943 resultados para identity-based cryptosystem


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aim of the study was to get acquainted with the activity of Näppärät Mummot, a Lahti-based crafts society, and its importance to the wellness of the members of the group. The selected aim, i.e., analyzing the wellness, largely affected the whole research process and its results. According to earlier studies in the field, different forms of craft and expressional activity promote one's wellness as well as support the work for one's identity. Based on my theoretical knowledge, my research was set out to: 1) form a general view of crafts culture within Näppärät Mummot and 2) find out how recollective craft that promotes wellness is perceived through communality, experiential activity, work for one's identity, and divided as well as undivided craft. Qualitative field work was governed by ethnographic research strategy, according to which I set out to get thoroughly familiar with the society I was studying. The methods I used to collect data were participant observation and thematic interview. I used a field diary for writing down all data I acquired through the observation. The interviewee group was formed by seven members of Näppärät Mummot. An mp3 recorder was used to record the interviews, which I transcribed later. The method for data analysis was qualitative content analysis, for which I used Weft QDA, a qualitative analysis software application. I formed themes that shed light on research tasks from the data using coding and theory-driven analysis. I kept literature and data I collected in cooperation through the whole analysis process. Lastly, drawing from the classes of meaning of therapeutic craft that I sketched by means of summarizing and classifying, I presented the central concepts that describe the main results of the study. The main results were six concepts that describe Näppärät Mummot's crafts culture and recollective craft with its wellness-beneficial effect: 1) autobiographical craft, 2) shared work for one's identity, 3) shared intention for craft, 4) craft as a partner, 5) individual manner of craft, and 6) shared improvement. Craft promoted wellness in many ways. It was used to promote inner life management in difficult times and it also provided sensations of empowerment through pleasure from craft. Expressional, shared craft also served as means of reinforcing one's identity in various ways. Expressional work for one's identity through autobiographical themes of craft represented rearranging one's life through holistic craft. A personal way of doing things also served as expressional action and work for one's identity even with divided craft. Shared work for identities meant reinforcing the identities of the members through discources of craft and interaction with their close ones. What proves the interconnection between communality and craft as well as their shared meaning is that communality motivated the members to work on their craft projects, while craft served as the means of communication between the members: communication through craft was easier than lingual communication. The results can not be generalized to apply to other groups: they are used to describe the versatile means of recollective craft to promote the well-being among the crafts society Näppärät Mummot. However, the results do introduce a new perspective to the social discussion on how cultural activities promote well-being.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Gentlemen, Lads and the Art of War The Construction of Citizen Soldier- and Professional Soldier Armies into the Miracle of the Winter War During the 1920s and 1930s The Miracle of the Winter War was not a myth - at least according to them, who were making that miracle to happen. This study is not just about the Armed Forces and society, but moreover a study about civil society inside the organization of armed forces. Conscription kept Finnish military organization (and is still keeping) very closely connected with civil society and therefore there is no need to locate the possible critical misunderstandings brought by two different identity-based approaches. The great performance of the Armed Forces during the Second World War was not made of superior art of war. It was not the high level of discipline either. Art of war is basically a (deep level) cultural level equation that has more to do with culturally absorbed schemes of meaning making than rational decision-making. Naturally attrition based approach to effect-making directed the organizational methods in attrition based organisational practices, where there were only minor possibilities to practice any manoeuvre-based organisational behaviour. The practice and method of leadership lent similarly to the attrition-based thinking, which directed the organisational cultural thoughts towards composition that confirmed antagonism between gentlemen and lads . This setting has been absorbed and learned through cultural socialisation and was therefore not a product of the military organisation itself. The Finnish Armed Forces included two different communities (gentlemen and lads) within the same organisation as there were both the official and the unofficial organisations presented. This caused problems as they both made meaning-making processes simultaneously. These organisations had their own overlapping and in most cases also contradictory social meanings. The unofficial organisation has been overshadowed by the vast number of studies concerning the official organisation. The main reason for this systematic neglect is based on the reality of the attitudes and living conditions of the micro-level organisation which produced (perhaps) too realistic and repulsive viewpoints that are presenting a picture of a national level identity process in a way that is separating it from the ideals made to verify the ethos of national values. Complaining, griping, grumbling and moaning are usually situated in a category of abnormal and unwanted behaviour. However, within the context of a citizen soldier army community this was more of a characteristic feature of that organisation (in Finland) and therefore it was crucially important to locate the context of that abnormal behaviour. According to this study, it was not a malicious act but moreover seriously formed