2,586,328 research outputs found

    A robust self-organized public key management for mobile ad hoc networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized servers are infeasible for MANETs due to the absence of infrastructure, frequent mobility, and wireless link instability. In this paper, we propose a robust self-organized, public key management for MANETs. The proposed scheme relies on establishing a small number of trust relations between neighboring nodes during the network initialization phase. Experiences gained as a result of successful communications and node mobility through the network enhance the formation of a web of trust between mobile nodes. The proposed scheme allows each user to create its public key and the corresponding private key, to issue certificates to neighboring nodes, and to perform public key authentication through at least two independent certificate chains without relying on any centralized authority. A measure of the communications cost of the key distribution process has been proposed. Simulation results show that the proposed scheme is robust and efficient in the mobility environment of MANET and against malicious node attacks

    SEC Enforcement Heuristics: An Empirical Inquiry

    Get PDF
    This Article examines the overlap between SEC securities enforcement actions and private securities fraud class actions. We begin with an overview of data concerning all SEC enforcement actions from 1997 to 2002. We find that the volume of SEC enforcement proceedings is relatively modest. We next examine the scope of the recently enacted Fair Fund provision that authorizes the SEC to designate civil penalties it recovers from defendants to benefit defrauded private investors. We conclude that this provision offers only limited potential relief for private investors. We complete this Part of the Article with an analysis of the serious resource limitations faced by the SEC. The second portion of the Article contains an empirical analysis of the determinants of SEC enforcement actions and the overlap of private fraud suits and SEC enforcement proceedings. Using bivariate analysis, we find that (1) private suits with parallel SEC actions settle for significantly more than private suits without such proceedings; (2) SEC enforcement actions target significantly smaller companies than private actions alone; (3) private cases with parallel SEC actions take substantially less time to settle than other private cases; and (4) private cases with parallel SEC actions have significantly longer class periods than other private actions. Finally, we create a model for estimating damages to compare settlement ratios in cases with parallel SEC actions to those in private actions. We find that one-fourth of all the private class action settlements occurring in suits that yield less than 10 percent of provable losses are settled for less than 2 percent of provable losses, but that there are no private actions with parallel SEC suits with such small settlements. In the final Part of the Article, we conduct a multivariate regression analysis of the determinants of when SEC enforcement actions are filed. We find that the most highly significant determinant of SEC actions is financial distress. Estimated losses do not appear to be a statistically significant factor in the SEC\u27s decision to file these suits

    Southeastern Conference Introduces Working Group on Compliance, Enforcement and Governance

    Get PDF
    UM law professor Ron Rychlak among nine representatives on pane

    SEC Network Coverage Plans For SEC Symposium Announced

    Get PDF
    Second Annual SEC Symposium, Focusing on Obesity Prevention, Set forSeptember 21-2

    Saving Disgorgement from Itself: SEC Enforcement After Kokesh v. SEC

    Get PDF
    Disgorgement is under threat. In Kokesh v. SEC , the Supreme Court held that disgorgement—a routine remedy that allows the SEC to recoup ill-gotten gains from financial wrongdoers—is subject to a 5-year statute of limitations because it functions as a “penalty.” This ruling threatens to upend the traditional conception of disgorgement as an ancillary remedy granted by the court’s equity power, because there are no penalties at equity. With the possibility that Kokesh’s penalty reasoning could be adopted beyond the statute of limitations context, the future of disgorgement in federal court is in doubt. This Note proposes a way forward that allows for disgorgement’s continued viability. The SEC should moderate its use of disgorgement for three reasons: because of a trend of suspicion toward strong government enforcement power by the Supreme Court, because it has been improperly used punitively, and because the rise of other statutory schemes has displaced disgorgement’s original justification. At the same time, disgorgement should be saved because of the uncertain future of administrative disgorgement proceedings, the intuitive notion of recovering money from wrongdoers, and the much-needed ability to compensate victims. To save disgorgement, the SEC should limit its use only to restoring the status quo of injured investors, thereby ensuring a remedial—not penal—purpose

