Advances in Information and Computer Security
Secure frameproof code is the name given to a separating code when studied in relation to fingerprinting schemes. Separating codes are combinatorial objects that have found to be useful in many areas such as technical diagnosis and the protection of distribution rights. A relaxed definition of the properties of separation and frameproofness, in the sense of only requiring the properties to hold with high probability, shows that for the relaxed definitions these notions are different. In this paper we address the construction of almost secure frameproof codes based on small-bias probability spaces.
The author represented Stalinism as a model of social constructivism, analyzed basic features of this type of dictatorship. New trends in Russian and international historiography of the problem are under consideration.
The Informational paradigm of discourse to the XXIst century is replaced by communicative; due to the spread of the Internet, new features and models of communication based on the subject-to-subject concept of hypertext are formed. Tekstogennost’ as a set of anthropogenically-technical factors of generation, transmission, exchange texts of public communication, leading to the formation and operation of new types of vehicles and generators of information in all spheres of life, which have an impact on them, becomes the essential characteristic of socio-economic discourse. The role of the professional communication support (PR, mass media) of all processes becomes more essential. Thus, the textual, philological, humanitarian dimension determines the effectiveness of social development.
Projects and reforms targeting infrastructure services can affect consumer welfare through changes in the price, coverage, or quality of the services provided. The benefits of improved service quality—while significant—are often overlooked because they are difficult to quantify. This article reviews methods of evaluating the welfare implications of changes in the quality of infrastructure services within the broader theoretical perspective of welfare measurement. The study outlines the theoretical assumptions and data requirements involved, illustrating each method with examples that highlight common methodological features and differences. The article also presents the theoretical underpinnings and potential applications of a new approach to analysing the effects of interruptions in the supply of infrastructure services on household welfare.
Proceedings of the 2013 IEEE 14th International Conference on Information Reuse and Integration (IEEE IRI 2013) , 14-16 August 2013, San Francisco, Ca, USA.
We are witnessing now a coming closer together of two pedagogical movements – that of media education (media literacy) and that of information literacy, both of them having previously existed parallel to each other, and without actually crossing each other’s path.
It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, sending, and composing messages, he can remember as much information as he needs. That is, his memory is unbounded.
We recently proposed a weaker Dolev-Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev-Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where there is only a bounded number of concurrent sessions and the honest participants of the protocol cannot remember an unbounded number of facts nor an unbounded number of nonces at a time. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev-Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively (Theorem 2).
The second contribution of this paper is the formalization of Progressing Collaborative Systems that may create fresh values, such as nonces. In this setting there is no unbounded adversary, although bounded memory adversaries may be present. We prove the NP-completeness of the reachability problem for Progressing Collaborative Systems that may create fresh values.
The matters of information presentation subject to specific problems of information innovation support of research and development (R&D ) results are discussed.