• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 431
  • 49
  • 43
  • 27
  • 23
  • 19
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 773
  • 236
  • 168
  • 159
  • 154
  • 141
  • 131
  • 89
  • 82
  • 82
  • 81
  • 78
  • 76
  • 74
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks

Cheng, Yen-hung 12 August 2009 (has links)
In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all heterogeneous networks and becomes mature and popular nowadays. Using mobile devices for voice transferring and multimedia sharing is also a part of our life. Mobile networks provide us an efficient way to exchange messages easily. However, these messages often contain critical personal data or private information. Transferring these messages freely in mobile network is dangerous since they can be eavesdropped easily by malicious mobile users for some illegal purposes, such as committing a crime. Hence, to avoid the exposure of the transmitted messages, robust security mechanisms are required. In this thesis, we will propose a one-round mutual authentication protocol which is computation and communication efficient and secure such that the privacy of mobile users¡¦ identities and the confidentiality of their transmitted data are guaranteed. In computation complexity, the protocol only employs symmetric encryption and hash-mac functions. Due to the possession of forward secrecy, the past encrypted messages are secure, even under the exposure of long-term keys. Furthermore, our scheme achieves the goal of user privacy and location privacy by changing TMSI in every session. Therefore, the third party cannot link two different sessions by eavesdropping the communication. Finally, our scheme also can prevent false base attacks which make use of a powerful base station to redirect mobile users¡¦ messages to a fake base station to obtain certain advantages.
252

Intrusion Detection and Prevention in IP Based Mobile Networks

Tevemark, Jonas January 2008 (has links)
<p>Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks against PRAN broadens. This thesis provides information on what protection an Intrusion Prevention System (IPS) can add to the current PRAN solution.</p><p>A risk analysis is performed to identify assets in and threats against PRAN, and to discover attacks that can be mitigated by the use of an IPS. Information regarding placement of an IPS in the PRAN network is given and tests of a candidate system are performed. IPS features in hardware currently used by Ericsson as well as missing features are pinpointed . Finally, requirements for an IPS intended for use in PRAN are concluded.</p>
253

Restoring the phoenix pastoral care and preaching --post 9/11 as a concept for ministry /

Schiesswohl, Scott J. January 2006 (has links)
Project (D. Min.)--Iliff School of Theology, 2006. / Includes abstract. Includes bibliographical references (leaves 121-123; 126-146).
254

Posttraumatic stress disorder symptoms and the substance use following September 11th /

Nevins, Heather Marie. January 2003 (has links) (PDF)
Thesis (M.A.)--University of North Carolina at Wilmington, 2003.
255

Decision making in U.S. foreign policy applying Kingdon's multiple streams model to the 2003 Iraq crisis /

Saikaly, Ramona. January 2009 (has links)
Thesis (Ph.D.)--Kent State University, 2009. / Title from PDF t.p. (viewed Nov. 24, 2009). Advisor: Steven W. Hook. Keywords: proactive foreign policy, the multiple streams model, preexisting solutions. Includes bibliographical references (p. 218-238).
256

Who were the fifteen Saudis? /

Piechot, Martin F. January 2003 (has links) (PDF)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Maria J. Rasmussen, James A. Russell. Includes bibliographical references (p. 61-62). Also available online.
257

Walls and fences : the making of good neighbors?!

