simple linear algebraic technique for obtaining a lower bound on the instantaneous gap even in such a situation. As an illustration, we investigate the adiabatic un-ordered search of van Dam et al. [17] and Roland and Cerf [15] when the non-zero entries of the diagonal final Hamiltonian are perturbed by a polynomial (in log N, where N is the length of the unordered list) amount. We use our technique to derive a bound on the running time of a local adiabatic schedule in terms of the minimum gap between the lowest two eigenvalues.
Resumo:
A literatura atribui a confiança e a desconfiança no Congresso Nacional ao resultado da avaliação do desempenho dos parlamentares. Pondera que, desde que associada ao crescimento da escolarização, da renda e da adesão à democracia, a desconfiança nas instituições democráticas pode refletir maior exigência de cidadãos críticos, ou democratas insatisfeitos, advindos de melhoria social. Nesta perspectiva, a reprovação é positiva, contanto que fenômeno específico, e potencialmente propulsora do engajamento cívico dos cidadãos, fundamental para a democracia nas chaves representativa e participativa. Na busca de uma cidadania crítica à brasileira, a pesquisa que origina o artigo analisou as segmentações de escolaridade e de renda da avaliação de desempenho parlamentar do Datafolha entre 2005 e 2008, período em que os cidadãos tiveram grande oferta de informação (no caso, negativa)sobre o Congresso Nacional e que concentrou dois dos três piores índices de reprovação da história da pesquisa, associados a eventos do escândalo do mensalão. Acabou por evidenciar que, além dos cidadãos críticos, nossas desigualdades parecem ter forjado outros dois tipos de cidadania, muitas vezes relevados pela literatura: a crente e a oculta, potencialmente prejudiciais ao regime, pela associação à baixa escolaridade e à baixa renda, pelo reforço à exclusão e pela própria invisibilidade. Preteridos na academia, não podem sê-lo pela "Casa de todos os brasileiros" em um País que vislumbra alcançar indicadores sociais próximos às democracias centrais na próxima década.
Resumo:
Configura-se como objeto desta pesquisa: o propósito do enfermeiro ao desenvolver ações de precaução de contato junto ao acompanhante de criança internada em uma unidade pediátrica. Objetivo: Apreender a contribuição do enfermeiro quando desenvolve ações de precaução de contato junto ao acompanhante de criança internada em uma unidade pediátrica. Estudo qualitativo, cujo referencial metodológico foi à fenomenologia sociológica de Alfred Schutz. O cenário foi uma unidade de internação pediátrica de um hospital escola de uma universidade pública situada no município do Rio de Janeiro. Os sujeitos foram sete enfermeiros que desenvolvem ou já desenvolveram ações de cuidados voltadas para a precaução de contato junto ao acompanhante de crianças internadas. Para coleta de dados foi utilizada a entrevista fenomenológica, tendo como questões orientadoras: Fale sobre as ações de precaução de contato que você desenvolve junto ao acompanhante das crianças internadas em precaução de contato? O que você tem em vista/ quais suas intenções ao desenvolver essas ações de precaução de contato junto ao acompanhante das crianças internadas na unidade pediátrica? Esta pesquisa foi aprovada pelo Comitê de Ética da instituição, cenário do estudo, com o número 15/11. A análise dos dados se deu após deixar de lado meus pressupostos e ouvir atentamente o que foi dito pelos sujeitos para apreender o típico da intencionalidade dos enfermeiros. Neste sentido, emergiram 2 (duas) categorias analíticas: Evitar infecções cruzadas entre crianças em precaução de contato com a participação dos acompanhantes e evitar infecção sem perder de vista a proteção psico-social da criança. A primeira categoria apontou que os enfermeiros desenvolvem ações de precaução de contato junto aos acompanhantes de crianças internadas com o objetivo de evitar infecções cruzadas. E a segunda, que os enfermeiros também desenvolvem ações de precaução de contato visando à proteção social da criança, sem perder de vista aspectos importante de seu desenvolvimento infantil, como o brincar e as brincadeiras. Conclui-se que as ações do enfermeiro com vistas à precaução de contato estiveram pautadas em dois aspectos: o biológico e o psico-social da criança. No que tange aos aspectos biológicos, as ações dos enfermeiros estiveram pautadas nas recomendações contidas em protocolos assistenciais e nas rotinas do hospital. Com relação aos aspectos psico-sociais, as ações dos enfermeiros pautaram-se para além das recomendações contidas nesses protocolos e nessas rotinas. No processo de internação dessas crianças, os enfermeiros compreendem que apesar delas se encontrarem em precaução de contato, o brincar é uma atividade essencial à sua saúde física, emocional e intelectual. Para tanto, utilizam-se de estratégias que favorecem o brincar e a brincadeira. Portanto, o estudo revelou o olhar consciente do enfermeiro acerca das medidas de precaução de contato junto ao acompanhante e a criança internada e apontou a necessidade de reformulação das políticas públicas voltadas para a prevenção de infecção hospitalar.
