• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 65
  • 21
  • 12
  • 12
  • 7
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 139
  • 40
  • 37
  • 33
  • 30
  • 18
  • 17
  • 15
  • 15
  • 13
  • 12
  • 12
  • 12
  • 11
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

SharkNet : Cooperation with service providers outside the secure infrastructure / SharkNet : Samarbete med partners utanför den säkra infrastrukturen

Normark, Vendela January 2003 (has links)
This master thesis presents how the authentication is handled in two frequently used protocols. It is a study of the authentication procedure in IPsec and TLS where the techniques have been compared based on facts from literature and practical tests. The results in this thesis are to be used as part arguments for continuous development of cooperation between operators using Ericsson´s charging system and content providers. / I detta magisterarbete beskrivs hur autentisering går till i två vanligt förekommande protokoll. Det är en undersökning av autentiseringen i IPsec och TLS där teknikerna har jämförts utifrån litterära studier och praktiska tester. Resultaten i arbetet ska användas som delargument i den fortsatta utvecklingen av samarbeten mellan mobiltelefonoperatörer som använder Ericssons betalningssystem och externa leverantörer.
22

Důvěryhodná proxy v SSL/TLS spojení / Trusted proxy in SSL/TLS connection

Smolík, Jiří January 2017 (has links)
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years and many implementations exist. However, all of them share a single technical solution which is based solely on the PKI authentication mechanism and suffers from multiple serious disadvantages. Most importantly, it is not compatible with several aspects or future trends of SSL/TLS and PKI, there's almost no space for improvement and its real use may spawn legal issues. After we analyze technical background and the current solution, we will propose another one, based not only on PKI but SSL/TLS too. Both solutions will be compared and general superiority of the new one will be shown. Basic implementation and analysis will follow, along with deployment requirements and ideas for future development. Powered by TCPDF (www.tcpdf.org)
23

Detekce a analýza přenosů využívajících protokoly SSL/TLS / Traffic detection and analysis using SSL/TLS

Hutar, Jan January 2017 (has links)
This diploma thesis deals with a detection and analysis of secure connections of electro- nic communication through SSL/TLS protocols. The thesis begins with introduction to SSL/TLS protocols. Thereafter, an analysis of messages used to establish secure con- nections using STARTTLS and postal protocols SMTP, POP3, and IMAP was made. Metadata detection and extraction of secured simplex and duplex connections take place using deep packet inspection tools. The tool of choice is the nDPI library from the Ntop project. The library was extended to detect the connections and extract the metadata based on studies and analysis of transmitted messages. Finally, testing is performed on a training data set and a basic analysis of acquired metadata is made.
24

Evaluate Techniques For Wireless Communication From a Network Device To a Smartphone

Evaldsson, Florian, Lindström, Martin January 2015 (has links)
This is our thesis for the course Degree Project in Electronics and Computer Engineering (IL122X). Our project was carried out at the company Westermo which is working on making industry network equipment. Westermo wanted a method for sending information from one of their network devices to a mobile device using secure wireless communication. It was first planned to be done using Bluetooth, and exchange keys through NFC. This was later changed to not just evaluate this particular situation, but to evaluate the best solution for their use-case. This report will go through our evaluation process. We will mention different possible techniques and if they can be used, then put the techniques together and form a possible solution. Our discussion will mention what we think is the best solution and why, and the way forward.
25

A Developer Usability Study of TLS Libraries

Armknecht, Jonathan Blake 15 September 2020 (has links)
Transport Layer Security (TLS) is a secure communication protocol between a client and a server over a network. The TLS protocol provides the two endpoints with confidentiality through symmetric encryption, endpoint authentication using public-key cryptography, and data integrity using a MAC. However, studies show that security vulnerabilities within TLS connections are often caused by developers misusing TLS library APIs. We measure the usability of four TLS libraries by performing a developer user study. Participants were given code that connects to google.com through HTTP, and tasked with using a TLS library to change the code so that it connects securely to Google through HTTPS. Our results help show what makes a library usable and what problems arise for developers using these TLS libraries. We found that the main way to ensure a TLS library is usable is to focus on having clear documentation. From our results, we provide suggestions on how to create usable documentation.
26

