• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 36
  • 8
  • 2
  • 1
  • Tagged with
  • 52
  • 52
  • 25
  • 13
  • 13
  • 11
  • 11
  • 11
  • 9
  • 8
  • 7
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Ritual Violence and the Perception of Social Difference: Migration and Human Sacrifice in the Epiclassic Basin of Mexico

January 2020 (has links)
abstract: Archaeologists have long contended that large-scale human migrations played an essential role in the cultural development of pre-Hispanic central Mexico. During the Epiclassic period (600-900 CE), migration is implicated in the appearance of new forms of material culture, sociopolitical disruptions, and the emergence of new regional polities. Sweeping social changes accompanied these developments, including demographic reorganization and increased levels of violence. Research across the social sciences finds that violence directed at individuals perceived as categorically distinct also typically increases during such periods of socio-political upheaval. This dissertation investigates identity-based violence in the Epiclassic Basin of Mexico to consider how diverse social identities contributed to the selection of victims of ritual violence. This research examines the skeletal remains from a sacrificial deposit at the Epiclassic shrine site of Non-Grid 4 in the Basin of Mexico, where a minimum of 180 human crania were interred as ritual offerings. The project reconstructs patterns of paleomobility and biological relatedness to determine whether individuals with distinct categorical social identities were more likely to become victims of human sacrifice. It answers the questions: (1) Were the sacrificed individuals predominantly locals who lived in the Basin of Mexico throughout their lives?; (2) Were the sacrificed individuals comprised of a single kin-group biologically continuous with pre-extant populations in the Basin of Mexico?; and (3) If victims were migrants biologically discontinuous with antecedent populations, from where in ancient Mesoamerica did they originate? Results indicate that a majority of sacrificial victims were immigrants originating north and south of the Basin of Mexico. Biogeochemical analyses of sacrificed individuals find that 80% are non-local migrants into the Basin, suggesting that they were likely targeted for violence based on their divergent residential histories. Multi-scalar biodistance analyses of Non-Grid 4 sacrificial victims demonstrate that they represent two biologically distinct groups. There was evidence, however, for both biological continuity among victims and pre-extant central Mexican populations, as well as for migration from northern and southern Mexico. This project therefore not only improves knowledge of migration during the central Mexican Epiclassic, but also contributes to broader anthropological understandings of the social context of violence. / Dissertation/Thesis / Doctoral Dissertation Anthropology 2020
22

The Politics of (Not) Giving a Sh*t: Understanding the Invisibilization of Queer South Asian Women in Pride Toronto

Patel, Sonali 11 November 2021 (has links)
This thesis builds on the findings of my previous study, which established that queer South Asian women (QSAW) feel invisibilized in Toronto’s LGBTQ+ community (see Patel, 2019). The present study critically investigates the operation and cultural reproduction of power in organizational practices that invisibilize QSAW within Pride Toronto™, as a means of diagnosing the problem in mainstream LGBTQ+ organizations more broadly. The following research question is explored: How do the cultural underpinnings of Pride Toronto™ contribute to the invisibilization of queer South Asian women in the broader LGBTQ+ community? This critical ethnography substantiates the invisibilization of QSAW in the LGBTQ+ community as an institutionalized form of identity-based violence. This study rejects the argument that invisibility is exclusively felt by QSAW. Instead, this thesis demonstrates that QSAW are invisibilized by the willful negligence of dominant actors in knowledge practices, as well as assimilationist politics that mandate outness, which invalidate and exclude QSAW. This study further finds that QSAW remain invisibilized in the broader LGBTQ+ community as a result of Pride organizations branding as diverse and inclusive, while simultaneously advancing colonial knowledge about queer identities and ideologies that re-write the narratives of QSAW in mainstream LGBTQ+ discourse.
23

Identifiable impact: Consequences of identity-based peer aggression in high school

