842 resultados para Technology Network
Resumo:
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.
Resumo:
What characterises late modern variety of cosmopolitanism from its classical predecessors is the inherent connection between cosmopolitanism and technology. Technology enables a vital dimension of the cosmopolitan experience – to move beyond the cosmopolitan imagination to enable active, direct engagement with other cultures. Different types of technologies contribute to cosmopolitan practice but in this paper we focus on a specific set of these enabling technologies: technologies which play a crucial role in regulating the free movement of people and populations. We briefly examine how three of the great surveillance states of the 20th century – Nazi Germany, the Soviet Union, and the German Democratic Republic – used hightech solutions in pursuing an anti-cosmopolitanism. We suggest that in the period from 2001 to the present, important elements of the cosmopolitan ethos are being closed down, and once again high-tech is intimately connected to this moment. The increasing (and proposed) use of identity cards, biometric identification systems, ITS and GIS all work to make the globalised world much harder to traverse and inhibit the full expression and experience of cosmopolitanism. The result of these trends may be that the type of cosmopolitan sentiment exhibited in western countries is an ersatz, emptied out variety with little political-ethical robustness.
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.