• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Don Quijote lo Interminable: La Cuestión de los Textos Originales y las Emanaciones a Través de Formas Secundarias de Arte

Poyhonen, Alexander J 01 January 2012 (has links)
In chapter 1, I ponder the role of authorship and whether or not an original text can truly exist. Specifically, the claim that Borges has that a copy can be superior to an original. From this, brings me to chapter 2 with the movie Man of la Mancha. In this movie, I highlight some of the pros and cons of a copy. The windmill scene is a negative emanation of the Quixote, while the interaction between people and the presence of women is something the movie truly displays well. In the third chapter, I look at Lost in la Mancha because it demonstrates a failed attempt to translate the Quixote. In essence, anything that tries to represent this truly great text will fail; however, it's failure can paradoxically be thought of as a success because it's an homage to the Quixote. As far as the Ezra Pound material, I thought it extremely pertinent to look at his experience on a metro because he attempts to describe a vision that he had through poetry. He notes that it is very difficult to encapsulate his entire experience because the primary form of art (his vision) is being described through a secondary form (words). Thus, when you translate a form of art through a medium it loses some of its value. This is what happens with the Quixote; its primary form (words) is being displayed through a secondary form (film), and it inevitably loses something in the translation. The final chapter/conclusion is a more in-depth investigation of this investigation primary form of art (writing). This uses the character of Gines as a concrete example of a formal and stylistic quality that is unique to literature. Namely, the physical ranging of words on a page in both a spatial and literary sense. When you extract those lines from a novel you implicitly remove some of the dialectic between Cervantes' work and the genres he's invoking, just by taking it out of the form of literature. The surroundings of text establish the meaning of the novel. The conclusion is my final chance to argue why the Quixote is so special and untranslatable. I touch on the qualities that keep it forever live and present in us today. Through the Quixote's proclivity for renaming the real world (established societal beliefs/values, etc.) in his own vein, Cervantes allows for the Quixote to reappropriate the world around him, making it uniquely his. In so doing, Cervantes creates a character who is able, not only to write his own self-history, but to control the way that said self-history will be written by others. By blurring the lines between narrator and narration and history and fiction, Cervantes creates a work that is endlessly present, where words becoming living page, and actions occur as they are said.
2

Evaluating Compromising Emanations in Touchscreens / Utvärdering av röjande signaler från touchskärmar

Lidstedt, Joakim January 2019 (has links)
In a short time touchscreens has become one of the most used methods for input to smartphones and other machines such as cash registers, card terminals and ATMs. While the technology change was quick it introduces the possibility of new security holes. Compromising emanations is a possible security hole in almost all electronic equipment. These emanations can be used in a side-channel attack if they leak information that compromise the security of the device. This thesis studies a single-board computer (SBC) with a touchscreen and a smartphone in order to evaluate if any usable information leaks regarding what is done on the touchscreen i.e. where on the screen a user touches. It is shown that the location of a touch can be read out from information leaking through the power cable and wirelessly from the single-board computer. It is also shown that basic information can be read out wirelessly from the smartphone but further testing is required to evaluate the possibility to extract usable information from the device.
3

Keyboard Acoustic Emanations Attack : An Empirical study

Ponnam, Sravanthi January 2013 (has links)
The sounds produced from the keystrokes when a user types on the keyboard are called keyboard acoustic emanations. These sounds can be recorded with a microphone and stored as a file on the computer. Different techniques can be used to retrieve each keystroke. In this way sensitive information, such as passwords used to unlock the system or enter various protected cyber spaces can be collected and misused. This study investigates the seriousness of the keyboard acoustic emanations attack and possible threats from this type of eavesdropping. The aim of the research is to show this type of attack can be performed using simple equipment and easy to use signal processing techniques and to suggest protective measures against the threat from the attack. We use empirical methodology and perform experiments under different scenarios. Unlike the previous research, the experiments are performed in a moderately noisy environment. Our attack includes two phases, training and recognition phase. The structure of the attack is created considering views of previous research and having in mind the aim of the study. Six scenarios are created based on how the characteristics of the waveforms are presented and what types of techniques are used at the recognition phase. A separate procedure for identifying which scenario produces the highest recognition rate is designed. The results show that the waveform of the acoustic signal in presence of noise has similar shape as in silent environment and that an attacker can easily perform our experiment with keyboard acoustic emanations attack. We achieved 60% recognition rate that can be considered as satisfactory. The experiment is compared with similar ones from the previous research. Easy computation, analysis and simplicity are the advantages of our approach. At the end of the thesis we suggest preventive measures for mitigating the attack.
4

