Search results for "Security"
showing 10 items of 1693 documents
Introduction to Software Product Lines: Engineering, Services, and Management Minitrack
2013
Software has become the key asset for competitive products and services in all industries. Thus, competiti¬veness in software development, maintenance, and related ser¬vices has become a concern for organiza¬tions. Competitiveness can be increased through (1) internal strategies such as the strategic crea¬tion and reuse of softwa¬re assets and (2) external strategies such as outsourcing software de¬velopment, maintenance, and/or services from third party service providers and acquiring off-the-shelf components from providers and open source communities. A viable third strategy is to enact both strategies in parallel. This minitrack focuses on the first and third strategy. The minitrack acce…
PROTOCOL: Organised crime groups: A systematic review of individual‐level risk factors related to recruitment
2019
Interešu konflikts: Kipras un Piedņestras konfliktu salīdzinošā analīze.
2016
. Jau vairāk nekā četrdesmit gadus ilgā Kipras konflikta dēļ, salīdzinājumā ar Piedņestru Kiprai ir vairāk pieredzes mediācijā. Taču Kipras konfliktā gūtā pieredze var kalpot kā pozitīvu un negatīvu mediācijas piemēru kopums, jo abu konfliktu attīstības posmiem ir daudz kopīgu iezīmju. Abi konflikti ir piesaistījis daudzu valstu un starptautisko organizāciju uzmanību, tomēr ne vienmēr viņu iesaistīšanās ir palīdzējusi konflikta atrisināšanas procesā, dažreiz tā ir pat traucējusi konflikta risināšanā. Arī izmaiņas mediācijā dominējošo valstu lomās atspoguļo mainīgo starptautisko attiecību vidi. Konflikti Kiprā un Moldovā apdraud drošību Eiropaā, kas savukārt pierāda vajadzību pārskatīt pastā…
Quantum Security Proofs Using Semi-classical Oracles
2019
We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.
On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators
2018
International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…
Informal Disaster Governance
2020
<p>Scholars and practitioners are increasingly questioning formal disaster governance (FDG) approaches as being too rigid, slow, and command-and-control driven. Too often, local realities and non-formal influences are sidelined or ignored to the extent that disaster governance can be harmed through the efforts to impose formal and/or political structures. A contrasting narrative emphasises so-called bottom-up, local, and/or participatory approaches which this article proposes to encapsulate as Informal Disaster Governance (IDG). This article theorises IDG and situates it within the long-standing albeit limited literature on the topic, paying particular attention to the literature’s fa…
Nordic Cooperation in the Nuclear Safety Sector: High, Low, or Differentiated Integration?
2020
Nordic cooperation has been depicted as eroding due to the increased importance of EU-related cooperation and integration. However, scholars propose that longstanding Nordic networks, grounded in professions and located in the state administration, may prove to be more robust toward external changes. This article discusses this proposal by looking at Nordic cooperation between the national radiation protection and nuclear safety authorities in Iceland, Denmark, Norway, Sweden, and Finland. The article maps behavioural perceptions of agency staff based on a dataset of 37 interviews to illustrate if the cooperation between the Nordic authorities is characterized by high integration, low integ…
Privacy invasions
2006
Nowhere has technological progress been as dramatic as in the field of information and communication technology (ICT). Citizens of the developed world now live in an environment in which access to electronic information and communication is nearly ubiquitous—and we rely heavily on being surrounded by this technology. In fact, it is so omnipresent that we only recognize our dependence on ICT when a network server or a communications system fails, leaving us cut off from cyberspace. > …computers, mobile telephones, personal digital assistants, music players and all other types of electronic gadgets are further shrinking in size, and we will soon wear them as we do clothes or jewellery… The fi…
Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks
2020
International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…
"Table 4" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."
2006
Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.