El Nakhala, Doaa' Hamdi 27 June 2014 (has links)
While the Europeans were discussing integration, other nations experienced long conflicts over borders. In some of the latter contexts, the significance of borders was underscored by escalated border policing through the erection of barriers. Although barrier construction is not a new phenomenon, an increasing number of nation-states are launching barrier projects along their borders. While in all cases the concerned nation-states claimed these barriers were provided security, scant attention was given to the actual security outcomes of these constructions. This research provides answers to the questions: what accounts for the different security outcomes of border barriers? How can barriers differ? And why? How does variation in barriers affect the nature and number of non-state actors' attacks? When do violent groups have tactical shifts and tactical innovations in the context of a barrier? This work moves beyond the conventional perspective on barriers that see them as successful defensive security measures. Instead, it develops the Fortification-Cooperation model that explains why the level of cross-border militant attacks change, when violent groups shift their tactics and when they innovate. I argue that security cooperation on both sides the border limits violent activities locally, which in turn restricts their access to militant resources. Presence of these resources is central for launching more attacks and for introducing tactical innovations. In turn, barriers impose restrictions to movement and increase the cost of certain attack. In this context, motivated violent groups substitute their commonly employed attack tactics for other types of attacks that can be sustained despite the presence of the barrier. Using a newly constructed qualitative and quantitative datasets on Palestinian attacks against Israel and barrier construction between 1990 and 2010, this study finds that the empirical record does not provide support the existing common explanations about the outcomes of barriers and that the interaction of cross-border cooperation and fortification is a key determinant of the number and nature of cross-border militant attacks. This work has significant implications for many states that built, are building, or are considering the construction of barriers on their borders since according to this research, a barrier without cross-border security cooperation would not be efficient at diminishing or decreasing cross-border violence. Additionally, violent groups' access to military resources is an important factor that should be taken into consideration when a barrier is built. Again, cross-border cooperation plays an essential role in restricting these resources, which would lead to less violence. In fact, in some cases, cooperation alone may result in similar outcomes to the combination of fortification and cooperation, which raises questions about the utility of barriers to begin with. / text
258

Racial profiling in the Black and mainstream media : before and after September 11

Moody-Hall, Mia Nodeen 28 April 2015 (has links)
This study examined how mainstream and black press newspapers framed the phenomena of "racial profiling" three years before and three years after the September 11 terrorist attacks. It looked particularly at frames, ethnic groups, source selection and article emphasis. Results indicate that even in the face of a tragedy, black press reporters did not waiver in their position and continued to cover issues from a "black perspective." On the other hand, mainstream newspapers altered their coverage during the high-stress period and began to portray racial profiling as an anti-Arab/terrorist tactic that is acceptable in some cases. This study helps answer the question of whether black press newspapers are necessary in today's society. The answer is yes. They still carry a unique viewpoint. Until the gap that divides African American and other readers ceases to exist, the black press will remain an important staple in the black community. / text
259

Music, publics, and protest: the cultivation of democratic nationalism in post-9/11 America

Foster, Lisa Renee 28 August 2008 (has links)
Not available / text
260

Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο / Protecting systems from distributed attacks on the Internet

Στεφανίδης, Κυριάκος 17 March 2014 (has links)
Η παρούσα διατριβή πραγματεύεται το θέμα των κατανεμημένων επιθέσεων άρνησης υπηρεσιών στο Διαδίκτυο. Αναλύει τα υπάρχοντα συστήματα αντιμετώπισης και τα εργαλεία που χρησιμοποιούνται για την εξαπόλυση τέτοιου είδους επιθέσεων. Μελετά τον τρόπο που οργανώνονται οι επιθέσεις και παρουσιάζει την αρχιτεκτονική και την υλοποίηση ενός πρωτότυπου συστήματος ανίχνευσης των πηγών μιας κατανεμημένης επίθεσης άρνησης υπηρεσιών, καθώς και αντιμετώπισης των επιθέσεων αυτών. Τέλος, ασχολείται με το θέμα της ανεπιθύμητης αλληλογραφίας ως μιας διαφορετικού είδους επίθεση άρνησης υπηρεσιών και προτείνει ένα πρωτότυπο τρόπο αντιμετώπισής της. / In our thesis we deal with the issue of Distributed Denial of Service attacks on the Internet. We analyze the current defense methodologies and the tools that are used to unleash this type of attacks. We study the way that those attacks are constructed and organized and present a novel architecture, and its implementation details, of a system that is able to trace back to the true sources of such an attack as well as effectively filter such attacks in real time. Lastly we deal with the issue of spam e-mail as a different form of a distributed denial of service attack and propose a novel methodology that deals with the problem.

Page generated in 0.0361 seconds