Utley, Jessica W. 13 May 2022 (has links)
Up to 20% of US students reported being victimized by their classmates in 2017 (Wang et al., 2020). Consequences of peer victimization include self-harm and suicide attempts (Peng et al., 2019; Sigurdson et al., 2018), depression (Chou et al., 2020), anxiety (Mulder et al., 2017), low self-esteem (Cénat et al., 2015), substance use (Glassner & Cho, 2018), and bringing weapons to school (Smalley et al., 2017). Consequences appear to be worse among youth victimized due to actual or perceived social identities (e.g., targeted because of race or sexual orientation; Bucchianeri, 2016). Peer aggression has been declared a public health issue (Feder, 2007) and researchers continue to seek interventions to decrease its frequency (Olweus & Limber, 2010; Salmivalli et al., 2011; Newman-Carlson & Horne, 2004). This research found youth reporting social identity-based victimization were more likely to experience negative consequences than others, and feelings of social alienation partially explained these outcomes.
24

Application of Fuzzy Logic in Identity-Based Cryptography / Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı

Odyurt, Uraz January 2014 (has links)
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.
25

Proposta de um mecanismo de segurança alternativo para o SIP utilizando o protocolo Massey-Omura aperfeiçoado com o uso de emparelhamentos bilineares. / A proposal of an alternative security mechanism for SIP by using the Massey-Omura protocol enhanced by bilinear pairings.

Deusajute, Alexandre Machado 26 April 2010 (has links)
Voz sobre IP (ou VoIP) vem sendo adotada progressivamente não apenas por um grande número de empresas mas também por um número expressivo de pessoas, no Brasil e em outros países. Entretanto, essa crescente adoção de VoIP no mundo traz consigo algumas preocupações tais como ameaças e riscos de segurança, sobretudo no que diz respeito à autenticidade, privacidade e integridade da comunicação. Para proteger a sessão de mídia existem protocolos muito eficientes, como o Secure Real-time Transport Protocol (SRTP). Mas ele depende de uma chave secreta para tornar a comunicação segura de fato. Assim, uma boa estratégia é aproveitar o processo de sinalização que estabelece a sessão de mídia e negociar uma chave secreta de sessão que seja comum às partes comunicantes. Esse processo de sinalização é realizado por tipos específicos de protocolo tais como o Session Initiation Protocol (SIP), um protocolo de sinalização muito importante e que vem sendo usado cada vez mais por softphones para comunicação na Internet. Todavia, os riscos e ameaças mencionados já existem no próprio processo de sinalização e, dentre eles, o ataque do tipo man-in-the-middle é o mais perigoso, devido aos prejuízos que ele pode causar. Depois de fazer uma revisão bibliográfica dos riscos e ameaças inerentes ao SIP, bem como de seus mecanismos de segurança (analisando os pontos fortes e de atenção deles), foi possível originar um novo mecanismo de segurança, o qual é apresentado neste trabalho. O mecanismo proposto usa um protocolo para troca segura de informações o protocolo Massey-Omura o qual, quando combinado com emparelhamentos bilineares, provê ao SIP um melhor nível de segurança em todos os aspectos (autenticidade, privacidade e integridade). Além disso, o novo mecanismo é avaliado através de uma prova de conceito, na qual utilizou-se um softphone SIP funcional. A análise de segurança realizada e os resultados obtidos da prova de conceito fazem do mecanismo de segurança proposto uma alternativa viável para o SIP. / Voice over IP (or VoIP) has been progressively adopted not only by a great number of companies but also by an expressive number of people, in Brazil and in other countries. However, this increasing adoption of VoIP in the world brings some concerns such as security risks and threats, mainly on the authenticity, privacy and integrity of the communication. In order to protect the media session, efficient protocols like the Secure Real-time Transport Protocol (SRTP) have been used. However, it depends on a secret key to make the communication secure. Thus, a good strategy is to take advantage of the signaling process to establish the media session, and agree on a common secret session key between the communicating parties. This signaling process is performed by specific types of protocols such as the Session Initiation Protocol (SIP), a very important signaling protocol, which has been used more and more by softphones in the Internet communication. Nevertheless, those risks and threats already exist in the own signaling process and, among them, the man-in-the-middle attack is the worst of all due to its high danger degree. After doing a bibliographical revision of the SIP security risks and threats, as well as its security mechanisms (analyzing their advantages and drawbacks), it was possible to generate a new security mechanism, which is presented in this work. The proposed mechanism uses a protocol for secure information exchange the Massey-Omura protocol which, when combined with bilinear pairings, provides a better security level for SIP in all its aspects (authenticity, privacy and integrity). Besides this, the new mechanism is evaluated by a proof of concept, in the which a functional SIP softphone was used. The security analysis and the results obtained from the proof of concept, make the proposed security mechanism a viable alternative for SIP.
26

