68 resultados para Forgery
Resumo:
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected, interactive and autonomous environment is common to all sensor networks, biosystems and radio frequency identification (RFID) devices, and the emergence of significant deployments and sophisticated applications can be expected. However, as more information is collected and transmitted, security issues will become vital for such a fully connected environment. In this study the authors consider adding security features to low-cost devices such as RFID tags. In particular, the authors consider the implementation of a digital signature architecture that can be used for device authentication, to prevent tag cloning, and for data authentication to prevent transmission forgery. The scheme is built around the signature variant of the cryptoGPS identification scheme and the SHA-1 hash function. When implemented on 130 nm CMOS the full design uses 7494 gates and consumes 4.72 mu W of power, making it smaller and more power efficient than previous low-cost digital signature designs. The study also presents a low-cost SHA-1 hardware architecture which is the smallest standardised hash function design to date.
Resumo:
Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Contabilidade e Finanças sob orientação de Professor Doutor Adalmiro Alvaro Malheiro de Castro Andrade Pereira
Resumo:
La question de la propriété de l’information est reformulée en tenant compte de la problématique de l’espionnage économique, pratique déloyale ayant pour objet prioritaire l’accès à l’information privée d’un concurrent. L’atteinte aux intérêts légitimes d’un concurrent résulte du seul transfert de connaissance et peut donc être théoriquement indépendante d’une éventuelle contrefaçon ou d’un acte de parasitisme. C’est dans la perspective de cet accès illégitime à la seule information d’un concurrent qu’est ici envisagée la propriété de l’information per se. À l’heure actuelle, l’existence d’une telle propriété de l’information n’est pas démontrée en droit, l’information n’étant qu’une « chose » et non un « bien ». Mais, en reconnaissant que l’information peut être volée indépendamment de tout support, le droit pénal semble admettre indirectement cette propriété. De même, une jurisprudence ancienne relative à la concurrence déloyale protège celui qui ne peut se prévaloir d’un droit privatif, ce qui implique une « réservation » juridique de l’information, forme de « quasi-propriété ». Cela tend à démontrer que la propriété de l’information est juridiquement concevable. Cependant, les débats doctrinaux se sont rarement orientés vers la question de la réparation, essentielle en matière d’espionnage économique. Dans cette perspective, la reconnaissance d’une propriété de l’information est en réalité très limitée compte tenu du préjudice pouvant résulter de la perte d’exclusivité de l’information, préjudice pouvant être bien supérieur à la valeur de l’information elle-même. Plutôt que de reconnaître un droit de propriété sur l’information, la solution serait peut-être d’accorder à l’entreprise un droit subjectif à la protection de ses informations confidentielles, droit protégeant civilement contre la seule appréhension illégitime de telles informations.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Amazonian oils and fats display unique triacylglycerol (TAG) profiles and, because of their economic importance as renewable raw materials and use by the cosmetic and food industries, are often subject to adulteration and forgery. Representative samples of these oils (andiroba, Brazil nut, buriti, and passion fruit) and fats (cupuacu, murumuru, and ucuba) were characterized without pre-separation or derivatization via dry (solvent-free) matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS). Characteristic profiles of TAG were obtained for each oil and tat. Dry MALDI-TOF MS provides typification and direct and detailed information, via TAG profiles, of their variable combinations of fatty acids. A database from spectra could be developed and may be used for their fast and reliable typification, application screening, and quality control.
Resumo:
The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.
Resumo:
William Gaddis’s The Recognitions (1955) is a selfreflexive novel that portrays Wyatt Gwyon’s trajectory from childhood to maturity, as he rejects and searches for originality. The present work bestows an analysis of William Gaddis’s The Recognitions focusing on the problematization of originality and authorship proposed by the novel by means of the central issues of forgery and plagiarism, which bring with them two larger and more important sister-notions: authorship and originality. The novel questions the prevailing demand for originality and discusses the possibility of being original. It formulates an aesthetics of recognitions defended in the novel and used by the author in the making of this text. In order to do that, this work provides a view on the different concepts associated with the terms originality and original, as well as some of the main infringements related to them in contemporary society. It also offers an account of the development of the concepts of originality and authorship in Western society, showing the growing importance of the figure of the author and the parallel development of the concepts of plagiarism and copyright. The next three chapters are dedicated to attempt to provide an account of William Gaddis’s The Recognitions focusing on the main artist characters and an analysis of the novel in the light of the theoretical and historical background provided. The first of these chapters focuses on Wyatt’s trajectory and his visions of art. The second identifies and analyses Wyatt’s mirrors in the narrative, which reinforce the self-reflective structure of the novel. And the third chapter exemplifies and analyses Wyatt’s aesthetics of recognitions, which turns out to be Gaddis’s own aesthetics in the making of his fiction.
