90 resultados para password
Resumo:
This is an image taken from Anatomy tv, an interactive resource for teaching and learning in anatomy and physiology which the University Library subscribes to. This image may not be changed, but you may take a copy and present it with other materials and resources you are using so long as they are password protected for access by members of the University only. "All products and all images within the products are protected by copyright. The products and images can only be used for private educational purposes, unless a specific license is purchased for any other usage. For any commercial usage of the images, please contact Primal Pictures Limited. The products allow members of the University of Southampton to ‘copy and paste’ all of the text as well as the images in the 3D-model window and all of the slides. These can then be pasted into nearly any other word-processing or graphics program, including Powerpoint. These resources can be made available to members of the University of Southampton via a password-protected service. This again is designed solely as a service for private educational uses. Like any publisher, Primal Pictures protects itself against copyright infringement. Please do contact Debra Morris in the University Library before using these resources to ensure that conditions are respected. ©Primal Pictures Limited 2007
Resumo:
A colour image of the human heart. This is an image taken from Anatomy tv, an interactive resource for teaching and learning in anatomy and physiology which the University Library subscribes to. This image may not be changed, but you may take a copy and present it with other materials and resources you are using so long as they are password protected for access by members of the University only. All products and all images within the products are protected by copyright. The products and images can only be used for private educational purposes, unless a specific license is purchased for any other usage. For any commercial usage of the images, please contact Primal Pictures Limited. The products allow members of the University of Southampton to ‘copy and paste’ all of the text as well as the images in the 3D-model window and all of the slides. These can then be pasted into nearly any other word-processing or graphics program, including Powerpoint. These resources can be made available to members of the University of Southampton via a password-protected service. This again is designed solely as a service for private educational uses. Like any publisher, Primal Pictures protects itself against copyright infringement. Please do contact Debra Morris in the University Library before using these resources to ensure that conditions are respected. ©Primal Pictures Limited 2007
Resumo:
For students learning JavaScript programming, this exercise sets out a fairly complete template for a DHTML implementation of Life. Students have to program the missing sections of code and attempt the extra features described. Only I have the password to unlock the solution!
Resumo:
Lecture slides and notes for a PhD level course on linear algebra for electrical engineers and computer scientists. This course is given in in the framework of the School of Electronics and Computer Science Mathematics Training Courses https://secure.ecs.soton.ac.uk/notes/pg_maths/ (ECS password required)
Resumo:
This set of questions on astronomy can be used to show the main question types available. You will need to log in using your University username and password
Resumo:
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.
Resumo:
Guidance for University of Reading staff wishing to add CentAUR publication lists to CMS web pages: staff profile page; department page; standard page. Log in with University of Reading (staff) username and password when prompted.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
In this work, we identify the set of time-dependent pure states building the statistical mixture to which a system, initially in a pure state, is driven by the reservoir. This set of time-dependent pure states, composing what we term a pure basis, are those that diagonalize the reduced density operator of the system. Next, we show that the evolution of the pure-basis states reveals an interesting phenomenon as the system, after decoherence, evolves toward the equilibrium: the spontaneous recoherence of quantum states. Around our defined recoherence time, the statistical mixture associated with a special kind of initial states termed even-symmetric, spontaneously undergoes a recoherence process, by which the initial state of the system emerges from the mixture except for its reduced excitation drained into the reservoir. This phenomenon reveals that the reservoir only shuffle the original information carried out by the initial state of the system instead of erasing it. Moreover, as the spontaneously recohered state occurs only for asymptotic time, we also present a protocol to extract it from the mixture through specific projective measurements. The password to retrieve the original information stems is the knowledge of both the initial state itself and the associated pure basis. A definition of the decoherence time of an N-state superposition is also presented.