Achieving improved leaf area index estimations from digital hemispherical imagery through destructive sampling methods

Condon, Timothy 05 July 2019 (has links)
Destructive sampling of 20 trees of four tree species in a mixed New England conifer/hardwood stand shows that leaf area comprises 72, 77, and 78 percent of plant area as measured with digital hemispherical photography of the stand in (1) leaf-off, (2) leaf-out and pre-harvest, and (3) leaf-out and post-harvest conditions. Leaf area index values for the stand, estimated through destructive sampling, were 4.42, 5.98, and 5.08 respectively, documenting the progression of leaf growth through post-harvest. Terrestrial lidar scans (TLS) of the stand in (1) leaf-off and (2) leaf-out and pre-harvest conditions provided leaf area index values of 4.49 and 6.00 using the correction applied to observed plant area index, showing good agreement. The method relies on destructive sampling to relate the weight of foliage removed from sample trees to leaf area and fine twig area within the foliage as measured by a flatbed scanner. Two conifer species, eastern hemlock and white pine, and two deciduous species, red maple and red oak, in five diameter-size classes, were harvested from the 50 x 50-m stand in late summer. Leaf and twig areas of these trees provided species-specific allometric equations relating stem basal area to leaf and twig area, and a stand map provided species, counts and diameters of all trees in the plot. These data then allowed estimation of the leaf area of the stand as a whole for comparison with optical methods. The ratios of leaf to fine-branch area for each species vary, with values of 5.33, 25.38, 260.88 and 140.35 for eastern hemlock, white pine, red maple, and red oak respectively. This variance shows that woody-to-total area constants, which are used for calculating leaf area index from plant area index values determined by optical gap probability methods, will be quite dependent on stand composition and questions the common usage of literature constants for this purpose. This study shows how destructive sampling can lead to better estimation of forest leaf area index and wood area index from hemispherical photography and terrestrial lidar scanning, which has the potential to improve modeling of nutrient cycling and carbon balance in ecosystem models.
27

Elaboration d'un modèle d'identité numérique adapté à la convergence / Development of a convergence-oriented digital identity framework

Kiennert, Christophe 10 July 2012 (has links)
L’évolution des réseaux informatiques, et notamment d’Internet, s’ancre dans l’émergence de paradigmes prépondérants tels que la mobilité et les réseaux sociaux. Cette évolution amène à considérer une réorganisation de la gestion des données circulant au cœur des réseaux. L’accès à des services offrant de la vidéo ou de la voix à la demande depuis des appareils aussi bien fixes que mobiles, tels que les Smartphones, ou encore la perméabilité des informations fournies à des réseaux sociaux conduisent à s’interroger sur la notion d’identité numérique et, de manière sous-jacente, à reconsidérer les concepts de sécurité et de confiance. La contribution réalisée dans ce travail de thèse consiste, dans une première partie, à analyser les différents modèles d’identité numérique existants ainsi que les architectures de fédération d’identité, mais également les protocoles déployés pour l’authentification et les problèmes de confiance engendrés par l’absence d’élément sécurisé tel qu’une carte à puce. Dans une deuxième partie, nous proposons, en réponse aux éléments dégagés dans la partie précédente, un modèle d’identité fortement attaché au protocole d’authentification TLS embarqué dans un composant sécurisé, permettant ainsi de fournir les avantages sécuritaires exigibles au cœur des réseaux actuels tout en s’insérant naturellement dans les différents terminaux, qu’ils soient fixes ou mobiles. Enfin, dans une dernière partie, nous expliciterons plusieurs applications concrètes, testées et validées, de ce modèle d’identité, afin d’en souligner la pertinence dans des cadres d’utilisation pratique extrêmement variés. / IT networks evolution, chiefly Internet, roots within the emergence of preeminent paradigms such as mobility and social networks. This development naturally triggers the impulse to reorganize the control of data spreading throughout the whole network. Taking into account access to services such as video or voice on demand coming from terminals which can be fixed or mobile such as smartphones, or also permeability of sensitive information provided to social networks, these factors compel a necessary interrogation about digital identity as a concept. It also intrinsically raises a full-fledged reconsideration of security and trust concepts. The contribution of this thesis project is in line, in a first part, with the analysis of the existing manifold digital identity frameworks as well as the study of current authentication protocols and trust issues raised by the lack of trusted environment such as smartcards. In a second part, as an answer to the concerns suggested in the first part, we will advocate an identity framework strongly bounded to the TLS authentication protocol which needs to be embedded in a secure component, thus providing the mandatory security assets for today’s networks while naturally fitting with a varied scope of terminals, be it fixed or mobile. In a last part, we will finally exhibit a few practical applications of this identity framework, which have been thoroughly tested and validated, this, in order to emphasize its relevance throughout multifarious use cases.
28

