2,546 research outputs found

    Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks

    Full text link
    We consider network graphs G=(V,E)G=(V,E) in which adjacent nodes share common secrets. In this setting, certain techniques for perfect end-to-end security (in the sense of confidentiality, authenticity (implying integrity) and availability, i.e., CIA+) can be made applicable without end-to-end shared secrets and without computational intractability assumptions. To this end, we introduce and study the concept of a unique-neighborhood network, in which nodes are uniquely identifiable upon their graph-topological neighborhood. While the concept is motivated by authentication, it may enjoy wider applicability as being a technology-agnostic (yet topology aware) form of addressing nodes in a network

    On the "long" flounders of the far eastern seas of the USSR: Microstomus, Glyptocephalus, Tanakius (Pleuronectidae). (Translation of Doklady Akademii Nauk SSSR, 74(4), 855-857, Zoologii, 1950)

    Get PDF
    (Document contains 6pp.

    Freedom of movement

    Get PDF
    Holliday junction resolvases lock dynamic DNA four-way junctions into specific structural conformations for symmetric DNA cleavage. Single-molecule studies now reveal that resolvases can relax their grip, enabling Holliday junction conformer transitions and branch migration in the enzyme-bound form

    Promoting multiculturalism through a decolonising process

    Get PDF
    The term multiculturalism is defined, and the emergence of policies of multiculturalism in countries of immigrants and Native communities, such as the U.S., Australia and Canada is discussed. This paper discusses the historical obstacles in terms of colonialism and neoliberalism that challenge the fostering of multicultural education in contemporary societies. To empower the Aboriginal people and to achieve real multicultural education, there is a need for carrying out a decolonising process, adopting critical pedagogy and developing global education.peer-reviewe

    Community-Based Security for the Internet of Things

    Full text link
    With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT software. While these updates can be safely retrieved from app stores, the problems kick in via jailbroken devices and with the variety of untrusted sources arising on the internet. Since hacking is typically a community effort? these days, security could be a community goal too. The challenges are manifold, and one reason for weak or absent security on IoT devices is their weak computational power. In this chapter, we discuss a community based security mechanism in which devices mutually aid each other in secure software management. We discuss game-theoretic methods of community formation and light-weight cryptographic means to accomplish authentic software deployment inside the IoT device community
    corecore