985 resultados para Resistance identity
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
This essay explores the political significance of Balinese death/thrash fandom. In the early 1990s, the emergence of a death/thrash scene in Bali paralleled growing criticism of accelerated tourism development on the island. Specifically, locals protested the increasing ubiquity of Jakarta, 'the centre', cast as threatening to an authentically 'low', peripheral Balinese culture. Similarly, death/thrash enthusiasts also gravitated toward certain fringes, although they rejected dominant notions of Balinese-ness by gesturing elsewhere, toward a global scene. The essay explores the ways in which death/thrash enthusiasts engaged with local discourses by coveting their marginality, and aims to demonstrate how their articulations of 'alien-ness' contributed in important ways to a broader regionalism.
Resumo:
Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy while all 'others' are indeed 'othered'. This article draws on research carried out by the authors in a core first year university ethics class, in which a fictional text was introduced with the intention of unpacking these discourses. An ethnographic study was undertaken where both students and teachers engaged in discussions over, and personal written reflections on, the textual content. In reporting the results of that study this article uses a post-structural framework to identify how classroom and textual discourses might be used to break down socially constructed categories of sexuality and students' conceptualisations of non-heterosexual behaviour. It was found that engaging in discussion in the context of the fictional text allowed some students to begin to recognise their own heteronormative views and engage in an informed critique of them.
Resumo:
In this review, the authors interrogate the recent identity turn in literacy studies by asking the following: How do particular views of identity shape how researchers think about literacy and, conversely, how does the view of literacy taken by a researcher shape meanings made about identity? To address this question, the authors review various ways of conceptualizing identity by using five metaphors for identity documented in the identity literature: identity as (1) difference, (2) sense of self/subjectivity, (3) mind or consciousness, (4) narrative, and (5) position. Few literacy studies have acknowledged this range of perspectives on and views for conceptualizing identity and yet, subtle differences in identity theories have widely different implications for how one thinks about both how literacy matters to identity and how identity matters to literacy. The authors offer this review to encourage more theorizing of both literacy and identity as social practices and, most important, of how the two breathe life into each other.