922 resultados para secure protocal
Resumo:
The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper presents the full implementations of all of the second round candidates in hardware with all of their variants. In order to determine their computational efficiency, an important aspect in NIST's round two evaluation criteria, this paper gives an area/speed comparison of each design both with and without a hardware interface, thereby giving an overall impression of their performance in resource constrained and resource abundant environments. The implementation results are provided for a Virtex-5 FPGA device. The efficiency of the architectures for the hash functions are compared in terms of throughput per unit area. To the best of the authors' knowledge, this is the first work to date to present hardware designs which test for all message digest sizes (224, 256, 384, 512), and also the only work to include the padding as part of the hardware for the SHA-3 hash functions.
Resumo:
This article examines the work and roles of HR managers in the Irish recession. It tests the validity of three competing views about the future of HR: that the profession needs to become a business partner; that it is knee-deep in a legitimacy crisis; and that it is fragmenting by being unable to cope with the complexity of modern organizational life. Three key findings emerge from the research. First, HR managers have gained greater influence in business decision-making, but much of this influence arises from short-run retrenchment measures. Second, many HR managers remain committed to long established professional values and ideas of good practice. Third, modern HR managers are developing a professional identity that allows them to perform multiple, competing roles. These findings challenge existing arguments about the effects of the current recession. They also speak to ongoing debates about changing HR roles by showing how HR managers remain adept at making pragmatic adaptations to secure their role in organizational life. © The Author(s) 2012.
Resumo:
This article examines the debate precipitated by the Thatcher government's (unsuccessful) attempt to secure a British boycott of the 1980 Moscow Olympics in response to the Soviet invasion of Afghanistan. Aware that it faced a struggle to win over the autonomous British Olympic Association, but with Thatcher in particular keen to support the United States, the government's case that the invasion required a specific response in the form of a boycott was steadily overshadowed as the public debate increasingly focused on arguments over human rights and détente and the use of state power.
Resumo:
Although cartel behaviour is almost universally (and rightly) condemned, it is not clear why cartel participants deserve the full wrath of the criminal law and its associated punishment. To fill this void, I develop a normative (or principled) justification for the criminalisation of conduct characteristic of ‘hard core’ cartels. The paper opens with a brief consideration of the rhetoric commonly used to denounce cartel activity, eg that it ‘steals from’ or ‘robs’ consumers. To put the discussion in context, a brief definition of ‘hard core’ cartel behaviour is provided and the harms associated with this activity are identified. These are: welfare losses in the form of appropriation (from consumer to producer) of consumer surplus, the creation of deadweight loss to the economy, the creation of productive inefficiency (hindering innovation of both products and processes), and the creation of so-called X-inefficiency. As not all activities which cause harm ought to be criminalised, a theory as to why certain harms in a liberal society can be criminalised is developed. It is based on JS Mill's harm to others principle (as refined by Feinberg) and on a choice of social institutions using Rawls's ‘veil of ignorance.’ The theory is centred on the value of individual choice in securing one's own well-being, with the market as an indispensable instrument for this. But as applied to the harm associated with cartel conduct, this theory shows that none of the earlier mentioned problems associated with this activity provide sufficient justification for criminalisation. However, as the harm from hard core cartel activity strikes at an important institution which permits an individual's ability to secure their own well-being in a liberal society, criminalisation of hard core cartel behaviour can have its normative justification on this basis.
Resumo:
Adoption policy in the UK emphasizes its role in providing secure, permanent relationships to children in care who are unable to live with their birth families. Adoptive parents are crucial in providing this life-long, stable experience of family for these vulnerable children. This paper explores the experience of adoptive parenthood in the context of changes to adoptive kinship relationships brought about by new, unplanned contact with birth family during their child's middle adolescence. This contact was initiated via informal social networks and/or social media, with older birth siblings instrumental in negotiating renewed relationships. The contact precipitated a transition in adoptive family life resulting in emotional challenges and changes in parent/child relationships, which were experienced as additional to the normative transitions expected during adolescence. Parental concern as a dominant theme was founded in the child and birth sibling's stage of adolescence, coupled with constraints on adoptive parenthood imposed by the use of social media, by perceived professional attitudes and by parental social cognitions about the importance of birth ties. Adoptive parents' accounts are interpreted with reference to family life-cycle theory and implications are suggested for professional support of adoptive kinship relationships.