Efficient and Tamper-Resilient Architectures for Pairing Based Cryptography

Ozturk, Erdinc 04 January 2009 (has links)
Identity based cryptography was first proposed by Shamir in 1984. Rather than deriving a public key from private information, which would be the case in traditional public key encryption schemes, in identity based schemes a user's identity plays the role of the public key. This reduces the amount of computations required for authentication, and simplifies key-management. Efficient and strong implementations of identity based schemes are based around easily computable bilinear mappings of two points on an elliptic curve onto a multiplicative subgroup of a field, also called pairing. The idea of utilizing the identity of the user simplifies the public key infrastructure. However, since pairing computations are expensive for both area and timing, the proposed identity based cryptosystem are hard to implement. In order to be able to efficiently utilize the idea of identity based cryptography, there is a strong need for an efficient pairing implementations. Pairing computations could be realized in multiple fields. Since the main building block and the bottleneck of the algorithm is multiplication, we focused our research on building a fast and small arithmetic core that can work on multiple fields. This would allow a single piece of hardware to realize a wide spectrum of cryptographic algorithms, including pairings, with minimal amount of software coding. We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2^n), GF(3^m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as identity based encryption which requires a pairing computation on an elliptic curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical unified architectures is only good for addition and multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for transformation between the redundant and non-redundant representations of field elements, which would be required in classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88 % while the improvement over a classical unified architecture is at least 32.07 %. Until recently there has been no work covering the security of pairing based cryptographic hardware in the presence of side-channel attacks, despite their apparent suitability for identity-aware personal security devices, such as smart cards. We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pairing computations. The presented algorithms provide quantifiable resilience in a well defined strong attacker model. Given the emergence of fault attacks as a serious threat to pairing based cryptography, the proposed technique solves a key problem when incorporated into software and hardware implementations. In this dissertation, we also present an efficient accelerator for computing the Tate Pairing in characteristic 3, based on the Modified Duursma Lee algorithm.
27

Proposta de um mecanismo de segurança alternativo para o SIP utilizando o protocolo Massey-Omura aperfeiçoado com o uso de emparelhamentos bilineares. / A proposal of an alternative security mechanism for SIP by using the Massey-Omura protocol enhanced by bilinear pairings.

