Security Protocols
Mostrando 1-12 de 35 artigos, teses e dissertações.
-
1. Longer crop cycle lengths could offset the negative effects of climate change on Brazilian maize
ABSTRACT Maize (Zea mays) is considered one of the most important crops for world food security. Globally, Brazil is the second largest maize producer and the fourth largest maize consumer. The climate variables is one of the main determining factors for crop yield. Given the possibility of future climate changes, our objective was to evaluate the impact of
Bragantia. Publicado em: 13/12/2019
-
2. Current applications and different approaches for microbial L-asparaginase production
ABSTRACT L-asparaginase (EC 3.5.1.1) is an enzyme that catalysis mainly the asparagine hydrolysis in L-aspartic acid and ammonium. This enzyme is presented in different organisms, such as microorganisms, vegetal, and some animals, including certain rodent's serum, but not unveiled in humans. It can be used as important chemotherapeutic agent for the treatmen
Braz. J. Microbiol.. Publicado em: 2016-12
-
3. 4iPay : modelo para sistemas de pagamento móvel em comércio ubíquo
This work aims at presenting a usability and architectural model for a mobile payment system. In our model, we assume independence of devices, of location, of mobile operator, and of administrator, to allow all kinds of payment in ubiquitous environments (Ubiquitous Commerce). In this work, we begin describing motivation, goals, and fundamental concepts, in
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 27/02/2012
-
4. Proposta de protocolos de segurança para a prevenção, a contenção e a neutralização de agente agressor bioativo em incidentes bioterroristas e estudo por docking molecular do fator letal do Bacillus anthracis (Antraz)
Há séculos agentes infecciosos são utilizados como armas em conflitos bélicos. Em 1972 a Convenção sobre Armas Biológicas proibiu a criação e armazenamento de armas biológicas. No entanto alguns países continuaram a pesquisa e o desenvolvimento dessas armas. Prova desse fato foi o acidente em 1979 em uma fábrica militar na URSS, onde foram disper
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 29/10/2010
-
5. Implementação e análise de desempenho dos protocolos de criptografia neural e Diffie-Hellman em sistemas RFID utilizando uma plataforma embarcada
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID sy
Publicado em: 2009
-
6. Uma ferramenta de manipulação de pacotes para análise de protocolos de redes industriais baseados em TCP/IP
This work presents a packet manipulation tool developed to realize tests in industrial devices that implements TCP/IP-based communication protocols. The tool was developed in Python programming language, as a Scapy extension. This tool, named IndPM- Industrial Packet Manipulator, can realize vulnerability tests in devices of industrial networks, industrial p
Publicado em: 2009
-
7. Formal verification of fair exchange protocols using the strand spaces method / Verificação formal de protocolos de trocas justas utilizando o metodo de espaços de fitas
Fair exchange protocols were first proposed as a solution to the problem of exchanging digital items, between two or more entities, without forcing them to trust each other. The popularization of the internet resulted in an increasing amount of lay users, which constantly participate in exchange transactions, such as electronic commerce (ecommerce), internet
Publicado em: 2009
-
8. Model-based attack injection for security protocols testing / Injeção de ataques baseado em modelo para teste de protocolos de segurança
Neste trabalho apresentamos uma proposta de geração de ataques para testes de protocolos de segurança. O objetivo é detectar vulnerabilidades de um protocolo, que um atacante pode explorar para causar falhas de segurança. Nossa proposta usa um injetor de falhas para emular um atacante que possui total controle do sistema de comunicação. Como o sucesso
Publicado em: 2009
-
9. Verificação formal de protocolos criptográficos : o caso dos protocolos em cascata
Ensuring the security of cryptographic protocols is not a simple task. The Dolev-Yao model, proposed in the early 80s, is an important mathematical modeling method of cryptographic protocols, enabling the analysis and verification of the safety of these protocols. But the analytical verification does not guarantee that implementations are not error-prone. In
Publicado em: 2008
-
10. Análise do desempenho de WLAN com a implementação dos protocolos de segurança WEP e WPA/TKIP / Performance analysis of WLAN with the implementation of WEP and WPA/TKIP security protocols
Nowadays, the use of the wireless network technology has grown mainly motivated by the price of equipments, ease of installation, network maintenance and expansion of technical safety. The more you use the wireless network resource, the better should be the treatment related to its safety aspect. As the security level increases, the amount of information tra
Publicado em: 2008
-
11. Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas. / Quantum cryptography in critical information networks - application to aeronautical telecommunications.
The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as qua
Publicado em: 2008
-
12. The care of the nursing team in surgical positioning patient during the intraoperative period / A assistência da equipe de enfermagem no posicionamento cirúrgico do paciente durante o período intra-operatório
Surgical positioning is the movement of the human body on the surgical table in such a way as to provide the best angle of vision to the surgeon, while at the same time guaranteeing the comfort and security of the patient with respect to his anatomical and physiological limits. The relevance of this study is based on the fact that there are few nursing profe
Publicado em: 2008