Genetic stability in the hyperthermophilic archaeon Sulfolobus acidocaldarius

Cong, Xinyu 15 October 2015 (has links)
No description available.
29

Photogrammetric techniques for across-scale soil erosion assessment

Eltner, Anette 01 November 2016 (has links) (PDF)
Soil erosion is a complex geomorphological process with varying influences of different impacts at different spatio-temporal scales. To date, measurement of soil erosion is predominantly realisable at specific scales, thereby detecting separate processes, e.g. interrill erosion contrary to rill erosion. It is difficult to survey soil surface changes at larger areal coverage such as field scale with high spatial resolution. Either net changes at the system outlet or remaining traces after the erosional event are usually measured. Thus, either quasi-point measurements are extrapolated to the corresponding area without knowing the actual sediment source as well as sediment storage behaviour on the plot or erosion rates are estimated disrupting the area of investigation during the data acquisition impeding multi-temporal assessment. Furthermore, established methods of soil erosion detection and quantification are typically only reliable for large event magnitudes, very labour and time intense, or inflexible. To better observe soil erosion processes at field scale and under natural conditions, the development of a method is necessary, which identifies and quantifies sediment sources and sinks at the hillslope with high spatial resolution and captures single precipitation events as well as allows for longer observation periods. Therefore, an approach is introduced, which measures soil surface changes for multi-spatio-temporal scales without disturbing the area of interest. Recent advances regarding techniques to capture high resolution topography (HiRT) data led to several promising tools for soil erosion measurement with corresponding advantages but also disadvantages. The necessity exists to evaluate those methods because they have been rarely utilised in soil surface studies. On the one hand, there is terrestrial laser scanning (TLS), which comprises high error reliability and retrieves 3D information directly. And on the other hand, there is unmanned aerial vehicle (UAV) technology in combination with structure from motion (SfM) algorithms resulting in UAV photogrammetry, which is very flexible in the field and depicts a beneficial perspective. Evaluation of the TLS feasibility reveals that this method implies a systematic error that is distance-related and temporal constant for the investigated device and can be corrected transferring calibration values retrieved from an estimated lookup table. However, TLS still reaches its application limits quickly due to an unfavourable (almost horizontal) scanning view at the soil surface resulting in a fast decrease of point density and increase of noise with increasing distance from the device. UAV photogrammetry allows for a better perspective (birds-eye view) onto the area of interest, but possesses more complex error behaviour, especially in regard to the systematic error of a DEM dome, which depends on the method for 3D reconstruction from 2D images (i.e. options for additional implementation of observations) and on the image network configuration (i.e. parallel-axes and control point configuration). Therefore, a procedure is developed that enables flexible usage of different cameras and software tools without the need of additional information or specific camera orientations and yet avoiding this dome error. Furthermore, the accuracy potential of UAV photogrammetry describing rough soil surfaces is assessed because so far corresponding data is missing. Both