Alexandre Machado Deusajute 26 April 2010 (has links)
Voz sobre IP (ou VoIP) vem sendo adotada progressivamente não apenas por um grande número de empresas mas também por um número expressivo de pessoas, no Brasil e em outros países. Entretanto, essa crescente adoção de VoIP no mundo traz consigo algumas preocupações tais como ameaças e riscos de segurança, sobretudo no que diz respeito à autenticidade, privacidade e integridade da comunicação. Para proteger a sessão de mídia existem protocolos muito eficientes, como o Secure Real-time Transport Protocol (SRTP). Mas ele depende de uma chave secreta para tornar a comunicação segura de fato. Assim, uma boa estratégia é aproveitar o processo de sinalização que estabelece a sessão de mídia e negociar uma chave secreta de sessão que seja comum às partes comunicantes. Esse processo de sinalização é realizado por tipos específicos de protocolo tais como o Session Initiation Protocol (SIP), um protocolo de sinalização muito importante e que vem sendo usado cada vez mais por softphones para comunicação na Internet. Todavia, os riscos e ameaças mencionados já existem no próprio processo de sinalização e, dentre eles, o ataque do tipo man-in-the-middle é o mais perigoso, devido aos prejuízos que ele pode causar. Depois de fazer uma revisão bibliográfica dos riscos e ameaças inerentes ao SIP, bem como de seus mecanismos de segurança (analisando os pontos fortes e de atenção deles), foi possível originar um novo mecanismo de segurança, o qual é apresentado neste trabalho. O mecanismo proposto usa um protocolo para troca segura de informações o protocolo Massey-Omura o qual, quando combinado com emparelhamentos bilineares, provê ao SIP um melhor nível de segurança em todos os aspectos (autenticidade, privacidade e integridade). Além disso, o novo mecanismo é avaliado através de uma prova de conceito, na qual utilizou-se um softphone SIP funcional. A análise de segurança realizada e os resultados obtidos da prova de conceito fazem do mecanismo de segurança proposto uma alternativa viável para o SIP. / Voice over IP (or VoIP) has been progressively adopted not only by a great number of companies but also by an expressive number of people, in Brazil and in other countries. However, this increasing adoption of VoIP in the world brings some concerns such as security risks and threats, mainly on the authenticity, privacy and integrity of the communication. In order to protect the media session, efficient protocols like the Secure Real-time Transport Protocol (SRTP) have been used. However, it depends on a secret key to make the communication secure. Thus, a good strategy is to take advantage of the signaling process to establish the media session, and agree on a common secret session key between the communicating parties. This signaling process is performed by specific types of protocols such as the Session Initiation Protocol (SIP), a very important signaling protocol, which has been used more and more by softphones in the Internet communication. Nevertheless, those risks and threats already exist in the own signaling process and, among them, the man-in-the-middle attack is the worst of all due to its high danger degree. After doing a bibliographical revision of the SIP security risks and threats, as well as its security mechanisms (analyzing their advantages and drawbacks), it was possible to generate a new security mechanism, which is presented in this work. The proposed mechanism uses a protocol for secure information exchange the Massey-Omura protocol which, when combined with bilinear pairings, provides a better security level for SIP in all its aspects (authenticity, privacy and integrity). Besides this, the new mechanism is evaluated by a proof of concept, in the which a functional SIP softphone was used. The security analysis and the results obtained from the proof of concept, make the proposed security mechanism a viable alternative for SIP.
28

Design And Implementation Of A Secure And Searchable Audit Logging System

Incebacak, Davut 01 May 2007 (has links) (PDF)
Logs are append-only time-stamped records to represent events in computers or network devices. Today, in many real-world networking applications, logging is a central service however it is a big challenge to satisfy the conflicting requirements when the security of log records is of concern. On one hand, being kept on mostly untrusted hosts, the logs should be preserved against unauthorized modifications and privacy breaches. On the other, serving as the primary evidence for digital crimes, logs are often needed for analysis by investigators. In this thesis, motivated by these requirements we define a model which integrates forward integrity techniques with search capabilities of encrypted logs. We also implement this model with advanced cryptographic primitives such as Identity Based Encryption. Our model, in one side, provides secure delegation of search capabilities to authorized users while protecting information privacy, on the other, these search capabilities set boundaries of a user&rsquo / s search operation. By this way user can not access logs which are not related with his case. Also, in this dissertation, we propose an improvement to Schneier and Kelsey&rsquo / s idea of forward integrity mechanism.
29

