Cryptographic Applications

Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.

2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
Marissa Silverman

This chapter asks an important, yet seemingly illusive, question: In what ways does the internet provide (or not) activist—or, for present purposes “artivist”—opportunities and engagements for musicing, music sharing, and music teaching and learning? According to Asante (2008), an “artivist (artist + activist) uses her artistic talents to fight and struggle against injustice and oppression—by any medium necessary. The artivist merges commitment to freedom and justice with the pen, the lens, the brush, the voice, the body, and the imagination. The artivist knows that to make an observation is to have an obligation” (p. 6). Given this view, can (and should) social media be a means to achieve artivism through online musicing and music sharing, and, therefore, music teaching and learning? Taking a feminist perspective, this chapter interrogates the nature of cyber musical artivism as a potential means to a necessary end: positive transformation. In what ways can social media be a conduit (or hindrance) for cyber musical artivism? What might musicing and music sharing gain (or lose) from engaging with online artivist practices? In addition to a philosophical investigation, this chapter will examine select case studies of online artivist music making and music sharing communities with the above concerns in mind, specifically as they relate to music education.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2019 ◽  
Vol 35 (1) ◽  
pp. 19-21

Purpose This paper reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings If you search images of the word “strategy” on the internet, three of the first seven images to appear on Google (other search engines are available) include chess pieces, while two of the top ten hits involve light bulbs. Aside from the obvious conclusions that any strategic discussion should either involve chess grand masters or well-lit rooms, it is clear that most people assume winning games with lots of moves are possible is the key to a successful strategy. But is this a valid analogy, even at a high level? Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2021 ◽  
Vol 3 ◽  
pp. 50-52
Author(s):  
Natalia Aleksandrovna Tarasova ◽  

The article deals with the new project — the Internet portal Dostoevsky and the World, launched by the Pushkin House for the 200th anniversary of the writer’s birth. The work offers the basic information on the project. The Internet resource that would host the most representative examples of the reception of Dostoevsky’s personality and work in various epochs and in various countries is a great way to familiarize the modern reader with the wide scope of interest in Dostoevsky in the past and present. The project focuses on the non-academic reception, philosophical and aesthetic interpretations, the attitudes of public fi gures, writers, stage and movie directors, publicists, etc. The collection of case studies of Dostoevsky’s reception by today’s cultural fi gures, as well as the publication of the previously unknown writer-related sources of the past years, are of particular importance.


2017 ◽  
Vol 25 (2) ◽  
pp. 13
Author(s):  
Jo Ann Carr

This article reviews the development of three Web-based education resources and the potential for each of these resources to meet the needs of users for a 'killer app'. Three case studies (the Annotated List of Education Journals, the IDEAS Portal Web Site and the Eisenhower National Clearinghouse Web Site)review the purpose, audience, content, funding, publicity and structure of the sites. Differences in staffing, funding and the centrality of these sites to the mission of their sponsoring institutions impacted the growth of these sites. Technological changes and the diffuse nature of the Internet also impacted the development of these resources.


Author(s):  
Jung S. Oh ◽  
Dean Q. Lewis ◽  
Daeyong Lee ◽  
Gary A. Gabriele

Abstract Many different types of snap-fits have been developed to replace conventional fasteners, and research efforts have been made to characterize their performance. It is often tedious to look for design equations for unique types of snap-fits to calculate the insertion and retention forces. If found, these equations tend to be long, complex, and difficult to use. For this reason, a snap-fit calculator has been created to help in designing integral attachment features. Studies of seven most commonly used snap-fits (annular snap, bayonet-and-finger, cantilever hook, cantilever-hole, compressive hook, L-shaped hook, and U-shaped, hook) were used to provide the equations implemented in this snap-fit calculator, more fasteners than any other snap-fit calculator available. This tool aids in designing snap-fits to meet specific loading requirements by allowing the designer to size the feature to obtain desired estimates for maximum insertion and retention forces. The software for this design tool was written in JAVA™ language that is independent of operating system platforms and can be distributed at a company site-wide over an intranet or worldwide over the Internet. This makes it easily accessible to a user, and universal upgrades can be achieved by simply updating the software at the server location. Designers will find this tool to be useful in the design process and the most convenient way to estimate the performance of snap-fits. This paper describes the development and operation of the IFP snap-fit calculator including several case studies comparing the calculated results to experimental data.


Author(s):  
Satish C. Sharma ◽  
Harshila Bagoria

Cloud computing is a new breed of service offered over the Internet, which has completely changed the way one can use the power of computers irrespective of geographic location. It has brought in new avenues for organizations and businesses to offer services using hardware or software or platform of third party sources, thus saving on cost and maintenance. It can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impact. Cloud computing has become a major topic of discussion and debate for any business or organization which relies on technology. Anyone connected to the Internet is probably using some type of cloud computing on a regular basis. Whether they are using Google’s Gmail, organizing photos on Flickr, or searching the Web with Bing, they are engaged in cloud computing. In this chapter, an attempt has been made to give an overview of this technology, its connection with libraries, the models in which libraries can deploy this technology for providing services and augment the productivity of library staff and case studies.


Author(s):  
Philippa Collin

Young people are using information communication technologies (ICT) for new forms of political participation. At the same time, government and non-government organisations are looking to the internet to implement policies designed to engage young people in democracy. This raises the question of what forms of e-citizenship are being imposed on young people and are these same forms being pursued by young people themselves? Coleman (2008) has suggested that programs tend to promote autonomous or managed forms and argues for a ‘productive convergence’ that can facilitate democratic e-citizenship. Using original research, this article presents two case studies of such a ‘productive convergence’ and argues that what is particularly powerful in such e-citizenship programs is that they facilitate young people’s connection to existing networks as well as the building of new communities for action. This article presents a critical analysis of how organisations and young people in Australia and the United Kingdom view and use the internet for participation and considers the extent to which there is increased democratising potential in these e-citizenship programs.


2012 ◽  
pp. 242-258 ◽  
Author(s):  
Mary Gozza-Cohen ◽  
Deborah May

This entry examines the use of the internet by individuals with disabilities. Before people with disabilities can use the Internet for socializing, communicating, gathering information, learning, or working, they must first be able to access the Internet. This may require additional assistance by either people or modified hardware and software. Some authors have expressed concern that there is a digital divide, with many people with disabilities not accessing the Internet. The differing needs of people with disabilities, and how their needs may be met with technology and adaptations are explored. Examples of various uses of the Internet by people with disabilities are presented. This field does not have a large research base; it is difficult to do controlled large group studies with such diverse populations, so much of the information comes from position papers, demographic reports, case studies, or exploratory research.


Sign in / Sign up

Export Citation Format

Share Document