HiRT methods are used for multi-temporal measurement of soil erosion processes resulting in surface changes of low magnitudes, i.e. rill and especially interrill erosion. Thus, a reference with high accuracy and stability is a requirement. A local reference system with sub-cm and at its best 1 mm accuracy is setup and confirmed by control surveys. TLS and UAV photogrammetry data registration with these targets ensures that errors due to referencing are of minimal impact. Analysis of the multi-temporal performance of both HiRT methods affirms TLS to be suitable for the detection of erosion forms of larger magnitudes because of a level of detection (LoD) of 1.5 cm. UAV photogrammetry enables the quantification of even lower magnitude changes (LoD of 1 cm) and a reliable observation of the change of surface roughness, which is important for runoff processes, at field plots due to high spatial resolution (1 cm²). Synergetic data fusion as a subsequent post-processing step is necessary to exploit the advantages of both HiRT methods and potentially further increase the LoD. The unprecedented high level of information entails the need for automatic geomorphic feature extraction due to the large amount of novel content. Therefore, a method is developed, which allows for accurate rill extraction and rill parameter calculation with high resolution enabling new perspectives onto rill erosion that has not been possible before due to labour and area access limits. Erosion volume and cross sections are calculated for each rill revealing a dominant rill deepening. Furthermore, rill shifting in dependence of the rill orientation towards the dominant wind direction is revealed. Two field plots are installed at erosion prone positions in the Mediterranean (1,000 m²) and in the European loess belt (600 m²) to ensure the detection of surface changes, permitting the evaluation of the feasibility, potential and limits of TLS and UAV photogrammetry in soil erosion studies. Observations are made regarding sediment connectivity at the hillslope scale. Both HiRT methods enable the identification of local sediment sources and sinks, but still exhibiting some degree of uncertainty due to the comparable high LoD in regard to laminar accumulation and interrill erosion processes. At both field sites wheel tracks and erosion rills increase hydrological and sedimentological connectivity. However, at the Mediterranean field plot especially dis-connectivity is obvious. At the European loess belt case study a triggering event could be captured, which led to high erosion rates due to high soil moisture contents and yet further erosion increase due to rill amplification after rill incision. Estimated soil erosion rates range between 2.6 tha-1 and 121.5 tha-1 for single precipitation events and illustrate a large variability due to very different site specifications, although both case studies are located in fragile landscapes. However, the susceptibility to soil erosion has different primary causes, i.e. torrential precipitation at the Mediterranean site and high soil erodibility at the European loess belt site. The future capability of the HiRT methods is their potential to be applicable at yet larger scales. Hence, investigations of the importance of gullys for sediment connectivity between hillslopes and channels are possible as well as the possible explanation of different erosion rates observed at hillslope and at catchment scales because local sediment sink and sources can be quantified. In addition, HiRT data can be a great tool for calibrating, validating and enhancing soil erosion models due to the unprecedented level of detail and the flexible multi-spatio-temporal application.
30

