2014 IEEE JAVA/DOTNET Random Grid Based Visual Cryptography Schemes – Video


2014 IEEE JAVA/DOTNET Random Grid Based Visual Cryptography Schemes
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: http://www.globalsoftte...

By: GLOBALSOFT TECHNOLOGIES

See the original post here:
2014 IEEE JAVA/DOTNET Random Grid Based Visual Cryptography Schemes - Video

2014 IEEE NETWORK SECURITY Random Grid Based Visual Cryptography Schemes – Video


2014 IEEE NETWORK SECURITY Random Grid Based Visual Cryptography Schemes
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: http://www.globalsoftte...

By: GLOBALSOFT TECHNOLOGIES PROJECTS

More:
2014 IEEE NETWORK SECURITY Random Grid Based Visual Cryptography Schemes - Video

Controlled emission and spatial splitting of electron pairs demonstrated

5 hours ago Etched semiconducting channel with electron source (A) and barrier (B). The electron pairs are emitted by the source and split at the barrier into two separate electric conductors (arrow). Credit: PTB

In quantum optics, generating entangled and spatially separated photon pairs (e.g. for quantum cryptography) is already a reality. So far, it has, however, not been possible to demonstrate an analogous generation and spatial separation of entangled electron pairs in solids. Physicists from Leibniz University Hannover and from the Physikalisch-Technische Bundesanstalt (PTB) have now taken a decisive step in this direction. They have demonstrated for the first time the on-demand emission of electron pairs from a semiconductor quantum dot and verified their subsequent splitting into two separate conductors.

Their results have been published in the current online issue of the renowned journal Nature Nanotechnology.

A precise control and manipulation of quantum-mechanical states could pave the way for promising applications such as quantum computers and quantum cryptography. In quantum optics, such experiments have already been performed for some time. This, for example, allows the controlled generation of pairs of entangled, but spatially separated photons, which are of essential importance for quantum cryptography. An analogous generation and spatial separation of entangled electrons in solids would be of fundamental importance for future applications, but could not be demonstrated yet. The results from Hannover and Braunschweig are a decisive step in this direction.

As an electron source, the physicists from Leibniz University Hannover and from PTB used so-called semiconductor single-electron pumps. Controlled by voltage pulses, these devices emit a defined number of electrons. The single-electron pump was operated in such a way that it released exactly one electron pair per pulse into a semiconducting channel. A semitransparent electronic barrier divides the channel into two electrically distinct areas. A correlation measurement then recorded whether the electron pairs traversed the barrier, or whether they were reflected or split by the barrier. It could be shown that for suitable parameters, more than 90 % of the electron pairs were split and spatially separated by the barrier. This is an important step towards the envisioned generation and separation of entangled electron pairs in semiconductor components.

Explore further: Scientists open a new window into quantum physics with superconductivity in LEDs

More information: "Partitioning of on-demand electron pairs." Nature Nanotechnology (2014), DOI: 10.1038/nnano.2014.275

A team of University of Toronto physicists led by Alex Hayat has proposed a novel and efficient way to leverage the strange quantum physics phenomenon known as entanglement. The approach would involve combining ...

Electron states in solids are responsible for many material properties, such as color and electrical conductivity. However, because of their confinement within the crystal, it is very difficult to study the ...

(Phys.org) In a new study, physicists have teleported photonic qubits made of pairs of entangled photons that are generated by an LED containing an embedded quantum dot. The novel set-up has advantages ...

See the article here:
Controlled emission and spatial splitting of electron pairs demonstrated

Assange v Swedish Prosecution Authority – Wikipedia, the …

Julian Assange v Swedish Prosecution Authority is the set of legal proceedings in the United Kingdom concerning the requested extradition of Julian Assange to Sweden to further a 'preliminary investigation'[1] into accusations of his having committed sexual offences.

On 20 August 2010, two women, a 26-year-old living in Enkping and a 31-year-old living in Stockholm,[2][3] went together to the Swedish police in order to track him down and persuade him to be tested for sexually transmitted diseases after having separate sexual encounters with him.[4] The police told them that they could not simply tell Assange to take a test, but that their statements would be passed to the prosecutor.[5] Later that day, the duty prosecutor ordered the arrest of Julian Assange on the suspicion of rape and molestation. [6]

The next day, the case was transferred to Chefsklagare (Chief Public Prosecutor) Eva Finn. In answer to questions surrounding the incidents, the following day, Finn declared, "I don't think there is reason to suspect that he has committed rape." However, Karin Rosander from the Swedish Prosecution Authority, said Assange remained suspected of molestation. Police gave no further comment at that time, but continued the investigation.[7]

After learning of the investigation, Assange said, "The charges are without basis and their issue at this moment is deeply disturbing."[8]

The preliminary investigation concerning suspected rape was discontinued by Finn on 25 August,[6] but two days later Claes Borgstrm, the attorney representing the two women, requested a review of the prosecutor's decision to terminate part of the investigation.[6][9]