Resumo:
Addiction can be investigated from the perspective of decision making. Addicts usually make incorrect decisions when facing drug-related cues or they are driven to drugs, resulting in repeated drug seeking and taking. The present study adopted temporal discounting as behavioral task and on the basis of the fact that heroin addicts discounted more steeply than health participants (addicts preferred to choose immediate but smaller reward, regarded as myopia) which was consistent with previous research, three questions was raised and being concentrated on in this study. The first question was whether the character of myopia would be revealed in a somewhat complicated task? We designed a card game in which the participants were tested whether they would play the trump card in order to win a trick but not the whole game. Addicts played the trump card significantly earlier than controls did, indicating they focused on immediate single trick but not the game. Moreover, the performance in the card game and temporal discounting correlated significantly, suggesting addicts would display myopic decision not only in simply task like temporal discounting but also in task more complicated and similar to daily-life decision. Secondly, the present study adopted various kinds of temporal discounting tasks. In previous research, temporal discounting gain task was usually adopted. In the present study, we also adopted temporal discounting loss task. In either gain or loss task, there are two delayed amounts. Results showed in each decision condition addicts made poorer performance compared with control but in larger amount condition, addicts actually improved their decision performance. Meanwhile, addicts did not show loss aversion due to their close discount rates in gain and loss task while for controls, the discount rates were much lower in loss task than those in gain task. Thus we demonstrated that addicts were insensitive to negative outcomes by the method of temporal discounting. Finally, we investigated three mechanisms which exerted impacts on decision making. We adopted Go/NoGo task to test impulsivity and found addicts commits more errors (higher impulsivity) than controls did. We also designed a behavioral task which could be used to test drug-related compulsive behavior on human participants. Results showed addicts produced stereotyped key-pressing behavior when presented with drug-related cues. Furthermore, it was found participants with higher impulsivity displayed poorer performance in decision making but addicts with higher compulsivity only made poorer performance in smaller amount decision and the correlation between compulsivity and decision making was relative weak. In order to investigate the role of susceptibility and effect of drugs, we adopted years of abusing heroin as the indictor and discovered addicts with longer history of heroin abusing made poorer performance in smaller amount condition than addicts with shorter history. Also, the earlier the addicts began to use drug, the worse they would do in the smaller amount decision. The results here indicated drug itself could exert impact on decision making in certain condition. The present study revealed three characters of heroin addicts from the aspect of decision making: (1) focusing upon current benefit due to they preferred to choose immediate gain and delayed loss; (2) showed no loss aversion compared with healthy participants (3) inability to inhibit inappropriate response particularly when facing drug-related cue. These characters contribute to the facts that addicts seek and take drugs repeatedly while ignoring the negative consequences caused by abusing drugs.
Resumo:
We propose a new approach to the fermion sign problem in systems where there is a coupling U such that when it is infinite the fermions are paired into bosons, and there is no fermion permutation sign to worry about. We argue that as U becomes finite, fermions are liberated but are naturally confined to regions which we refer to as fermion bags. The fermion sign problem is then confined to these bags and may be solved using the determinantal trick. In the parameter regime where the fermion bags are small and their typical size does not grow with the system size, construction of Monte Carlo methods that are far more efficient than conventional algorithms should be possible. In the region where the fermion bags grow with system size, the fermion bag approach continues to provide an alternative approach to the problem but may lose its main advantage in terms of efficiency. The fermion bag approach also provides new insights and solutions to sign problems. A natural solution to the "silver blaze problem" also emerges. Using the three-dimensional massless lattice Thirring model as an example, we introduce the fermion bag approach and demonstrate some of these features. We compute the critical exponents at the quantum phase transition and find ν=0.87(2) and η=0.62(2). © 2010 The American Physical Society.
Resumo:
Social context, such as mate availability and perceived competition, can influence a male’s mating tactics. In Drosophila melanogaster most research has investigated how physical interactions and the perceived levels of sperm competition alter mating behaviour. I wanted to know if males would respond to the perceived social environments without the presence of physical interaction. Using a unique apparatus, I altered focal males’ social context by separating them physically from a social environment using a screen. Focal males were either in: (i) the presence of rival males and mates, (ii) the presence of potential mates only, (iii) isolation, or (iv) the presence of rival males only. I also manipulated the period the focal male was conditioned to a social environment to assess if the timing of cues is important. My findings suggest that the duration of acclimation alters male mating tactics. Regardless of social environment, the duration a male was conditioned influenced copulation latency. Males that were conditioned to their social environment for the duration of the experiment had differing copulation latencies between environments. Males held in isolation took longer to successfully court females, and transferred less sperm during mating then experimental males in the presence of rival males. Additionally, copulation duration correlated with the number of sperm transferred. Overall, my results suggest that the social environment and the perceived competition level affect mating strategies even without physical interactions. Since this apparatus may trick flies into believing they are a part of a social group, while controlling the male mating status, future work could examine behavioural, genetic and physiological phenotype effects of the social environment for both sexes.
Resumo:
Medieval 'new towns' seem to echo Roman towns in having a grid of streets associated with a fortress, and have often been credited with a standard plan applied by the hand of authority. Here the authors analyse the new towns founded by Edward I in Wales and find some highly significant variations. Rediscovering the original layouts by high precision survey and GIS mapping, they show that some towns, founded at the same time and on similar topography, had quite different layouts, while others, founded at long intervals, had plans that were almost identical. Documentation hints at the explanation: it was the architects, masons and ditch-diggers, not the king and aristocracy, who established and developed these blueprints of urban life.