Resumo:
In this article we review recent work on the history of French negation in relation to three key issues in socio-historical linguistics: identifying appropriate sources, interpreting scant or anomalous data, and interpreting generational differences in historical data. We then turn to a new case study, that of verbal agreement with la plupart, to see whether this can shed fresh light on these issues. We argue that organising data according to the author’s date of birth is methodologically sounder than according to date of publication. We explore the extent to which different genres and text types reflect changing patterns of usage and suggest that additional, different case-studies are required in order to make more secure generalisations about the reliability of different sources.
Resumo:
This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).
Resumo:
Free space transmission of an on-off modulated sinusoidal signal through a phase conjugating lens (PCL) is theoretically examined using a combined time/frequency domain approach. The on-off keyed (OOK) signal is generated by a dipole antenna located in the far-field zone of the lens. The PCL consists of a dual layer of antenna elements interconnected via phase conjugating circuitry. We demonstrate that electromagnetic interference between antenna elements creates spatially localised areas of good-quality reception and zones where the signal is significantly denigrated by interference. Next, it is shown that destructive interference and packet desynchronisation effects critically depend on bit rate. It is also shown that a circular concave lens can be used to produce high-quality signal reception in a given direction while suppressing signal reception in all other directions. The effect that the bandwidth of the phase conjugating unit has on the transmitted signal properties for the cases of high and low bit rate OOK modulation are studied and a signal quality characterisation scheme is proposed which uses cross-correlation. The results of the study yields understanding of the performance of phase conjugating arrays under OOK modulation. The work suggests a novel approach for realising a secure communication wireless system.
Resumo:
Phased DM transmitter array synthesis using particle swarm optimization (PSO) is presented in this paper. The PSO algorithm is described in details with key parameters provided for 1-D four-element half-wavelength spaced QPSK DM array synthesis. A DM transmitter array for boresight and 30º direction secure communications are taken as examples to validate the proposed synthesis approach. The optimization process exhibits good convergence performance and solution quality.
Resumo:
Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.
Resumo:
Knowledge-intensive firms (KIFs) have been the subject of growing interest from researchers. However, investigations into the comparative experiences of men and women in KIFs remain sparse, and little is known about women's participation in the processes of innovation and knowledge exchange and combination that are core features of KIFs. The article reports on the findings of a study in the UK and Ireland involving 498 male and female knowledge workers in KIFs. Despite equal levels of qualification and experience, women are more likely to be in lower status and less secure jobs. They also predominantly occupy roles featuring less variety and autonomy than men and, despite comparable levels of knowledge exchange and combination, are less likely to be in a position to translate this into the innovative work behaviours necessary for career advancement. The findings suggest that women's experiences of and participation in knowledge processes within KIFs differ fundamentally from men's. © The Author(s) 2012.
Resumo:
Frequency stability has not necessarily been a major problem for the majority of power systems in the past. However, for economic and environmental reasons, power systems are now operated closer to stability limits to maximise the use of the existing networks. Therefore, introduction of new, more efficient and renewable generation technologies, and their effect on the power system must be fully understood if a reliable and secure electricity supply is to be maintained. Using the Northern Ireland, and interconnected Republic of Ireland electricity networks as a case study, this paper addresses some of the issues regarding integration and modelling of combined cycle gas turbines (CCGT), and wind turbine generator (WTG) technology on a small islanded power system.
Resumo:
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.
Resumo:
Physical Access Control Systems are commonly used to secure doors in buildings such as airports, hospitals, government buildings and offices. These systems are designed primarily to provide an authentication mechanism, but they also log each door access as a transaction in a database. Unsupervised learning techniques can be used to detect inconsistencies or anomalies in the mobility data, such as a cloned or forged Access Badge, or unusual behaviour by staff members. In this paper, we present an overview of our method of inferring directed graphs to represent a physical building network and the flows of mobility within it. We demonstrate how the graphs can be used for Visual Data Exploration, and outline how to apply algorithms based on Information Theory to the graph data in order to detect inconsistent or abnormal behaviour.
Resumo:
Directional modulation (DM) is a recently introduced technique for secure wireless transmission using direct physical layer wave-front manipulation. This paper provides a bit error rate (BER)-based DM array synthesis method. It is shown for the first time that the standard constellation mappings in In-phase and Quadrature (IQ) space to a pre-specified BER can be exactly achieved along a given specified spatial direction. Different receiver capabilities are investigated and different assessment metrics for each case are discussed. The approach is validated for a 1 × 4 element dipole array operating at 1 GHz.