3,785 research outputs found

    Escalating The War On SPAM Through Practical POW Exchange

    Get PDF
    Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an impact on SPAM, it would also be onerous enough to impact on senders of "legitimate" email. I suggest that a non-uniform proof-of-work scheme on email may be a solution to this problem, and describe a framework that has the potential to limit SPAM, without unduly penalising legitimate senders, and is constructed using only current SPAM filter technology, and a small change to the SMTP (Simple Mail Transfer Protocol). Specifically, I argue that it is possible to make sending SPAM 1,000 times more expensive than sending "legitimate" email (so called HAM). Also, unlike the system proposed by Debin Liu and Jean Camp (2006), it does not require the complications of maintaining a reputation system.Comment: To be presented at the IEEE Conference On Networking, Adelaide, Australia, November 19-21, 200

    Beyond Copenhagen: A climate policymaker's handbook

    Get PDF
    It is still unclear what a post-Kyoto international regime to tackle climate change will look like. Negotiations on a post-2012 framework are revisiting questions that arose when the Kyoto Protocol was put in place Â? such as how targets can best be shared out, and how the different interests of rich and poor countries can be addressed Â? but policymakers must also face new realities. Scientific evidence shows that the climate policies formulated so far are unfit to deal with the magnitude of the challenge. This book looks realistically at the options for a deal to succeed the Kyoto Protocol. It sets out some of the main ingredients that will have to be included for finalisation of an economically rational agreement that stands a real chance of addressing the threat to the climate system. It critically analyses the European Union's climate policies before reviewing the key elements of such an agreement: carbon markets, flexible mechanisms for transferring money and technology to developing countries, innovation, and the effective enforcement of a global climate deal. The contributors to the volume are Joseph E Aldy, Valentina Bosetti, Carlo Carraro, Juan Delgado, Denny Ellerman, Dieter Helm, Axel Michaelowa, Robert N Stavins and Massimo Tavoni. The French Ministère de lâ??Ecologie, de lâ??Energie, du Développement durable et de la Mer, under the auspices of the 2008 French Presidency of the Council of the European Union, contributed financial support to the production of this volume.

    Charisma and the Case of Philip Rieff

    Get PDF

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Database-backed library web sites: a case study of the use of PHP and MySQL at the University of Nottingham

    Get PDF
    This paper discusses the advantages of database-backed websites and describes the model for a library website implemented at the University of Nottingham using open source software, PHP and MySQL. As websites continue to grow in size and complexity it becomes increasingly important to introduce automation to help manage them. It is suggested that a database-backed website offers many advantages over one built from static HTML pages. These include a consistency of style and content, the ability to present different views of the same data, devolved editing and enhanced security. The University of Nottingham Library Services website is described and issues surrounding its design, technological implementation and management are explored

    Africa’s recent economic success in a European mirror: a historical perspective on avoiding ‘growth reversals’ and achieving sustained growth

    Get PDF
    LSE’s Leigh Gardner and Stephen Broadberry examine European history for indications on how African countries can sustain the current economic boom
    • …
    corecore