Resumo:
The contemporary conjuncture based on the capitalistic knowledge converges to the corporal consciousness that makes us see, feel, taste and hear, be in/to pieces. Disembodied reason legitimate and legislate ways of being and living socially and its development is the dehumanization of human relations causing pain and suffering. The objective of this work is to discuss the body as pedagogical matrix through imagistic/artistic elements: music, painting and literature. Metaphors lead to self knowledge of human subjectivity and approach us to the kaleidoscope of sensitive knowledge and enables learning to learn with the infinite combinations of images, knowledge, feelings and worldviews. The song Memória da Pele comes in the voice of Maria Betânia speak of the memories that are not mine, but are tattooed in me in the memory of skin, singing the memories of a love lived by who tries to forget rationally, but the body insists on remembering. It is password to think about what we are. The short story by Clarice Lispector, entitled Miss Algarve, narrates the life story of an unmarried and virgin woman, and her encounter with an alien called Ixtlan. Until then, she who lived as if every day were a Monday, found herself seduced by the pleasure of having a body in contact with another body, which also allowed her to give visibility to the bodies of others. She had repudiation by the immorality that her body and the other s perspired. The discovery of the body brings important lessons for nursing, involving our body and the others'. The painting the flying bed or Henry Ford Hospital, by Frida Kahlo, is our final metaphor. The traumatic experience of abortion is shown in this painting trough the picture of the artist naked in a hospital bed. This painting invites us to reflect on our work process. We need to think in multiple dimensions of the being and accept the invitation of art, so that the lightness confronts us with the weight imposed by the hegemonic ideology. I believe it is not a single view, but the many views that should justify the knowledge and practices of nursing; what matters is that they are woven into the dialogue, democracy, provided that protagonism of those individuals involved in this process, in the wandering and uncertainty, in the rewiring, solidarity, plurality. To this end, the body must be the great pedagogue that is able to be viewed not as a tapestry seen by the right view, as the logical knowledge sees, but seen by the opposite side in its singular, irregular, discontinuous weavings
Resumo:
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient mechanisms that assures user authentication in this sort of environment, in the system login as well as throughout his session, has been pointed out as a serious deficiency. Some studies have been led about possible biometric applications for web authentication. However, password based authentication still prevails. With the popularization of biometric enabled devices and resultant fall of prices for the collection of biometric traits, biometrics is reconsidered as a secure remote authentication form for web applications. In this work, the face recognition accuracy, captured on-line by a webcam in Internet environment, is investigated, simulating the natural interaction of a person in the context of a distance course environment. Partial results show that this technique can be successfully applied to confirm the presence of users throughout the course attendance in an educational distance course. An efficient client/server architecture is also proposed. © 2009 Springer Berlin Heidelberg.
Resumo:
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
[ES] Este Trabajo de Fin de Grado ha tenido como objetivo el desarrollo de un gestor de menús de restaurantes como aplicación web para una empresa que ofrece hostings de menús y publicidad mediante la publicación de dichos menús en pantallas y portales web. Las empresas asociadas (bares y restaurantes) podrán elaborar menús compuestos de dos platos (primero y segundo), postre y bebidas para ser ‘enviados’ al servicio de publicación. La aplicación proporciona un sistema de gestión de dichos menús facilitando la reutilización de platos entre menús, la personalización de la imagen representativa de cada plato, así como diversas operaciones de copia, visualización y modificación de los menús y de los platos. Los usuarios registrados tendrán la posibilidad de recuperar su contraseña de forma automática en caso de que la misma sea olvidada. La información relacionada con los platos, menús y usuarios registrados será almacenada automáticamente sobre una base de datos diseñada al efecto. Por otro lado, la aplicación web dispone de una página accesible únicamente para el administrador para la gestión de los usuarios, por ejemplo, editar, alta, baja, habilitar y deshabilitar cuentas de usuarios. Por último, las tecnologías y herramientas utilizadas en la elaboración de este trabajo incluyen Php, Mysql, jQuery, CSS, HTML y sobre todo el framework Twitter Bootstrap que ha sido de gran ayuda en el desarrollo del proyecto.