4,533 research outputs found

    The taming of the duel: masculinity, honour and ritual violence in London, 1660–1800

    Get PDF
    Over the course of the ‘long’ eighteenth century the nature and significance of duels fought in the London area changed dramatically. Pistols replaced swords, seconds took on a new role as mediators, and new conventions reduced the violence. Consequently, injuries and fatalities decreased significantly. The purpose of fighting duels also shifted from the defeat of one's antagonist to a demonstration of courage. Although duels continued to occur, growing opposition meant that the audience of people who supported duelling became increasingly limited and duels took place in places far from public view. At the same time, both the press and the courts provided alternative strategies for defending reputations. These changes cannot be attributed to technological developments, official attempts to prevent duelling, or the embourgeoisement of the duel. Rather, they resulted from a series of interlinked cultural changes, including an increasing intolerance of violence, new internalized understandings of elite honour, and the adoption of ‘polite’ and sentimental norms governing masculine conduct. These eighteenth-century changes shed new light on the reasons for the final end of duelling in England in 1852

    Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps

    Get PDF
    This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at least 10M times, that request full network access. Our experiments show that, although prior work has drawn a lot of attention to SSL implementations on mobile platforms, several popular apps (32/100) accept all certificates and all hostnames, and four actually transmit sensitive data unencrypted. We set up an experimental testbed simulating man-in-the-middle attacks and find that many apps (up to 91% when the adversary has a certificate installed on the victim's device) are vulnerable, allowing the attacker to access sensitive information, including credentials, files, personal details, and credit card numbers. Finally, we provide a few recommendations to app developers and highlight several open research problems.Comment: A preliminary version of this paper appears in the Proceedings of ACM WiSec 2015. This is the full versio

    The taming of the duel: masculinity, honour and ritual violence in London, 1660–1800

    Get PDF
    Over the course of the ‘long’ eighteenth century the nature and significance of duels fought in the London area changed dramatically. Pistols replaced swords, seconds took on a new role as mediators, and new conventions reduced the violence. Consequently, injuries and fatalities decreased significantly. The purpose of fighting duels also shifted from the defeat of one's antagonist to a demonstration of courage. Although duels continued to occur, growing opposition meant that the audience of people who supported duelling became increasingly limited and duels took place in places far from public view. At the same time, both the press and the courts provided alternative strategies for defending reputations. These changes cannot be attributed to technological developments, official attempts to prevent duelling, or the embourgeoisement of the duel. Rather, they resulted from a series of interlinked cultural changes, including an increasing intolerance of violence, new internalized understandings of elite honour, and the adoption of ‘polite’ and sentimental norms governing masculine conduct. These eighteenth-century changes shed new light on the reasons for the final end of duelling in England in 1852

    A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    Get PDF
    Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Boneh-Franklin Identity Based Encryption (IBE) scheme. In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. Our scheme enables the delegator to provide the proxy fine-grained re-encryption capability. As an application, we propose a fine-grained Personal Health Record (PHR) disclosure scheme for healthcare service by applying the proposed scheme

    Revisit the Concept of PEKS: Problems and a Possible Solution

    Get PDF
    Since Boneh et al. propose the concept, non-interactive\ud Public-key Encryption with Keyword Search (PEKS) has attracted lots of attention from cryptographers. Non-interactive PEKS enables a third party to test whether or not a tag, generated by the message sender, and a trapdoor, generated by the receiver, contain the same keyword without revealing further information. In this paper we investigate a non-interactive PEKS application proposed by Boneh et al. and show our observations, especially that privacy is\ud not protected against a curious server. We propose the notion of interactive PEKS, which, in contrast to non-interactive PEKS, requires the tag to be generated interactively by the message sender and the receiver. For this new primitive, we identify two types of adversaries, namely a curious user and a curious server, and provide\ud security formulations for the desirable properties. We propose a construction for interactive PEKS and prove its security in the proposed security model
    • …
    corecore