906 resultados para secure shell(SSH)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In traditional communication systems the transmission medium is considered as a given characteristic of the channel, which does not depend on the properties of the transmitter and the receiver. Recent experimental demonstrations of the feasibility of extending the laser cavity over the whole communication link connecting the two parties, forming an ultra-long fiber laser (UFL), have raised groundbreaking possibilities in communication and particularly in secure communications. Here, a 500 km long secure key distribution link based on Raman gain UFL is demonstrated. An error-free distribution of a random key with an average rate of 100 bps between the users is demonstrated and the key is shown to be unrecoverable to an eavesdropper employing either time or frequency domain passive attacks. In traditional communication systems the transmission medium is considered as a given characteristic of the channel, which does not depend on the properties of the transmitter and the receiver. Recent demonstrations of the feasibility of extending the laser cavity over the whole communication link connecting the two parties, forming an ultra-long fiber laser (UFL), have raised groundbreaking possibilities in communication. Here, a 500 km long secure key distribution link based on Raman gain UFL is demonstrated. © 2014 by WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thermal evolution of titania-supported Au shell–Pd core bimetallic nanoparticles, prepared via colloidal routes, has been investigated by in situ XPS, DRIFTS, EXAFS and XRD and ex situ HRTEM. As-prepared nanoparticles are terminated by a thin (∼5 layer) Au shell, encapsulating approximately 20 nm diameter cuboctahedral palladium cores, with the ensemble stabilised by citrate ligands. The net gold composition was 40 atom%. Annealing in vacuo or under inert atmosphere rapidly pyrolyses the citrate ligands, but induces only limited Au/Pd intermixing and particle growth <300 °C. Higher temperatures promote more dramatic alloying, accompanied by significant sintering and surface roughening. These changes are mirrored by the nanoparticle catalysed liquid phase selective aerobic oxidation of crotyl alcohol to crotonaldehyde; palladium surface segregation enhances both activity and selectivity, with the most active surface alloy attainable containing ∼40 atom% Au.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

High quality CuS and CuS/ZnS core/shell nanocrystals (NCs) were synthesized in a large quantity using a facile hydrothermal method at low temperatures of 60 C and evaluated in the photodegradation of Rhodamine B (RhB) under visible light irradiation. Synthesis time plays an important role in controlling the morphology, size and photocatalytic activity of both CuS and CuS/ZnS core/shell NCs which evolve from spherical shaped particles to form rods with increasing reaction time, and after 5 h resemble "flower" shaped morphologies in which each "flower" is composed of many NCs. Photocatalytic activity originates from photo-generated holes in the narrow bandgap CuS, with encapsulation by large bandgap ZnS layers used to form the core/shell structure that improves the resistance of CuS towards photocorrosion. Such CuS/ZnS core/shell structures exhibit much higher photocatalytic activity than CuS or ZnS NCs alone under visible light illumination, and is attributed to higher charge separation rates for the photo-generated carriers in the core/shell structure. © 2013 Elsevier B.V.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analysis of protein function in a cellular context ideally requires physiologically representative levels of that protein. Thus conventional nucleic acid-based transfection methods are far from ideal owing to the over expression that generally results. Likewise fusions with protein transduction domains can be problematic whilst delivery via liposomes/nanoparticles typically results in endosomal localisation. Recently polymer microspheres have been reported to be highly effective at delivering proteins into cells and thus provide a viable new alternative for protein delivery (protein transduction). Herein we describe the successful delivery of active ribonuclease A into HeLa cells via novel polymer core-silica shell microspheres. Specifically, poly(styrene-co-vinylbenzylisothiouronium chloride) core particles, generated by dispersion polymerisation, were coated with a poly(styrene-co-trimethoxysilylpropyl methacrylate) shell. The resultant core-shell morphology was characterised by transmission electron, scanning electron and fluorescence confocal microscopies, whilst size and surface charge was assessed by dynamic light scattering and zeta-potential measurements, respectively. Subsequently ribonuclease A was coupled to the microspheres using simple carbodiimide chemistry. Gel electrophoresis confirmed and quantified the activity of the immobilised enzyme against purified HeLa RNA. Finally, the polymer-protein particles were evaluated as protein-transduction vectors in vitro to deliver active ribonuclease A to HeLa cells. Cellular uptake of the microspheres was successful and resulted in reduced levels of both intracellular RNA and cell viability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

N-doped ZnO/g-C3N4 hybrid core–shell nanoplates have been successfully prepared via a facile, cost-effective and eco-friendly ultrasonic dispersion method for the first time. HRTEM studies confirm the formation of the N-doped ZnO/g-C3N4 hybrid core–shell nanoplates with an average diameter of 50 nm and the g-C3N4 shell thickness can be tuned by varying the content of loaded g-C3N4. The direct contact of the N-doped ZnO surface and g-C3N4 shell without any adhesive interlayer introduced a new carbon energy level in the N-doped ZnO band gap and thereby effectively lowered the band gap energy. Consequently, the as-prepared hybrid core–shell nanoplates showed a greatly enhanced visible-light photocatalysis for the degradation of Rhodamine B compare to that of pure N-doped ZnO surface and g-C3N4. Based on the experimental results, a proposed mechanism for the N-doped ZnO/g-C3N4 photocatalyst was discussed. Interestingly, the hybrid core–shell nanoplates possess high photostability. The improved photocatalytic performance is due to a synergistic effect at the interface of the N-doped ZnO and g-C3N4 including large surface-exposure area, energy band structure and enhanced charge-separation properties. Significantly, the enhanced performance also demonstrates the importance of evaluating new core–shell composite photocatalysts with g-C3N4 as shell material.