4,533 research outputs found
The taming of the duel: masculinity, honour and ritual violence in London, 1660–1800
Over the course of the ‘long’ eighteenth century the nature and significance of duels fought in the London area changed dramatically. Pistols replaced swords, seconds took on a new role as mediators, and new conventions reduced the violence. Consequently, injuries and fatalities decreased significantly. The purpose of fighting duels also shifted from the defeat of one's antagonist to a demonstration of courage. Although duels continued to occur, growing opposition meant that the audience of people who supported duelling became increasingly limited and duels took place in places far from public view. At the same time, both the press and the courts provided alternative strategies for defending reputations. These changes cannot be attributed to technological developments, official attempts to prevent duelling, or the embourgeoisement of the duel. Rather, they resulted from a series of interlinked cultural changes, including an increasing intolerance of violence, new internalized understandings of elite honour, and the adoption of ‘polite’ and sentimental norms governing masculine conduct. These eighteenth-century changes shed new light on the reasons for the final end of duelling in England in 1852
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps
This paper presents a measurement study of information leakage and SSL
vulnerabilities in popular Android apps. We perform static and dynamic analysis
on 100 apps, downloaded at least 10M times, that request full network access.
Our experiments show that, although prior work has drawn a lot of attention to
SSL implementations on mobile platforms, several popular apps (32/100) accept
all certificates and all hostnames, and four actually transmit sensitive data
unencrypted. We set up an experimental testbed simulating man-in-the-middle
attacks and find that many apps (up to 91% when the adversary has a certificate
installed on the victim's device) are vulnerable, allowing the attacker to
access sensitive information, including credentials, files, personal details,
and credit card numbers. Finally, we provide a few recommendations to app
developers and highlight several open research problems.Comment: A preliminary version of this paper appears in the Proceedings of ACM
WiSec 2015. This is the full versio
The taming of the duel: masculinity, honour and ritual violence in London, 1660–1800
Over the course of the ‘long’ eighteenth century the nature and significance of duels fought in the London area changed dramatically. Pistols replaced swords, seconds took on a new role as mediators, and new conventions reduced the violence. Consequently, injuries and fatalities decreased significantly. The purpose of fighting duels also shifted from the defeat of one's antagonist to a demonstration of courage. Although duels continued to occur, growing opposition meant that the audience of people who supported duelling became increasingly limited and duels took place in places far from public view. At the same time, both the press and the courts provided alternative strategies for defending reputations. These changes cannot be attributed to technological developments, official attempts to prevent duelling, or the embourgeoisement of the duel. Rather, they resulted from a series of interlinked cultural changes, including an increasing intolerance of violence, new internalized understandings of elite honour, and the adoption of ‘polite’ and sentimental norms governing masculine conduct. These eighteenth-century changes shed new light on the reasons for the final end of duelling in England in 1852
A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Boneh-Franklin Identity Based Encryption (IBE) scheme. In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. Our scheme enables the delegator to provide the proxy fine-grained re-encryption capability. As an application, we propose a fine-grained Personal Health Record (PHR) disclosure scheme for healthcare service by applying the proposed scheme
Revisit the Concept of PEKS: Problems and a Possible Solution
Since Boneh et al. propose the concept, non-interactive\ud
Public-key Encryption with Keyword Search (PEKS) has attracted lots of attention from cryptographers. Non-interactive PEKS enables a third party to test whether or not a tag, generated by the message sender, and a trapdoor, generated by the receiver, contain the same keyword without revealing further information. In this paper we investigate a non-interactive PEKS application proposed by Boneh et al. and show our observations, especially that privacy is\ud
not protected against a curious server. We propose the notion of interactive PEKS, which, in contrast to non-interactive PEKS, requires the tag to be generated interactively by the message sender and the receiver. For this new primitive, we identify two types of adversaries, namely a curious user and a curious server, and provide\ud
security formulations for the desirable properties. We propose a construction for interactive PEKS and prove its security in the proposed security model
- …