efforts in trying to use common sense in the chaos citizen soldiers faced when they were uniformed and placed in an unfamiliar process of disciplinary measures and frictions and competition between different ranks. There is much evidence that reinforces the argument that what seemed to be the most unconventional behaviour was finally the most efficient in a sense of military performance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Somalia the central government collapsed in 1991 and since then state failure became a widespread phenomenon and one of the greatest political and humanitarian problems facing the world in this century. Thus, the main objective of this research is to answer the following question: What went wrong? Most of the existing literature on the political economy of conflict starts from the assumption that state in Africa is predatory by nature. Unlike these studies, the present research, although it uses predation theory, starts from the social contract approach of state definition. Therefore, rather than contemplating actions and policies of the rulers alone, this approach allows us to deliberately bring the role of the society – as citizens – and other players into the analyses. In Chapter 1, after introducing the study, a simple principal-agent model will be developed to check the logical consistence of the argument and to make the identification of causal mechanism easier. I also identify three main actors in the process of state failure in Somalia: the Somali state, Somali society and the superpowers. In Chapter 2, so as to understand the incentives, preferences and constraints of each player in the state failure game, I in some depth analyse the evolution and structure of three central informal institutions: identity based patronage system of leadership, political tribalism, and the Cold War. These three institutions are considered as the rules of the game in the Somali state failure. Chapter 3 summarises the successive civilian governments’ achievements and failures (1960-69) concerning the main national goals, national unification and socio-economic development. Chapter 4 shows that the military regime, although it assumed power through extralegal means, served to some extent the developmental interest of the citizens in the first five years of its rule. Chapter 5 shows the process, and the factors involved, of the military regime’s self-transformation from being an agent for the developmental interests of the society to a predatory state that not only undermines the interests of the society but that also destroys the state itself. Chapter 6 addresses the process of disintegration of the post-colonial state of Somalia. The chapter shows how the regime’s merciless reactions to political ventures by power-seeking opposition leaders shattered the entire country and wrecked the state institutions. Chapter 7 concludes the study by summarising the main findings: due to the incentive structures generated by the informal institutions, the formal state institutions fell apart.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A fibromialgia é uma síndrome reumática que atinge cerca de 2% da população brasileira, sendo 90% dos pacientes do gênero feminino. Os principais sintomas são dor crônica generalizada, depressão, desânimo e fadiga acentuada, provocando dificuldades sociais e afetivas cotidianas. Objetivo: O objetivo principal deste estudo foi apreender e interpretar sentidos e significados que mulheres com fibromialgia atribuem às práticas terapêuticas corporais realizadas no Projeto de Extensão: Tratamento Multidisciplinar para Pacientes Portadores de Fibromialgia realizado na Universidade do Estado do Rio de Janeiro (UERJ). Todas as mulheres foram diagnosticadas em ambulatórios públicos e privados e depois se inscreveram voluntariamente no tratamento gratuito disponibilizado. Nossa principal hipótese de estudo procura relacionar o adoecimento dessas mulheres com o regime social de trabalho, que aumenta o sofrimento e, por conseguinte, provoca somatização do mal-estar gerado. Métodos: Trata-se de um estudo socioantropológico com campo etnográfico, no qual foram observadas as práticas corporais semanais nos anos 2009-2010. Também foram realizadas fotografias e entrevistas em profundidade com todas as mulheres que participavam regularmente das práticas corporais. De igual modo, realizamos entrevistas por computador e por telefone com mulheres diagnosticadas por fibromialgia em diversas cidades brasileiras. Resultados: Foi possível compreender que estar em um local onde podem se relacionar com outras pessoas com os mesmos sinais e sintomas e que compartilhar situações de sofrimento semelhantes contribui para construção de uma identidade de grupo baseada no cuidado e no acolhimento. Assim, elas constroem coletivamente valores de cuidado com o corpo e com a saúde. Conclusões: A participação assídua no tratamento oferecido aumenta a qualidade de vida e a vitalidade de mulheres com fibromialgia, contribuindo para a promoção da saúde não apenas na sua dimensão físico-orgânica, mas em sua totalidade sócio-afetiva.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Neste trabalho, a partir da recorrência à literatura de cordel como fonte histórica, será apresentada de que forma a reprodução da temática do cangaço nesses folhetos permitem que os migrantes nordestinos constituam uma identidade regionalista baseada no apego aos valores tradicionais da sua região natal. Dentro desse contexto, relacionamos o processo migratório dos nordestinos para as grandes metrópoles situadas no Sudeste, sobretudo Rio de Janeiro e São Paulo, com a difusão e recepção dos cordéis nesses estados entre as décadas de 1950 e 1980. No que concerne a abordagem do cangaço nos versos da literatura de cordel, na qual atribui aos cangaceiros o papel de símbolos regionais, serão pontuadas as principais estratégias adotadas pelos cordelistas que possibilitam a identificação e a empatia dos migrantes vindos do Nordeste com os personagens do cangaço narrados nos folhetos, contribuindo para um maior estreitamento entre Nordeste e nordestino. Nesse sentido, vale ressaltar a ressignificação da imagem dos cangaceiros, deslocando sua representação de homens cruéis e bárbaros para a reprodução de heróis-vilãos, isto é, protagonistas de personalidades ambíguas e contraditórias

