![]() de Saint-Georges, Ingrid ![]() in Discourse Studies (2009), 2(1), 121-122 Detailed reference viewed: 89 (1 UL)![]() ![]() Tantar, Alexandru-Adrian ![]() in Lewis, Andrew; Mostaghim, Sanaz; Randall, Marcus (Eds.) Biologically-Inspired Optimisation Methods (2009) Detailed reference viewed: 142 (0 UL)![]() Biesta, Gert ![]() in Andresen, S.; Casale, R.; Gabriel, T. (Eds.) et al Handwörterbuch Erziehungswissenschaft (2009) Detailed reference viewed: 52 (1 UL)![]() ; Avanesov, Tigran ![]() in Journal of Information Assurance and Security (2009), 4 The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will ... [more ▼] The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigation technique. [less ▲] Detailed reference viewed: 175 (2 UL)![]() ![]() Poillot, Elise ![]() in Breton, Albert; Anne Des Ormeaux; Pistor, Katharina (Eds.) et al Multijuralism: Manifestations, Causes, and Consequences (2009) Detailed reference viewed: 139 (9 UL)![]() Rotink, G. ![]() in Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009) Detailed reference viewed: 67 (4 UL)![]() Glesener, Jeanne ![]() in Amodeo, Immacolata; Erdmann, Eva (Eds.) Crime & Nation: Political and Cultural Mappings of Criminality in Traditional and New Media (2009) Detailed reference viewed: 104 (3 UL)![]() Marichal, Jean-Luc ![]() in González, Manuel; Mayor, Gaspar; Suner, Jaume (Eds.) et al Proc. 5th Int. Summer School on Aggregation Operators and their Applications (AGOP 2009) (2009) We investigate the $n$-variable real functions $\G$ that are solutions of the functional equation $\F(\bfx)=\F(\G(\bfx),\ldots,\G(\bfx))$, where $\F$ is a given function of $n$ real variables. We provide ... [more ▼] We investigate the $n$-variable real functions $\G$ that are solutions of the functional equation $\F(\bfx)=\F(\G(\bfx),\ldots,\G(\bfx))$, where $\F$ is a given function of $n$ real variables. We provide necessary and sufficient conditions on $\F$ for the existence and uniqueness of solutions. When $\F$ is nondecreasing in each variable, we show in a constructive way that if a solution exists then a nondecreasing and idempotent solution always exists. Such solutions, called Chisini means, are then thoroughly investigated. [less ▲] Detailed reference viewed: 88 (6 UL)![]() ; Schlenker, Jean-Marc ![]() in Journal of Differential Geometry (2009), 83(1), 75-129 We consider 3-dimensional hyperbolic cone-manifolds, singular along infinite lines, which are ``convex co-compact'' in a natural sense. We prove an infinitesimal rigidity statement when the angle around ... [more ▼] We consider 3-dimensional hyperbolic cone-manifolds, singular along infinite lines, which are ``convex co-compact'' in a natural sense. We prove an infinitesimal rigidity statement when the angle around the singular lines is less than $\pi$: any first-order deformation changes either one of those angles or the conformal structure at infinity, with marked points corresponding to the endpoints of the singular lines. Moreover, any small variation of the conformal structure at infinity and of the singular angles can be achieved by a unique small deformation of the cone-manifold structure. [less ▲] Detailed reference viewed: 125 (9 UL)![]() Coron, Jean-Sébastien ![]() ![]() in Proceedings of CHES 2009 (2009) Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90’s, Boneh, DeMillo and Lipton introduced fault-based attacks on CRt-RSA. These attacks factor ... [more ▼] Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90’s, Boneh, DeMillo and Lipton introduced fault-based attacks on CRt-RSA. These attacks factor the signer’s modulus when the message padding function is deterministic. However, the attack does not apply when the message is partially unknown, for example when messages contain some randomness which is recovered only when verifying a correct signature. In this paper we successfully extends rsa fault attacks to a large class of partially known message configurations. The new attacks rely on Coppersmith’s algorithm for finding small roots of multivariate polynomial equations. We illustrate the approach by successfully attacking several randomized versions of the ISO/IEC 9796-2 encoding standard. Practical experiments show that a 2048-bit modulus can be factored in less than a minute given one faulty signature containing 160 random bits and an unknown 160-bit message digest. [less ▲] Detailed reference viewed: 199 (1 