3,263 research outputs found

    Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking

    Get PDF
    The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols

    Perceptions of the North American Free Trade Agreement and Mexican Migration: “What is the Relationship between Trade Liberalization and Labor Mobility?”

    Get PDF
    In an effort to understand the effectiveness of the North American Free Trade Agreement, the author uses previous academic literature to assesses the success of the North American Free Trade Agreement’s primary and peripheral goals. To understand how North American citizens, perceive NAFTA and their future relationship with one another, the author uses survey data to analyze attitudes of American and Mexican citizens towards trade liberalization (NAFTA) and labor mobility. Regression analysis reveals that there is a positive relationship between labor mobility and trade liberalization for Mexican citizens but not for American citizens. This is a significant finding that contributes to our understanding of potential policy recommendations and the integration of the North American countries

    Denial-of-Service Resistance in Key Establishment

    Get PDF
    Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be used to secure the communications between initiator and responder. The goal of DoS resistance in key establishment protocols is to ensure that attackers cannot prevent a legitimate initiator and responder deriving cryptographic keys without expending resources beyond a responder-determined threshold. In this work we review the strategies and techniques used to improve resistance to DoS attacks. Three key establishment protocols implementing DoS resistance techniques are critically reviewed and the impact of misapplication of the techniques on DoS resistance is discussed. Recommendations on effectively applying resistance techniques to key establishment protocols are made

    John Brown University disaster shelter competition

    Get PDF
    John Brown University hosted the 6th annual Disaster Shelter Relief Competition in April 2017 for which the team built a prototype shelter and proposed a camp plan. Both the shelter and the camp plan were designed to house refugees coming into Greece from the Middle East. The shelter would accommodate a family of four and the camp plan was designed to hold 1250 shelters, or 5000 people. The shelter was built on site at John Brown University and was required to take less than two hours to fully construct. This report summarizes the work the team did for the competition, including a review of existing shelter designs currently in use, a description of the method of design of the prototype, validation that the prototype meets the criteria, a discussion of the cultural appropriateness of the shelter to the scenario, suggested modifications and improvements that can be made, photos and drawings of the prototype, and the camp plan

    Observation of the BL Lac objects 1ES 1215+303 and 1ES 1218+304 with the MAGIC telescopes

    Full text link
    The two BL Lac objects 1ES 1215+303 and 1ES 1218+304, separated by 0.8 deg, were observed with the MAGIC telescopes in 2010 and 2011. The 20 hours of data registered in January 2011 resulted in the first detection at Very High Energy (>100 GeV) of 1ES 1215+303 (also known as ON-325). This observation was triggered by a high optical state of the source reported by the Tuorla blazar monitoring program. Comparison with the 25 hours of data carried out from January to May 2010 suggests that 1ES 1215+303 was flaring also in VHE gamma-rays in 2011. In addition, the Swift ToO observations in X-rays showed that the flux was almost doubled respect to previous observations (December 2009). Instead, 1ES 1218+304 is a well known VHE gamma-ray emitter lying in the same field of view, which was then simultaneously observed with the MAGIC telescopes. The overall observation time of nearly 45 hours has permitted to measure the spectrum of this source with a much higher precision than previously reported by MAGIC. Here, we present the results of the MAGIC and the multi-wavelength observations of these two VHE gamma-ray emitting AGNs.Comment: 4 pages, 5 figures, Proceedings of the 32nd ICRC (2011) Beijin

    Reality, Theory, and a Make-Believe World: The Fundamentalism of the Free Market

    Get PDF
    The papers collected in this Symposium issue represent a wide range of disciplines, positions and philosophies, and reflect the views of scholars from five countries (Argentina, Brazil, Colombia, the United States and Venezuela). These papers reflect a range of thinking about the freedom that the free market is said to bring, from deeply analytical reflections to more focused case studies. In this, they reflect an equally rich series of panels and discussions that happened over three days spent in Bogota, in May 2006. These conversations, held in the comfortable surroundings of the tranquil campus of the Universidad de los Andes, went well beyond the confines of the papers presented here, and it is a pity that circumstances did not permit the full range of interesting presentations to see the light of day. Nonetheless, it is fair to say that the present volume captures the richness of that encounter, one that welcomed scholars from seven countries and nearly as many disciplines, including law, economics, sociology, anthropology and psychology
    • …
    corecore