845 resultados para Secure Authentication for Broadcast (DNP3-SAB)
Resumo:
Describes different approaches to authentication for wireless networks, and the evolution of eduroam
Resumo:
Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.
Resumo:
Resumen tomado del propio recurso
Resumo:
No consta el depósito legal
Resumo:
Explica cómo se elabora el jabón a partir de la sosa cáustica y el aceite.
Resumo:
El artículo pertenece a una sección monográfica de la revista dedicada a nuevas formas de comunicación: cibermedios y medios móviles. - Resumen tomado parcialmente de la revista.
Resumo:
En este texto el autor se propone cotejar la historia de Nay y Sinar incluida en la novela María, de Jorge Isaacs (1867), con la de Bernabé en Sab (publicada en Madrid en 1841), de Gertrudis Gómez de Avellaneda. Esta exploración busca, por un lado, crear un contrapunto de ambos textos, por otro lado, se propone pasar revista a temas como la construcción de lo masculino en los dos textos, la posición antiesclavista de las mismas y Madre Natura como antagonista y coadyuvante de los protagonistas. Para cerrar este trabajo el autor aplicará un par de ideas de Benedict Anderson intentando explicar lo siguiente: los personajes de Isaacs y Gómez de Avellaneda provienen de una comunidad imaginada perdida y se ven en la imposibilidad de reproducir en un contexto diferente los límites de ese reino que ya no existe o que quizá no existió, por ser parte de la imaginación comunitaria.
Resumo:
One of the essential needs to implement a successful e-Government web application is security. Web application firewalls (WAF) are the most important tool to secure web applications against the increasing number of web application attacks nowadays. WAFs work in different modes depending on the web traffic filtering approach used, such as positive security mode, negative security mode, session-based mode, or mixed modes. The proposed WAF, which is called (HiWAF), is a web application firewall that works in three modes: positive, negative and session based security modes. The new approach that distinguishes this WAF among other WAFs is that it utilizes the concepts of Artificial Intelligence (AI) instead of regular expressions or other traditional pattern matching techniques as its filtering engine. Both artificial neural networks and fuzzy logic concepts will be used to implement a hybrid intelligent web application firewall that works in three security modes.