Advanced personalization of IPTV services

SONG, Songbo 06 January 2012 (has links) (PDF)
Internet Protocol TV (IPTV) delivers television content to users over IP-based network. Different from the traditional TV services, IPTV platforms provide users with large amount of multimedia contents with interactive and personalized services, including the targeted advertisement, on-demand content, personal video recorder, and so on. IPTV is promising since it allows to satisfy users experience and presents advanced entertainment services. On the other hand, the Next Generation Network (NGN) approach in allowing services convergence (through for instance coupling IPTV with the IP Multimedia Subsystem (IMS) architecture or NGN Non-IMS architecture) enhances users' experience and allows for more services personalization. Although the rapid advancement in interactive TV technology (including IPTV and NGN technologies), services personalization is still in its infancy, lacking the real distinguish of each user in a unique manner, the consideration of the context of the user (who is this user, what is his preferences, his regional area, location, ..) and his environment (characteristics of the users' devices 'screen types, size, supported resolution, '' and networks available network types to be used by the user, available bandwidth, ..') as well as the context of the service itself (content type and description, available format 'HD/SD', available language, ..) in order to provide the adequate personalized content for each user. This advanced IPTV services allows services providers to promote new services and open new business opportunities and allows network operators to make better utilization of network resources through adapting the delivered content according to the available bandwidth and to better meet the QoE (Quality of Experience) of clients. This thesis focuses on enhanced personalization for IPTV services following a user-centric context-aware approach through providing solutions for: i) Users' identification during IPTV service access through a unique and fine-grained manner (different from the identification of the subscription which is the usual current case) based on employing a personal identifier for each user which is a part of the user context information. ii) Context-Aware IPTV service through proposing a context-aware system on top of the IPTV architecture for gathering in a dynamic and real-time manner the different context information related to the user, devices, network and service. The context information is gathered throughout the whole IPTV delivery chain considering the user domain, network provider domain, and service/content provider domain. The proposed context-aware system allows monitoring user's environment (devices and networks status), interpreting user's requirements and making the user's interaction with the TV system dynamic and transparent. iii) Personalized recommendation and selection of IPTV content based on the different context information gathered and the personalization decision taken by the context-aware system (different from the current recommendation approach mainly based on matching content to users' preferences) which in turn highly improves the users' Quality of Experience (QoE) and enriching the offers of IPTV services
30

Activisme rose : cultures et arts féministes queer en France / Pink activism : queer feminist cultures and arts in France

Lorenzi, Marie-Emilie 13 November 2015 (has links)
Le terme "Queer" ne résonne pas de la même façon en version originale - le contexte anglo-saxon d'émergence - qu'en version française. L'objectif principal de cette recherche est de questionner les phénomènes de transferts culturels dans le contexte français du féminisme queer, à la fois mouvement de pensée critique, activisme et subculture apparus au milieu des années 1980 aux Etats-Unis. De cette traduction culturelle du mouvement queer en France est né un activisme rose qui à l'inverse du contexte anglo-saxon a développé une politique basée sur une forte affirmation identitaire, à la fois collective et individuelle, afin de déjouer le modèle d'intégration français largement imprégné d'idéaux républicains et où les dérives d'un universalisme abstrait conduisent à l'aveuglement face aux inégalités entre les individus. Ainsi la question centrale qui anime cette recherche est d'examiner comment cet activisme rose fait irruption dans le contexte français réfractaire aux politiques identitaires.Et, au-delà de la seule traduction linguistique, les phénomènes de réception et d'appropriation dans le contexte français du féminisme "queer" sont à comprendre dans toutes leurs dimensions : culturelle, politique, théorique, artistique, etc. Ainsi, cette recherche cherche à comprendre les spécificités de cet activisme, de son inscription parfois mouvementée au sein des mouvements féministes et des mouvements dits LGBT, à ses applications particulières en terme de pratiques culturelles et artistiques, afin d'interroger le phénomène d'esthétisation des techniques de lutte. / The term queer, when used in the French language, does not echo the same way as in English –then referring to the anglo-saxon context of emergence. The main purpose of this study is to question the phenomena of cultural transfers of queer feminism – which appeared in the mid 1980s in the United States as both a subculture and a movement of critical thinking and activism- into the French context. This cultural translation resulted in pink activism which unlike its anglo saxon original model developed a policy based on strong identity affirmation, on both a collective and individual level. The goal was to beat the French integration system deeply imbued with republican ideals, where the drifts of an abstract universalism had produced blindness towards inequalities therefore the central issue investigated in this research is how this pink activism arose in a French context of opposition to identity-based politics.Moreover, the phenomena of reception and appropriation of queer feminism into the French context must be understood beyond the sole linguistic translation – in all their dimensions, cultural political, theoritical, artistic, etc. This study aims to understand the special features of this activism, from its sometimes uneasy integration among feminist and LGBT movements to its specific applications in terms of cultural and artistic practices, thus questioning the phenomenon of aestheticism of resistance techniques.

Page generated in 0.1038 seconds