Search results for "Secrecy"

showing 10 items of 22 documents

The evolutionary ecology of deception

2015

Through dishonest signals or actions, individuals often misinform others to their own benefit. We review recent literature to explore the evolutionary and ecological conditions for deception to be more likely to evolve and be maintained. We identify four conditions: (1) high misinformation potential through perceptual constraints of perceiver; (2) costs and benefits of responding to deception; (3) asymmetric power relationships between individuals and (4) exploitation of common goods. We discuss behavioural and physiological mechanisms that form a deception continuum from secrecy to overt signals. Deceptive tactics usually succeed by being rare and are often evolving under co-evolutionary a…

0106 biological sciences0301 basic medicineEcologymedia_common.quotation_subjectDeception010603 evolutionary biology01 natural sciencesGeneral Biochemistry Genetics and Molecular BiologySexual conflict03 medical and health sciences030104 developmental biologyConceptual frameworkPerceptionSecrecyMimicryEvolutionary ecologyMisinformationGeneral Agricultural and Biological SciencesPsychologyCognitive psychologymedia_commonBiological Reviews
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information

2017

In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…

European ParliamentparliamentPublic AdministrationSociology and Political ScienceEuropean PoliticsParliamentmedia_common.quotation_subjectPolitikwissenschaft0211 other engineering and technologies02 engineering and technologyEuropapolitikPublic administrationInformation policyPower (social and political)secrecylcsh:Political science (General)Political science050602 political science & public administrationmedia_common.cataloged_instancePrivileged accessEuropean UnionAußenpolitikEuropean unionlcsh:JA1-92Political scienceEuropaparlamentmedia_commoninformation policytransparency021110 strategic defence & security studies05 social sciencesParlamentKontrolledemocratic accountabilitydemocratic accountability; secrecyTransparency (behavior)Democracy0506 political scienceTransparenzforeign policyForeign policyddc:320EUInformationspolitikcontrolIndraStra Global
researchProduct

Don't Tell Us: The Demand for Secretive Behaviour

2009

The matter studied here is how, and with what implications, people may decide that they do not want to be let into secrets that concern them. They could get the information at no cost but they refuse to know. The reasoning is framed in terms of principals and agents, with the principals assumed not to want to know the agents' secrets. For convenience, the context chosen for the exposition is mainly that of voters as principals and the government or the office-holders as agents. After some exploration of the motivations underlying the attitude of the principals, the paper focuses on the case when neither total secrecy nor total disclosure prevails. The demand for partial secrecy is analysed …

GovernmentSalience (language)business.industrymedia_common.quotation_subjectContext (language use)Public relationsInformation asymmetryVotingPolitical scienceTransparency (graphic)Secrecybusinessmedia_commonExposition (narrative)SSRN Electronic Journal
researchProduct

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

2013

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

Key distribution in wireless sensor networksComputer Networks and CommunicationsForward secrecybusiness.industryComputer scienceNode (networking)Distributed data storeProbabilistic logicKey (cryptography)businessWireless sensor networkComputer networkComputer Communications
researchProduct

Beauty and the Cosmetic Secret

2018

Cosmetic surgery is often linked to the perception that women who resort to cosmetic interventions to alter their physical appearance are vain, superficial, and narcissistic. Few investigations have acknowledged and explored the individual’s personal motivations and experiences of her action and choice with regards to aesthetic surgery. By focusing on subjective experience, alternative insights can be gained on the cosmetic procedure(s) and on how their reshaped body influences an individual’s lifeworld experience. The article explores the perceived benefits and consequences of reshaping, enhancing, and/or reducing a perceived flaw or shortcoming of the body. From this exploration the focus…

LifeworldSelf-Empowermentmedia_common.quotation_subjectSocial realitylcsh:HM401-1281Psychology of selfSecrecyHuman physical appearanceFeminismBeautyEmbodiment0601 history and archaeologyNarrativeSociologyEmpowermentSocial constructivismmedia_commonSocial Constructivism060101 anthropology05 social sciencesGeneral Social SciencesCosmetic Surgery06 humanities and the artsFemininitylcsh:Sociology (General)050903 gender studiesAestheticsBeautyPhenomenology0509 other social sciencesQualitative Sociology Review
researchProduct

Time pressure in acquisition negotiations: Its determinants and effects on parties’ negotiation behaviour choice

2008

Abstract Although negotiation literature suggests that time pressure influences negotiation behaviour, and in strategy literature, time appears as a key factor in acquisition formation, its impact on negotiation behaviour choice has not been the subject of a great deal of in-depth research. This paper focuses on the determinants of the amount of time pressure perceived by negotiation parties during acquisition negotiations and the impact on communication. The effect of cultural differences in both relationships is also analysed. The theoretical model proposed is explored by examining three acquisition negotiation cases involving Spanish firms. The evidence suggests that, contrary to expecta…

MarketingAtmosphere (unit)Value creationbusiness.industrymedia_common.quotation_subjectTime perceptionPublic relationsTime pressureMicroeconomicsNegotiationCultural diversitySecrecyEconomicsBusiness and International ManagementbusinessFinancemedia_commonInternational Business Review
researchProduct

An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs

2010

Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.

Mobile radiobusiness.industryForward secrecyComputer scienceNode (networking)Mobile computingCryptographyMobile telephonybusinessResilience (network)Chinese remainder theoremComputer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Open Government – A Long Way Ahead for Romania

2014

Abstract Although the topic of OPEN Government isn’t quite as new, the citizens of the world seem not to have acknowledged the responsibility they share with the authorities in really implementing it. Thus some progress has been made, there is still a long way ahead with regard of the active participation of the citizens, on one hand and the mitigation of the still existing extensive state secrecy, on the other. Romania has committed to achieve the goals stated in the Open Government Partnership, but there are still many things to be considered. The main aspects analyzed in this paper are: fiscal transparency, access to information, Disclosures Related to Elected or Senior Public Officials …

Open governmentOpen Governmentbusiness.industryTransparency (market)General Engineeringcitizens engagementEnergy Engineering and Power TechnologyComputingMilieux_LEGALASPECTSOFCOMPUTINGPublic relationsPublic administrationTransparencyActive participationAccess to informationGeneral partnershipSecrecyEconomicsbusinessProcedia Economics and Finance
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct