911 resultados para White Book on National Security of Poland
Resumo:
The paper reviews the provisions of the White Book on National Security of the Republic of Poland. It states that the issue of health security is not given adequate significance there. The accessibility of health services is considered, in general, solely in terms of their availability. The assumptions concerning the concept of providing the number of beds required in a state of threat to national security and in time of war do not take into account the current socio-economic conditions and need to be reviewed. The conclusions emphasize the dilemmas that emerge as a result of the unilateral promotion of a single category of national security, that is military security, in the context of ensuring health security.
Resumo:
Among the many issues that were raised in the White Book on National Security of the Republic of Poland (WBNSRP), there were also those related to the functioning of a Common Security and Defence Policy (CSDP). Its importance for the security of Poland was indicated, as well as the need on the part of EU Member States to broaden collaboration in the sphere of security and defence. The key problems occurring in the context of CSDP were also emphasised and their causes indicated. The aim of the article is to present the factors responsible for the weakening of CSDP effectiveness, ones taken into account in the White Book, and subsequently to present a Framework for their analysis in the light of further scholarship.
Resumo:
"B-272119"--P. 1.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Resumo:
The artisanal fish preservation methods in Uganda are characterized by extreme operating conditions. Consequently, vital nutritional components diminish in value and quantity which renders fish consumer nutritionally insecure. To establish the magnitude of nutritional loss, duplicate samples of Mukene Rastrineobola argentea were collected from Kiyindi landing site on L. Victoria and Moone landing site on L. Kyoga. Each set of duplicate samples was divided into five portions and kept on ice. For each preservation method a portion was processed into respective products at Food Bioscience and Agri-Business Laboratories aside from the control (fresh) sample. Both preserved and control samples were analysed for nutrient loss at Department of Chemistry, Makerere University using AOAC methods. The composition of fatty acids was determined by methanolysis gas chromatography and Mass spectrophotometry of the resultant methyl esters. The results indicate that nutrients of all preserved samples did not vary significantly from the control except for some fatty acids. The Eicosapentaenoic acid (EPA) in fresh samples declined from 6.72% to 1.08% in deep-fried samples constituting 83.93% nutrient loss. The sum ratio w3:w6 as well as EPA: DHA (Docosahexaenoic) ratio in fried samples also varied significantly (p<0.5) lower than 0.668 and 0.20 for the average of either preservation methods and experts recommended ratio respectively. Further research has been recommended to ascertain the causative factor, since Mukene frying is being promoted in the Great lakes region as alternative method to sun-drying. In conclusion, regular consumers of fried Mukene do not benefit much from the nutritional and health attributes of Omega 3 and 6.
Resumo:
The subject matter of the analysis conducted in the text is information and anti-terrorist security of Poland, which has been presented within the context of a clash between two spheres – the state and the private sphere. Furthermore, the issues of security have been supplemented with a description of the tasks and activity of the Internal Security Agency, as well as a synthetic appraisal of a terrorist threat to Poland. The main parts of this work are concerned with: (1) the state and the private sphere, (2) " terrorism " and terrorist offences, (3) the tasks and activity of the Internal Security Agency, (4) an appraisal of a terrorist threat to Poland. Given the necessity to elaborate the research problem, the text features the following research questions: (1) To what extent does referring to a threat to security influence a limitation on rights and freedoms in Poland (with regard to the clash between the state and the private sphere)?, (2) To what extent do the tasks and activity of the Internal Security Agency influence the effectiveness of anti-terrorist security in Poland?
Resumo:
"The articles here translated originally appeared in 'Van onzen tijd' (Amsterdam) on 31st July, 7th August, 14th August, and 21st August, 1915".
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.
Resumo:
Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Resumo:
Spanish document available at the Library