Resumo:
This work is an attempt to show that the ideological conflict that has been developed by the hegemony of the 1930 Revolution historical events in Paraíba, conceptually turned into an insoluble social contradiction. It ocurred due to imaginary or formal resolutions of the literature that ended up by altering the epistemological rules of the relation between fiction and reality. The present work is based on The unconscious politics: a narrative as a socially symbolic act , book in which all the literary or cultural texts can and should be read as symbolic resolutions to insoluble social contradictions. From string to contemporary literature this phenomenon has been registered by the several ways of textual production turning the 1930 Revolution into one of the main elements which guides the political scene of Paraíba. The ideological groups still centered on the political resentment and committed to a political conflict forged the existence of two historical truths: one which suits the liberais , the winners, and another is of the 1930 conflict. This work argues in favour of the unconscious politics of the 1930 Revolution. This thesis considers necessarily the relation that the Paraibana society maintains with its past and how this past reaches in the present the liberation of a hidden and repressed truth through its narrativization. Beyond that, how the ideological partiality generated the political resentment through the way of thinking of the rivals under the perspective of the good and evil reveals its insoluble social contradiction. Process which comprehends varied narrative forms of the mass culture products and literary production, as in the methodological perspective pointed by Fredric Jameson that all literary or cultural texts can and shall be read as symbolic resolutions of true political and social contradictions. In the case of Paraiba we will have resolutions that search for the reasons which caused the death of João Pessoa: forgery and publicity of love letters, dispute over the official version of suicide commited by João Dantas, the man who assassinated João Pessoa
Resumo:
Quello del falso è un problema con cui si sono dovuti confrontare gli specialisti di ogni epoca storica, ma che ha subito un’accelerazione e un’esasperazione con la storia del tempo presente, anche per via della simultanea presenza dei protagonisti che hanno reso più complessa una scena storica e memoriale segnata profondamente dal rapporto tra storici e testimoni e dall’articolazione della memoria pubblica e di quella privata. L’evento che più acutamente ha risentito del problema del falso in età contemporanea è certamente il genocidio degli ebrei compiuto dai nazisti durante la Seconda Guerra Mondiale perché è proprio al cuore dell’impresa genocidiaria che è avvenuta la grande falsificazione che ha alimentato qualsiasi successivo discorso revisionista. L’emersione del testimone sulla scena pubblica ha posto pertanto in modo acuto il problema dello statuto della testimonianza rendendo l’analisi del funzionamento della memoria indispensabile per comprendere quanto un testimone sia molto più utile per la descrizione, non tanto del fatto in sé, ma del modo in cui l’evento è stato socialmente codificato, registrato e trasmesso. Il legame tra i casi esaminati, pur nella loro estrema eterogeneità, spaziando da false autobiografie, come quella di Binjamin Wilkomirski, a testi controversi, come quello di Jean-François Steiner, o da racconti contestati, come quelli di Deli Strummer e Herman Rosenblat, a narrazioni che nel tempo hanno subito importanti variazioni, come nel caso Aubrac e nelle vicende del libro di Alcide Cervi, sarà stabilito grazie alla centralità giocata, in ognuno di essi, dalla forma testimoniale e dall’altrettanto fondamentale argomentazione in termini di affaire. Il problema del falso è stato perciò indagato all’interno delle ragioni storiche e culturali che hanno determinato la formazione discorsiva che ha per soggetto il testimone e la testimonianza come più autentico punto di vista sugli eventi del passato con le relative conseguenze sul piano storico e pubblico.
Resumo:
Focusing on one manuscript, today in the Bodleian Library, Oxford, this chapter deals with the question how early modern objects became collectable items. The manuscript is categorized as MS. Douce 387 and its name indicates that it came from the collection of Francis Douce (1757–1834), who was keeper of manuscripts in the British Museum from 1799 until 1811. MS. Douce 387 is described in the catalogue of the Douce’ian collection as the “presentation copy with coloured designs by Marten de Vos and others” of the 1595 printed festival book Descriptio publicae gratulationis … in adventu … Ernesti archiducis Austriae. This festival book, printed in Antwerp’s Plantin-Moretus press, was commissioned by the magistrate of the city of Antwerp to commemorate the Joyous Entry of Archduke Ernest of Austria from June 1594; that an “archducal copy” bound in red velvet was commissioned as well and was owned by the Archduke is know as well. However, first research showed that Oxford copy cannot be this “archducal copy” or Marten de Vos’s artist’s copy even though it is the only know version with a handwritten text and hand-drawn illustrations. It rather should be examined as something totally different altogether. The main question remains why someone then commissioned a hand made version of this festival book, something unknown for other books of this genre? Why would someone between 1600 and 1800 sit down and copy texts and prints from a collectable book? Why was there such an on-going interest in early modern festival books? Could this manuscript be the only later made copy of the “archducal volume” or is it rather a forgery made for the European collectors’ market?
Resumo:
En este trabajo se plantea, más allá de examinar las tesis principales del "revisionismo", la propia naturaleza del conocimiento histórico. ¿Son válidas todas las interpretaciones de un hecho histórico? ¿Se trata en tales casos de "otra lectura", de una "versión alternativa", es decir, de otra apreciación de los datos disponibles? ¿Cómo saber cuando hay mala interpretación deliberada o falsificación de la evidencia? ¿Puede detectarse si la argumentación tendenciosa es deshonesta? El "revisionismo histórico" se ha definido a sí mismo como una corriente historiográfica que ofrece otra versión de Hitler y su régimen. Cerca de una veintena de autores, desde los años cuarenta del siglo XX, se adscriben en esta tendencia, algunos de los cuales han desplegado una sostenida actividad y han logrado una llamativa repercusión en los medios de difusión. Este es el caso de David Irving. Autor de más de treinta libros, artículos, conferencias y discursos dedicados al III Reich, ha pasado largos años de su vida rastreando y estudiando archivos alemanes. Pero muy lejos de constituir un nuevo enfoque historiográfico del nazismo, el "revisionismo" de David Irving está imbuido de política e ideología y sus métodos de trabajo incluyen la adulteración y la distorsión intencional de la historia.
Resumo:
Signatures: A-N⁸.