UL)![]() ; Jonard, Nicolas ![]() in Academy of Management Review (2009), 34 Detailed reference viewed: 167 (4 UL)![]() Ostaszewski, Marek ![]() ![]() in GECCO '09: Proceedings of the 11th Annual conference on Genetic and evolutionary computation (2009) The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The ... [more ▼] The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The multiobjective version of Gene Expression Programming (GEP) called moGEP is proposed and applied to find proper classifiers in the multiobjective search space. The purpose of the classifiers is to discriminate information about the network traffic obtained from Idiotypic Network-based Intrusion Detection System (INIDS), transformed into time series. The proposed approach is validated using the network traffic simulator ns2. Classifiers of high accuracy are obtained and their diversity offers interesting possibilities to the domain of network security. [less ▲] Detailed reference viewed: 137 (3 UL)![]() Honig, Michael-Sebastian ![]() in Andresen, Sabine; Casale, Rita; Gabriel, Thomas (Eds.) et al Handwörterbuch Erziehungswissenschaft (2009) Detailed reference viewed: 88 (0 UL)![]() Limbach-Reich, Arthur ![]() in Willems, Helmut; Roting, Georges; Ferring, Dieter (Eds.) et al Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009) Detailed reference viewed: 95 (15 UL)![]() ; Schmit, C. ![]() in Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009) Detailed reference viewed: 112 (2 UL)![]() Ferring, Dieter ![]() ![]() ![]() in European Journal of Ageing (2009), 6 Emotions toward a relationship partner provide relevant and specific information about relationship quality. Based on this assumption the present study was performed to identify different types of ... [more ▼] Emotions toward a relationship partner provide relevant and specific information about relationship quality. Based on this assumption the present study was performed to identify different types of emotional relationship quality of middle-aged adult children with their aging parents. This was done by cluster analytic procedures in a sample of 1,208 middle-aged adult children (482 men, 726 women). Using ratings of positive and negative emotions toward their mother and their father as grouping variables, the same four-cluster solution emerged for both the child-mother relationship and the child-father relationship. Clusters were labelled as amicable, disharmonious, detached, and ambivalent relationships. Results showed that especially amicable relationships clearly prevailed followed by ambivalent, detached, and disharmonious relationships. Clusters differed significantly with respect to gender of adult child, willingness to support, expected parental support, and overt conflicts. In a cross-classification of cluster membership regarding the child-mother relationship (4 clusters) and the child-father relationship (4 clusters), all possible 16 combinations were observed, with a considerable degree of divergence regarding the type of relationship quality within the same family. Results are discussed with respect to types of emotional relationship quality, within family differences, and the intrafamilial regulation of relationship quality. [less ▲] Detailed reference viewed: 203 (13 UL)![]() Caire, Patrice ![]() ![]() in Proceedings of the Eighth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS (2009) We show how to use TROPOS as a design methodology for convivial multi-agent systems. We introduce temporal dependence networks to measure the evolution of conviviality over time, and we compare them to ... [more ▼] We show how to use TROPOS as a design methodology for convivial multi-agent systems. We introduce temporal dependence networks to measure the evolution of conviviality over time, and we compare them to dynamic dependence networks introduced for conviviality masks and internal dynamics. [less ▲] Detailed reference viewed: 109 (3 UL)![]() ![]() Tröhler, Daniel ![]() in Tröhler, Daniel; Ritzmann, Iris (Eds.) Johann Heinrich Pestalozzi. Über Gesetzgebung und Kindermord (2009) Detailed reference viewed: 92 (1 UL)![]() ![]() Bueb, Jean-Luc ![]() in Landry, Yves; Gies, Jean-Pierre (Eds.) Pharmacologie. Des cibles vers l’indication thérapeutique (2009) Detailed reference viewed: 80 (4 UL)![]() Velasco Pufleau, Monica ![]() Article for general public (2009) Detailed reference viewed: 70 (2 UL) |
||