Relevância:

80.00% 80.00%

Publicador:

Resumo:

分析了现有的网格认证框架中存在的问题,提出了一种基于身份的多信任域网格认证模型.该模型以基于身份的PKI为基础,避免了基于传统PKI的认证框架的诸多缺点.同时,该模型提供了跨信任域的双向实体认证功能.模拟试验表明,该认证模型比基于传统PKI的认证框架更轻量、更高效.而且由于该模型可以在多信任域的环境下工作,故而比W Mao提出的只能在单一信任域中工作的认证框架更符合网格认证的实际需要.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

利用Hess的基于身份的数字签名方案,Gu和Zhu提出了一个基于身份的可验证加密签名协议,并认为该协议在随机预言模型下是可证明安全的,从而可以作为基本模块用于构建安全的基于身份的公平交换协议.文章对该协议的安全性进行了深入分析,结果表明该协议存在如下的安全缺陷:恶意的签名者可以很容易地构造出有效的可验证加密签名,但是指定的仲裁者却不能把它转化成签名者的普通签名,因此不能满足可验证加密签名协议的安全需求;而且该协议容易遭受合谋攻击.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Subhayan Sen等人提出了一个基于细胞自动机的分组密码系统(cellular automata based cryptosystem,简称CAC),但并没有给出CAC的某些构造模块的细节描述,从应用角度考虑,将其中的一个模块固定得到CAC的变形--SMCAC(samemajor-CACAC).对SMCAC进行密码分析,结果表明,CAC的这种变形在选择明文攻击下是极不安全的.对SMCAC进行分析的意义在于,知道CAC的具体设计细节以后,借鉴对SMCAC的分析,有可能对CAC密码系统本身的安全性造成威胁.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

G?l, A. (2005). Imagining the Turkish nation through 'othering' Armenians. Nations and Nationalism. 11(1), 121-139 RAE2008

Relevância:

80.00% 80.00%

Publicador:

Resumo:

For a multiplicity of socio-economic, geo-political, strategic and identity-based reasons, Turkey’s progress towards EU membership is often treated as a sui generis case. Yet although Turkey’s accession negotiations with the European Union (EU) are essentially a bilateral – and often stormy – affair, they take place within a wider and dynamic process of enlargement in which not only can the gloomy – sometimes dark – shadows of past and prospective enlargements be clearly detected, but so too can the often chill winds from ongoing, parallel negotiations with other candidates. How the EU negotiates accession and what it expects from candidates has continued to evolve since the EU began drawing up its framework for negotiations with Turkey ten years ago. This paper charts this evolution by first identifying changes in the light of Croatia’s negotiating experience, the ‘lessons learnt’ by the EU in meeting the challenges of Bulgarian and Romanian accession, the EU’s handling of Iceland’s membership bid and accession negotiations, and the revised approach to negotiating accession evident in the more recent frameworks for accession negotiations with Montenegro and Serbia. The paper then explores the extent to which these changes have impacted on the approach the EU has adopted in framing and progressing accession negotiations with Turkey. In doing so, it questions both the consistency with which the EU’s negotiates accession and the extent to which Turkey’s progress towards EU membership is conditioned by the broader dynamics of EU enlargement as opposed to simply the dynamics within EU-Turkey relations and domestic Turkish reform efforts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tese de doutoramento, Filosofia (Filosofia em Portugal), Universidade de Lisboa, Faculdade de Letras, 2014

Relevância:

80.00% 80.00%

Publicador:

Resumo:

La figure des « pionniers » et des « pionnières » est devenue un référent culturel identitaire fondamental dans le développement de la mémoire collective québécoise. Nous montrons que ces objets culturels s’intègrent et participent à la représentation identitaire imaginée et conçue à l’intérieur d’un discours visant à affirmer une identité fondée en bonne partie sur l’histoire des Canadiens issus de l’immigration française du XVIIe siècle. La conjoncture politique du XIXe siècle favorise l’émergence d’un récit patriotique et d’un discours nationaliste conservateur, tissés par certains auteurs et appuyés par les élites politiques et les membres du clergé. Ces discours ont contribué à construire la nation canadienne et à l’inscrire dans un passé lointain et glorieux - dans l’imaginaire des « civilisations ». Dans cette perspective, l’objet culturel « pionnier » et l’objet culturel « filles du roi » sont mobilisés avec force dans la construction du passé magnifié de la nation canadienne. Nous nous intéresserons donc à la construction de l’image de ces deux figures pionnières dans les récits sur les origines nationales, ainsi qu’à leur utilisation dans le développement d’un sentiment identitaire canadien-français.