2,546 research outputs found
Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks
We consider network graphs in which adjacent nodes share common
secrets. In this setting, certain techniques for perfect end-to-end security
(in the sense of confidentiality, authenticity (implying integrity) and
availability, i.e., CIA+) can be made applicable without end-to-end shared
secrets and without computational intractability assumptions. To this end, we
introduce and study the concept of a unique-neighborhood network, in which
nodes are uniquely identifiable upon their graph-topological neighborhood.
While the concept is motivated by authentication, it may enjoy wider
applicability as being a technology-agnostic (yet topology aware) form of
addressing nodes in a network
On the "long" flounders of the far eastern seas of the USSR: Microstomus, Glyptocephalus, Tanakius (Pleuronectidae). (Translation of Doklady Akademii Nauk SSSR, 74(4), 855-857, Zoologii, 1950)
(Document contains 6pp.
Freedom of movement
Holliday junction resolvases lock dynamic DNA four-way junctions into specific structural conformations for symmetric DNA cleavage. Single-molecule studies now reveal that resolvases can relax their grip, enabling Holliday junction conformer transitions and branch migration in the enzyme-bound form
Promoting multiculturalism through a decolonising process
The term multiculturalism is defined, and the emergence of policies of multiculturalism in countries of immigrants and Native communities, such as the U.S., Australia and Canada is discussed. This paper discusses the historical obstacles in terms of colonialism and neoliberalism that challenge the fostering of multicultural education in contemporary societies. To empower the Aboriginal people and to achieve real multicultural education, there is a need for carrying out a decolonising process, adopting critical pedagogy and developing global education.peer-reviewe
Community-Based Security for the Internet of Things
With more and more devices becoming connectable to the internet, the number
of services but also a lot of threats increases dramatically. Security is often
a secondary matter behind functionality and comfort, but the problem has
already been recognized. Still, with many IoT devices being deployed already,
security will come step-by-step and through updates, patches and new versions
of apps and IoT software. While these updates can be safely retrieved from app
stores, the problems kick in via jailbroken devices and with the variety of
untrusted sources arising on the internet. Since hacking is typically a
community effort? these days, security could be a community goal too. The
challenges are manifold, and one reason for weak or absent security on IoT
devices is their weak computational power. In this chapter, we discuss a
community based security mechanism in which devices mutually aid each other in
secure software management. We discuss game-theoretic methods of community
formation and light-weight cryptographic means to accomplish authentic software
deployment inside the IoT device community
- …