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Workflows are set of activities that implement and realise business goals. Modern business goals add extra requirements on workflow systems and their management. Workflows may cross many organisations and utilise services on a variety of devices and/or supported by different platforms. Current workflows are therefore inherently context-aware. Each context is governed and constrained by its own policies and rules to prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing unauthorised services and/or data. We present a sound and multi-layered design language for the design and analysis of secure and context aware workflows systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the Kerr nonlinearity in a core-shell microspherical resonator fabricated from a silicon fiber. By exploiting the ultrafast wavelength shifting, sub-picosecond modulation is demonstrated. © OSA 2015.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present experimental results on a 50km fiber laser switching among four different values of the free-spectral range for possible applications in secure key-distribution. © 2014 OSA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The distribution of the secret key is the weakest link of many data encryption systems. Quantum key distribution (QKD) schemes provide attractive solutions [1], however their implementation remains challenging and their range and bit-rate are limited. Moreover, practical QKD systems, employ real-life components and are, therefore, vulnerable to diverse attack schemes [2]. Ultra-Long fiber lasers (UFLs) have been drawing much attention recently because of their fundamentally different properties compared to conventional lasers as well as their unique applications [3]. Here, we demonstrate a 100Bps, practically secure key distribution, over a 500km link, employing Raman gain UFL. Fig. 1(a) depicts a schematic of the UFL system. Each user has an identical set of two wavelength selective mirrors centered at l0 and l 1. In order to exchange a key-bit, each user independently choose one of these mirrors and introduces it as a laser reflector at their end. If both users choose identical mirrors, a clear signal develops and the bits in these cases are discarded. However if they choose complementary mirrors, (1, 0 or 0, 1 states), the UFL remains below lasing threshold and no signal evolves. In these cases, an eavesdropper can only detect noise and is unable to determine the mirror choice of the users, where the choice of mirrors represent a single key bit (e.g. Alice's choice of mirror is the key-bit). These bits are kept and added to the key. The absence of signal in the secure states faxilitates fast measurements to distinguish between the non-secure and the secure states and to determine the key-bit in the later case, Sequentially reapeating the single bit exchange protocol generate the entire keys of any desirable length. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our modular approach to data hiding is an innovative concept in the data hiding research field. It enables the creation of modular digital watermarking methods that have extendable features and are designed for use in web applications. The methods consist of two types of modules – a basic module and an application-specific module. The basic module mainly provides features which are connected with the specific image format. As JPEG is a preferred image format on the Internet, we have put a focus on the achievement of a robust and error-free embedding and retrieval of the embedded data in JPEG images. The application-specific modules are adaptable to user requirements in the concrete web application. The experimental results of the modular data watermarking are very promising. They indicate excellent image quality, satisfactory size of the embedded data and perfect robustness against JPEG transformations with prespecified compression ratios. ACM Computing Classification System (1998): C.2.0.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today's wireless networks rely mostly on infrastructural support for their operation. With the concept of ubiquitous computing growing more popular, research on infrastructureless networks have been rapidly growing. However, such types of networks face serious security challenges when deployed. This dissertation focuses on designing a secure routing solution and trust modeling for these infrastructureless networks. ^ The dissertation presents a trusted routing protocol that is capable of finding a secure end-to-end route in the presence of malicious nodes acting either independently or in collusion, The solution protects the network from active internal attacks, known to be the most severe types of attacks in an ad hoc application. Route discovery is based on trust levels of the nodes, which need to be dynamically computed to reflect the malicious behavior in the network. As such, we have developed a trust computational model in conjunction with the secure routing protocol that analyzes the different malicious behavior and quantifies them in the model itself. Our work is the first step towards protecting an ad hoc network from colluding internal attack. To demonstrate the feasibility of the approach, extensive simulation has been carried out to evaluate the protocol efficiency and scalability with both network size and mobility. ^ This research has laid the foundation for developing a variety of techniques that will permit people to justifiably trust the use of ad hoc networks to perform critical functions, as well as to process sensitive information without depending on any infrastructural support and hence will enhance the use of ad hoc applications in both military and civilian domains. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Type systems for secure information flow aim to prevent a program from leaking information from H (high) to L (low) variables. Traditionally, bisimulation has been the prevalent technique for proving the soundness of such systems. This work introduces a new proof technique based on stripping and fast simulation, and shows that it can be applied in a number of cases where bisimulation fails. We present a progressive development of this technique over a representative sample of languages including a simple imperative language (core theory), a multiprocessing nondeterministic language, a probabilistic language, and a language with cryptographic primitives. In the core theory we illustrate the key concepts of this technique in a basic setting. A fast low simulation in the context of transition systems is a binary relation where simulating states can match the moves of simulated states while maintaining the equivalence of low variables; stripping is a function that removes high commands from programs. We show that we can prove secure information flow by arguing that the stripping relation is a fast low simulation. We then extend the core theory to an abstract distributed language under a nondeterministic scheduler. Next, we extend to a probabilistic language with a random assignment command; we generalize fast simulation to the setting of discrete time Markov Chains, and prove approximate probabilistic noninterference. Finally, we introduce cryptographic primitives into the probabilistic language and prove computational noninterference, provided that the underling encryption scheme is secure.