Essai sur l’être en droit privé / Essay about beings in private law

Anciaux, Nicolas 04 December 2018 (has links)
Sous la bannière de « l’être », le discours du Droit et son interprétation rallient hommes, embryons, robots, animaux, personnes morales et entreprises : il réunit ceux qui agissent tant dans le réel que dans la sphère juridique. En mobilisant concepts et techniques de qualification, le Droit leur réserve un destin différent. Un système cohérent s’élevant de l’être émerge. L’étude de la personnalité juridique, concept analytique et fondamental, permet d’observer le destin des êtres dans le monde juridique. Elle est une abstraction tantôt d’ordre égalitariste, lorsque des hommes en bénéficient, tantôt d’ordre finaliste, lorsque des groupements en jouissent. Tous les êtres du discours du Droit ne relèvent pas de la qualification de personne. Mais parce que l’existence est, pour les hommes, une expérience corporelle, le corps humain mérite exploration : son étude complète le système de l’être. Entre personne et chose, la qualification de l’enveloppe charnelle commande de distinguer le statut du corps vivant en « entier » de celui de ses émanations. Le pouvoir de la personne sur son corps est distinct de celui qu’elle exerce sur ses émanations. / Under the banner of « beings », men, embryos, robots, animals, legal persons and firms are named as such by the law and those who interpretate it. This word unites those who act both in the reality and within the legal « world ». Through its concepts and qualification technics, private law grants them a separate fate. A coherent system arises. The study of legal personnality, regarded both as an analytical and basic concept, reveals the fate of theses beings in private law. When granted to men, legal personnality is an egalitarian abstraction ; when granted to organizations it is a specialized abstraction. All « beings » in private law do not rise to the status of « person ». But human existence is a bodily experience. Only the study of the legal status of human body will complement the system. The status on the humain body differs whether the whole body or its elements are considered : it varies between property and person.
5

Sidokanalattack mot knappsats för elektroniskt passersystem / Side-channel attack against electronic entry system keypad

Alasjö, Alexander January 2017 (has links)
Genom ett undersökande experiment med elektromagnetisk sidokanalattack mot en knappsats för ett kommersiellt passersystem påvisas att informationsläckage i sidokanaler är ett fortsatt aktuellt problem och hur det gör fysisk åtkomstkontroll sårbart genom avlyssning och kopiering av användaruppgifter. Med enkel radioutrustning kan knapptryckningar registreras och avkodas genom oönskad elektromagnetisk strålning och teoretiskt är det möjligt att genomföra avlyssningen på en längre distans med särskilt utformad antenn och anpassad mottagare. Rapporten diskuterar problematiken med emission security hos konsumentprodukter som i militära sammanhang benämns Tempest eller RÖS (röjande signaler) och kräver kostsamma tester för att detekteras och hanteras. I regelverk för EMC (elektromagnetisk kompatibilitet) behandlas elektriska apparaters och näts utstrålning och påverkan av elektromagnetiska vågor, men inte direkt hur information kan läcka från informationsteknologisk utrustning vilket denna rapport vill problematisera. / Through an exploratory experiment using electromagnetic side-channel attack against a keypad for a commercial entry system it is demonstrated that information leakage through side-channels are an ongoing issue and may make entry systems vulnerable by recording of user data. Using simple radio equipment, keypresses can be recorded and decoded by undesired electromagnetic radiation and theoretically it is possible to carry out the attack on a longer distance with a specially designed antenna and a custom recieiver. The report discusses emission security in consumer products which in military context is termed Tempest or compromising emanations (Swedish: RÖS) and requires expensive tests to be detected and handled. The EMC regulations (electromagnetic compatibility) handles radiation and influence of electromagnetic waves in electronic apparatus and nets, but not directly how information can leak from information technology equipment which this report wants to problematize.

Page generated in 0.0754 seconds