    Multiscale non-adiabatic dynamics with radiative decay, case study on the post-ionization fragmentation of rare-gas tetramers

    Get PDF
    In this supplementary material, we recollect, for reader's convenience, the general scheme of suggested multiscale model (Sec. 1), and basic informations about approaches used for pilot study: a detailed description of the interaction model (Sec. 2) and dynamical methods used for the dark dynamics step (Sec. 3) reported previously in two preceding studies [1, 2]. In addition, a detailed description of the treatment of radiative processes is also given (Sec. 4).Comment: supplementary material for parent paper; 9 pages, 1 figure; corrected formulae and misleading notation in Sec.4 (pages 7 and 8

    Saving Disgorgement from Itself: SEC Enforcement After Kokesh v. SEC

    Get PDF
    Disgorgement is under threat. In Kokesh v. SEC , the Supreme Court held that disgorgement—a routine remedy that allows the SEC to recoup ill-gotten gains from financial wrongdoers—is subject to a 5-year statute of limitations because it functions as a “penalty.” This ruling threatens to upend the traditional conception of disgorgement as an ancillary remedy granted by the court’s equity power, because there are no penalties at equity. With the possibility that Kokesh’s penalty reasoning could be adopted beyond the statute of limitations context, the future of disgorgement in federal court is in doubt. This Note proposes a way forward that allows for disgorgement’s continued viability. The SEC should moderate its use of disgorgement for three reasons: because of a trend of suspicion toward strong government enforcement power by the Supreme Court, because it has been improperly used punitively, and because the rise of other statutory schemes has displaced disgorgement’s original justification. At the same time, disgorgement should be saved because of the uncertain future of administrative disgorgement proceedings, the intuitive notion of recovering money from wrongdoers, and the much-needed ability to compensate victims. To save disgorgement, the SEC should limit its use only to restoring the status quo of injured investors, thereby ensuring a remedial—not penal—purpose

    Sadržaj

    Get PDF

    Application of Suction-cup-attached VHF Transmitters to the Study of Beluga, Delphinapterus leucas, Surfacing Behavior in Cook Inlet, Alaska

    Get PDF
    Suction-cup-attached VHF radio transmittes were deployed on belugas, Delphinapterus leucas, in Cook Inlet, Alaska, in 1994 and 1995 to characterize the whales' surfacing behavior. Data from video recordings were also used to characterize behavior of undisturbed whales and whales actively pursued for tagging. Statistics for dive intervals (time between the midpoints of contiguous surfacings) and surfacing intevals (time at the surface per surfacing) were estimated. Operations took place on the tidal delta of the Susitna and Little Susitna Rivers. During the 2-yr study, eight whales were successfully tagged, five tags remained attached for >60 min, and data from these were used in the analyses. Mean dive interval was 24.1 sec (interwhale SD=6.4 sec, n=5). The mean surfacing interval, as determined from the duration of signals received from the radio transmitters, was 1.8 sec (SD=0.3 sec, n=125) for one of the whales. Videotaped behaviors were categorized as "head-lifts" or "slow-rolls." Belugas were more likely to head-lift than to slow-roll during vessel approaches and tagging attempts when compared to undisturbed whales. In undisturbed groups, surfacing intervals determined from video records were significantly different between head-lifting (average = 1.02 sect, SD=0.38 sed, n=28) and slow-rolling whales (average = 2.45 sec, SD=0.37 sec, n=106). Undisturbed juveniles exhibited shorter slow-roll surfacing intervals (average = 2.25 sec, SD=0.32 sec, n=36) than adults (average = 2.55 sec, SD=0.36 sec, n=70). We did not observe strong reactions by the belugas to the suction-cup tags. This tagging method shows promise for obtaining surfacing data for durations of several days
    corecore