Mecanismos de reparo de DNA envolvidos com lesões induzidas por agente alquilante (Nimustina) em células humanas e sua associação com a resistência de gliomas. / Mechanisms of DNA repair involved with lesions induced by alkylating agent (Nimustine) in human cells and its relationship with glioma chemoresistance.

Vilar, Juliana Brandstetter 24 October 2014 (has links)
A quimiorresistência de tumores constitui um dos maiores obstáculos que levam comumente ao fracasso da terapia. Os mecanismos relevantes que contribuem para a resistência celular incluem: bombas de efluxo; alterações na interação entre a droga e o seu alvo e mudanças nas respostas celulares, em particular uma habilidade aumentada de reparar os danos induzidos no DNA e defeitos nas vias apoptóticas. A capacidade de reparar os danos no DNA e a evasão da apoptose são de grande importância, uma vez que a maioria dos quimioterápicos tem sua ação baseada na indução de citotoxicidade pela capacidade de gerar lesões no DNA. Desta forma, uma importante estratégia para melhorar a quimioterapia é o desenvolvimento de abordagens mais seletivas e mecanismos que contornem a resistência tumoral. Neste trabalho, através de um estudo sobre os genes e suas respectivas vias envolvidas no reparo, capacidade de sobrevivência e sinalização de danos induzidos pela nimustina (ACNU) - um agente cloroetilante comumente utilizado em tratamentos quimioterápicos de tumores sólidos - identificamos genes potencialmente alvos para uma terapia adjuvante. Demonstramos que células de glioma p53mt tem menor capacidade de reparo de ICLs induzidos por esta droga do que células p53wt. Também, que a via de NHEJ (\'\'Non Homologous End Joining\'\') não é uma via preferencial de reparo dessas lesões, mas que a via de NER (\'\'Nucleotide Excision Repair\'\') (ou especificamente os produtos gênicos XPA, XPC e XPF) é bastante importante. Curiosamente, na ausência de XPA, NHEJ assume uma participação no reparo dessas lesões, provavelmente devido a um aumento no número de DSBs e saturação das outras vias de reparo. Da mesma forma, verificamos que a DNA polimerase POLH (XPV), envolvida em TLS (\'\'Translesion Synthesis\'\'), também participa na tolerância dessas lesões. Neste contexto, encontramos evidências de que a polimerase TLS (especificamente POLH e POLK) apresentam-se superexpressas em amostras de gliomas, podendo desta forma concorrerem tanto para a tumorigênese quanto para a resistência observada nestes tipos tumorais. Por fim, realizamos o silenciamento gênico através da teconologia de RNAi, que reprimem os genes pela eliminação do transcrito mRNA correspondente, prevenindo a síntese protéica. Os genes-alvo escolhidos para o silenciamento foram, desta forma, XPC, XPF, POLH e POLK. O silenciamento gênico de XPC, XPF e POLH demonstraram-se capazes de sensibilizar significativamente células de glioma, permitindo-nos sugerir estas proteínas como elementos importantes na quimioresistência de gliomas ao ACNU e colocando a inibição dessas moléculas como uma estratégia importante na sensibilização de gliomas ao ACNU e potencialmente a outros agentes quimioterápicos com o mesmo mecanismo de ação. / The chemoresistance of tumors is one of the most important obstacles that commonly lead to the failure of therapy. The main mechanisms that contribute to cellular resistance include efflux pumps; changes in the interaction between the drug and its target and changes in cellular responses, in particular an increased ability to repair induced DNA damages and defects in apoptotic pathways. The ability to repair DNA damage and evasion of apoptosis are of great importance, since most chemotherapy has its action based on the induction of cytotoxicity by the ability to generate DNA lesions. Thus, an important strategy for improving chemotherapy is the development of more selective mechanisms that circumvent tumor resistance approaches. In this work, through a study of genes and pathways involved in the repair, survival and damage signaling induced by nimustine (ACNU) - a cloroethylating agent commonly used in treatments of solid tumors - we aimed to identify target genes for a potentially adjuvant therapy. We demonstrated that glioma cells p53mt have less ability to repair ICLs induced by this drug then p53wt cells. Also, that the NHEJ (\'\'Non Homologous End Joining\'\') pathway is not the main route of repair of these lesions, but that the NER (\'\'Nucleotide Excision Repair\'\') pathway (or specifically the gene products XPA, XPC and XPF) is very important. Interestingly, in the absence of XPA, NHEJ takes place in the repair of those lesions, probably due to an increase in the number of DSBs and saturation of other repair pathways. Likewise, we found that DNA polimerase involved in TLS (\'\'Translesion Synthesis\'\') POLH (XPV) also participates in tolerance of such lesions. We also found evidence that TLS polimerases (specifically POLH and POLK) are overexpressed in gliomas samples and could play a role in the tumorigenesis and in the resistance observed in these tumor types. Finally, we performed gene silencing through RNAi teconology, which repress genes by eliminating the corresponding mRNA transcript, preventing protein synthesis. The target genes selected for silencing were XPC, XPF, POLH and POLK. The knockdown of XPC, XPF and POLH proved to significantly sensitize glioma cells, suggesting these proteins as important elements in the chemoresistance of gliomas and highlighting the inhibition of these molecules as an important strategy in the sensitization of gliomas to ACNU and probably to other chemotherapeutic agents with the same mechanisms of action.

Page generated in 0.0284 seconds