Results 1 - 10
of
39
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
"... ar ..."
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
reconstruction by humans of the sources and purpose of their action, always constrained but never pre-scripted. So, production can be oriented towards glorifying God (and punishing the in dels), as well as religious belief can be twisted to the service of capital accumulation. What actually happens, when
Has the ice man arrived? Tact on the Internet
"... Several years ago at Bellcore, researchers thought it would be great to access newsgroup contributions by people they admired. They wrote a program to archive and search newsgroups. They tested it by entering the names of a few colleagues. "We soon found," one recounted, "that we wer ..."
Abstract
- Add to MetaCart
available; also, we read what people say and how others respond, receive indications of what people have done or are doing, and so on. The Internet's greatness resides in this extremely efficient spread of information. It is efficient, but it is not discrete, not tactful. Even when communicating
Crossing a digital divide: AACR2 and unaddressed problems of networked resources. Retrieved November 20, 2004, from http://www.loc.gov/catdir/bibcontrol/beacom_paper.html
- Data & Knowledge Engineering
, 2000
"... INTRODUCTION The advent of the World Wide Web marks profound changes in how we use sources of information such as databases, indexes, and archives and how we use representations of knowledge such as maps, pictures, sounds, books, and journal articles. We are using the Web to change how we communica ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
was based on our experiences with traditional-tangible--media. On the other side-the one we are crossing to-we have the new media, the Web, the Internet. The new media are intangible, untouchable. We still have such familiar kinds of content as texts, images, and sounds, but with a difference. Our
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law
guidance of Prof. Raj Jain)
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract
- Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. Also, Kerberos has continued to evolve as new functionalities are added to the basic protocol and one of well-known these protocols is PKINIT. First, I review and analyze the structure of Kerberos recently proposed and the cross-realm authentication model of Kerberos. Also, I discuss PKINT, an extension version of Kerberos, which modifies the basic protocol to allow public-key authentication. Although Kerberos has been proven its strengths so far, it also has a number of limitations and some flaws. I dedicate my efforts to an analysis of PKINIT and mainly focus on a number of vulnerability, flaws and attacks lately discovered on Kerberos as well as PKINIT in this paper. Lastly, I introduce several possible solutions to
Results 1 - 10
of
39