17 resultados para Melaka


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Memory, time and metaphor are central triggers for artists in exploring and shaping their creative work. This paper examines the place of artists as ‘memory-keepers’, and ‘memory-makers’, in particular through engagement with the time-based art of site-specific performance. Naik Naik (Ascent) was a multi-site performance project in the historic setting of Melaka, Malaysia, and is partially recaptured through the presence and voices of its collaborating artists. Distilled from moments recalled, this paper seeks to uncover the poetics of memory to emerge from the project; one steeped in metaphor rather than narrative. It elicits some of the complex and interdependent layers of experience revealed by the artists in Naik Naik; cultural, ancestral, historical, personal, instinctual and embodied memories connected to sound, smell, touch, sensation and light, in a spatiotemporal context for which site is the catalyst. The liminal nature of memory at the heart of Naik Naik, provides a shared experience of past and present and future, performatively interwoven.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Register (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the m-tuple output of a nonlinear filter with consecutive taps to the filter function is unevenly distributed. Current designs use taps which are not consecutive. We examine m-tuple outputs from nonlinear filter generators constructed using various LFSRs and Boolean functions for both consecutive and uneven (full positive difference sets where possible) tap positions. The investigation reveals that in both cases, the m-tuple output is not uniform. However, consecutive tap positions result in a more biased distribution than uneven tap positions, with some m-tuples not occurring at all. These biased distributions indicate a potential flaw that could be exploited for cryptanalysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The book probes and examines traditional sources of royal power and control, as well as indigenous socio-political systems in the Malay world. It is focused on the north-western Malaysian Sultanate of Kedah which is acknowledged as the oldest unbroken independent kingship line in the ‘Malay and Islamic world’ with 1,000 years of history. Little scholarly attention has been paid to its pre-modern history, society, religion, system of government and unique geographic situation, potentially controlling both land and sea lines of communication into the remainder of Southeast Asia. It will thus provide the first comprehensive treatment in English, or other languages, on Kedah’s pre-modern and nineteenth century historiography and can provide a foundation for comparative studies of the various Malay states which is presently lacking. The proposed book also sheds much needed light on a range of important topics in Malay history including: Kedah and the northern Melaka Straits history, colonial expansion and rivalry, Southeast Asian history and politics, interregional migration and the influence of the sea peoples or orang laut, traditional Malay socio-political and economic life, Islamic influences and the course of Thai-Malay relations. The book attempts to offer a new understanding, not only of Kedah, but of the political and cultural development of the entire Malay world and of its relationships with the broader forces in both its continental and maritime settings. It argues that Kedah does not seem to follow, and in fact, often seems to contradict what has been commonly been accepted as the “typical model” of the traditional Malay state. Thus it concludes that the ruling dynasty has historically exploited a wide range of unique environmental conditions, local traditions, global spiritual trends and economic forces to preserve and strengthen its political position. The scope and theme of book The Kedah Sultanate is the oldest unbroken independent kingship lines in the “Malay world” with 1,000 years of history, and arguably one of the oldest in the Islamic world. In this study I examine key geopolitical and spiritual attributes of Malay kingship that have traditionally cemented the ruler, the peoples, and the environment. Brief description of the primary audience for the book: There is little written in English or Malay on Kedah’s pre twentieth century history. The available sources only look at certain aspects of Kedah’s history, are outdated or are confined to a specific period often outside the scope of the book. It is therefore anticipated that the readership and market for the book includes: • Scholars of Southeast Asian history, Islam, kingship, trade. • Academics & Historians (including: Asian, Thai history, Islamic, Maritime, Persian, South Asian, Southeast Asian and Colonial) • Libraries • Students, particularly those in Malaysia (especially the states of Kedah, Perlis and Penang), Thailand and Singapore. • Universities • Scholars and students in Political Science & International Relations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"Naik Naik, conceived and directed by Cheryl Stock, is a multi-site promenade performance in which the audience joins the artists in physically exploring the notion of ‘ascent’ through their upward journey from Fort A Famosa at the base of the hill to Site 1 of St Paul’s Hill at the summit. Beginning at dusk with vignette performances along the ascending path, the journey finishes on entering the church ruins at nightfall. An evocation of place through performative contemplations, this processional experience lingers on the traces of history that remain hidden or partially and silently exposed, interwoven with personal and cultural stories related to the sites, in a celebration of the present. Naik Naik brings together eight established and emerging professional artists whose disciplines range across dance, music, visual arts and media production. Excitingly, this will be the first performance at MAPFest arising from a pre-festival collaborative residency with development time in Malaysia for all artists to work on a new production from its inception. The collaboration has been based on ideas arising from site research as well as myths and local stories from longterm Melaka residents who contributed their knowledge and memories of the chosen sites. Naik Naik has been created by its artists in an acknowledgement of Melaka’s unique multicultural heritage and contemporary identity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Biorefineries, producing fuels, green chemicals and bio-products, offer great potential for improving the profitability and sustainability of tropical agricultural industries. Biomass from tropical crops like sugarcane, sweet sorghum, palm and cassava offer great potential because of the high biomass growth potential under favourable climatic conditions. Biorefineries aim to convert waste residues through biochemical and enzymatic processes to low cost fermentable sugars which are a platform for value-adding. Through subsequent fermentation utilising microbial biotechnologies or chemical synthesis, the sugars can be converted to fuels including ethanol and butanol, oils, organic acids such as lactic and levulinic acid and polymer precursors. Other biorefinery products can include food and animal feeds, plastics, fibre products and resins. Pretreatment technologies are a key to unlocking this potential and new technologies are emerging. This paper will address the opportunities available for tropical biorefineries to contribute to the future profitability of tropical agricultural industries. The importance of pretreatment technologies will be discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This case study of a parent-initiated community project called Wings Melaka has helped improve provision of early intervention services to Malaysian children with disabilities, and their families, by making contributions specifically to the workplace at Wings Melaka, and more generally, to the much-neglected field of early intervention in Malaysia.