21,921 research outputs found

    Portable Tor Router: Easily Enabling Web Privacy for Consumers

    Full text link
    On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available, untrusted, or simply provide trivial information masking. We propose that the simplest, most effective and inexpensive way of gaining privacy, without sacrificing unnecessary amounts of functionality and speed, is to mask the user's IP address while also encrypting all data. We hypothesized that the Tor protocol is aptly suited to address these needs. With this in mind we implemented a Tor router using a single board computer and the open-source Tor protocol code. We found that our proposed solution was able to meet five of our six goals soon after its implementation: cost effectiveness, immediacy of privacy, simplicity of use, ease of execution, and unimpaired functionality. Our final criterion of speed was sacrificed for greater privacy but it did not fall so low as to impair day-to-day functionality. With a total cost of roughly $100.00 USD and a speed cap of around 2 Megabits per second we were able to meet our goal of an affordable, convenient, and usable solution to increased on-line privacy for the average consumer.Comment: 6 pages, 5 figures, IEEE ICCE Conferenc

    Land-use change simulation and assessment of driving factors in the loess hilly region - a case study as Pengyang County

    Get PDF
    The main objective of this study is to evaluate the land-use change and its relationship with its driving factors in the loess hilly region. In this study, a case study was carried out in Pengyang County. We set two land-use demand scenarios (a baseline scenario (scenario 1) and a real land-use requirement scenario (scenario 2)) during year 2001-2005 via assuming the effect of driving factors on land-use change keeps stable from 1993 to 2005. Two simulated land-use patterns of 2005 are therefore achieved accordingly by use of the conversion of land use and its effects model at small regional extent. Kappa analyses are conducted to compare each simulated land-use pattern with the reality. Results show that (1) the associated kappa values were decreased from 0.83 in 1993-2000 to 0.27 (in scenario 1) and 0.23 (in scenario 2) in 2001-2005 and (2) forest and grassland were the land-use types with highest commission errors, which implies that conversion of both the land-use types mentioned above is the main determinant of change of kappa values. Our study indicates the land-use change was driven by the synthetic multiply factors including natural and social-economic factors (e.g., slope, aspect, elevation, distance to road, soil types, and population dense) in 1993-2000 until "Grain for Green Project" was implemented and has become the dominant factor in 2001-2005

    Optimal eavesdropping on QKD without quantum memory

    Full text link
    We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization on all the parameters accessible to Eve, our method provides us with new bounds for the security of six-state and SARG04 against a memoryless adversary. In particular, for the six-state protocol we show that the maximum QBER for which a secure key can be extracted is increased from 12.6% (for collective attacks) to 20.4% with the memoryless assumption.Comment: 7 pages, 3 figures. Analysis of six-state and SARG04 QKD protocols adde

    Sending multiple RTP streams in a single RTP session

    Get PDF
    This memo expands and clarifies the behavior of Real-time Transport Protocol (RTP) endpoints that use multiple synchronization sources (SSRCs). This occurs, for example, when an endpoint sends multiple RTP streams in a single RTP session. This memo updates RFC 3550 with regard to handling multiple SSRCs per endpoint in RTP sessions, with a particular focus on RTP Control Protocol (RTCP) behavior. It also updates RFC 4585 to change and clarify the calculation of the timeout of SSRCs and the inclusion of feedback messages
    • …
    corecore