197,432 research outputs found
Secure Position-Based Routing for VANETs
Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable
Parenting, temperament, and attachment security as antecedents of political orientation: Longitudinal evidence from early childhood to age 26.
This article examines early childhood antecedents of adults' political orientation. Using longitudinal data from the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, we investigate associations between parenting beliefs and behaviors, child temperament, and attachment security during early childhood in relation to adult political ideology and party affiliation at age 26 years (N = 1,364). Young children's fearful temperament and anxious attachment security, as well as mothers' authoritarian parenting beliefs in early childhood, predicted conservative political orientations at age 26. Children's abilities to focus attention and avoidant attachment security predicted liberal orientations. These findings provide evidence that multiple aspects of early developmental experience-temperament, parenting, and infant-mother attachment-are associated with later political orientations. (PsycInfo Database Record (c) 2020 APA, all rights reserved)
Giving Out Globally: A Resource Guide of Funding Mechanisms to Support Lesbian, Gay, Bisexual, and Transgender Rights in the Global South and East
Provides an overview of funding vehicles, such as Northern groups working in the global South and East, intermediaries, direct cross-border grantmaking, private foundations, and donor-advised funds. Includes lists of resources and grantee profiles
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Predicting violence within genocides: meso-level evidence from Rwanda
Can we predict when and where violence will break out within cases of genocide? Given often weak political will to respond, knowing where to strategically prioritize limited resources is valuable information for international decision makers contemplating intervention. I develop a theoretical model to help identify areas vulnerable to violence during genocide. I argue vulnerability is a function of the state’s coercive power and the ruling elite’s control of this power from above, mediated by the strength of society’s cohesion below. Violence will be delayed in areas where political and military resistance to the center is high as it takes time for extremists to exert control at the periphery. Violence will also be delayed in well-integrated communities as it takes time to break existing social bonds and destroy social capital. I draw on the case of Rwanda’s 1994 genocide and examine sub-national variation in the onset of violence across the country’s 145 administrative communes using survival analysis and within-case analyses comparing early and late onset in two communes. The findings have implications for international policy makers responding to ongoing genocides
Security in Wireless Sensor Networks: Issues and Challenges
Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.Comment: 6 page
Water and Development Strategy: Implementation Field Guide
This document is intended to serve as a reference tool to help USAID Operating Units understand and apply the agency's 2013-2018 Water and Development Strategy. By publicly sharing the document, USAID aims to ensure coordination of their efforts with the wider water sector. The Field Guide will be periodically updated and comments from readers are welcome
What do they know about me? Contents and Concerns of Online Behavioral Profiles
Data aggregators collect large amount of information about individual users
and create detailed online behavioral profiles of individuals. Behavioral
profiles benefit users by improving products and services. However, they have
also raised concerns regarding user privacy, transparency of collection
practices and accuracy of data in the profiles. To improve transparency, some
companies are allowing users to access their behavioral profiles. In this work,
we investigated behavioral profiles of users by utilizing these access
mechanisms. Using in-person interviews (n=8), we analyzed the data shown in the
profiles, elicited user concerns, and estimated accuracy of profiles. We
confirmed our interview findings via an online survey (n=100). To assess the
claim of improving transparency, we compared data shown in profiles with the
data that companies have about users. More than 70% of the participants
expressed concerns about collection of sensitive data such as credit and health
information, level of detail and how their data may be used. We found a large
gap between the data shown in profiles and the data possessed by companies. A
large number of profiles were inaccurate with as much as 80% inaccuracy. We
discuss implications for public policy management.Comment: in Ashwini Rao, Florian Schaub, and Norman Sadeh What do they know
about me? Contents and Concerns of Online Behavioral Profiles (2014) ASE
BigData/SocialInformatics/PASSAT/BioMedCom Conferenc
- …