On 30 August, Assange was questioned by the Stockholm police regarding the allegations of sexual molestation.[10][11] He denied the allegations, saying he had consensual sexual encounters with the two women.[8][12][13]

On 1 September 2010, verklagare (Director of Public Prosecution) Marianne Ny decided to resume the preliminary investigation concerning all of the original allegations. On 18 August 2010, Assange had applied for a work and residence permit in Sweden.[14][15] On 18 October 2010, his request was denied.[14][15][16] He left Sweden on 27 September 2010.[17] The Swedish authorities have asserted that this is the same day that they notified Assange's lawyer of his imminent arrest.[18]

On 18 November 2010, Marianne Ny ordered the detention of Julian Assange on suspicion of rape, three cases of sexual molestation and unlawful coercion. The Stockholm District Court acceded to the order and issued a European Arrest Warrant to execute it.[6] The warrant was appealed to the Svea Court of Appeal which upheld it but lowered it to suspicion of rape of a lesser degree, unlawful coercion and two cases of sexual molestation rather than three,[19][20] and the warrant was also appealed to the Supreme Court of Sweden,[21] which decided not to hear the case. At this time Assange had been living in the United Kingdom for 12 months. An extradition hearing took place in an English court in February 2011 to consider an application by Swedish authorities for the extradition of Assange to Sweden. The outcome of the hearing was announced on 24 February 2011, when the extradition warrant was upheld. Assange appealed to the High Court, and on 2 November 2011, the court upheld the extradition decision and rejected all four grounds for the appeal as presented by Assange's legal representatives. 19,000 costs was also awarded against Assange. On 5 December 2011, Assange was refused permission by the High Court to appeal to the Supreme Court. The High Court certified that his case raised a point of law of general public importance. The Supreme Court subsequently granted permission to appeal,[22] and heard the appeal on 1 and 2 February 2012.[23] The court reserved its judgment and dismissed the appeal on 30 May 2012.[24] Assange has said the investigation is "without basis". He remained on conditional bail in the United Kingdom[10][25][26] until on 19 June 2012 Assange sought refuge at Ecuador's Embassy in London and was granted temporary asylum. On 16 August 2012 he was granted full asylum by the Ecuadorian government.

On 18 November 2010, the Stockholm District Court ordered Assange detained in absentia, on request by prosecutor Marianne Ny. As basis for the ruling, the court stated Julian Assange to be suspected on reasonable grounds to have committed rape[27] (vldtkt), unlawful coercion[27] (olaga tvng), and three cases of sexuellt ofredande[4] which has been variously translated as "sexual molestation",[28] "sexual assault",[29] "sexual misconduct", "sexual annoyance", "sexual unfreedom", "sexual misdemeanour", and "sexual harassment".[16][30][31][32]

As special reasons for the detention, the court named a risk of the suspect absconding or avoiding justice; that the penalty for the alleged crimes is at least two years imprisonment; and the lack of any obvious reason not to detain.[33]

View original post here:
Assange v Swedish Prosecution Authority - Wikipedia, the ...

» Amnesty Intl interviews Chelsea Chelsea Manning Support …

November 18, 2014 by the Chelsea Manning Support Network

An interview with Chelsea Manning is the cover story of leading human rights organization Amnesty Internationals Nov/Dec magazine, WIRE. The interview, titled, Why Speaking Out Is Worth the Risk, touches on why exposing the truth can be worth the often harsh consequences that whistle-blowers face. For Wikileaks whistle-blower Chelsea Manning, she thought do [I] really want to find [my]self asking whether [I] could have done more 10-20 years later?. Read the full interview below, or click here.

Why Speaking Out is Worth the Risk WIRE, Amnesty International, Nov-Dec 2014

Why did you decide to leak documents about the wars in Iraq and Afghanistan? These documents were important because they relate to two connected counter-insurgency conflicts in real-time from the ground. Humanity has never had a record this complete and detailed of what modern warfare actually looks like. Once you realize that the co-ordinates represent a real place where people live; that the dates happened in our recent history; that the numbers are actually human lives- with all the love, hope, dreams, hatred, fear and nightmares that come with them- then its difficult to ever forget how important these documents are.

What did you think the consequences might be for you personally? In 2010, I was a lot younger. The consequences felt very vague, I expected the worst possible outcome, but I didnt have a strong sense of what that might entail. But I expected to be demonized and have every moment of my life examined and analyzed for every single possible screw-up that Ive ever made- every flaw and blemish- and to have them used against me in the court of public opinion, I was especially afraid that my gender identity would be used against me.

What was it like to feel the full force of the US justice system and be presented as a traitor? It was particularly interesting to see the logistics involved in the prosecution: the stacks of money spent; the gallons of fuel burned; the reams of paper printed; the lengthy rolls of security personnel, lawyers and experts- it felt silly at times. It felt especially silly being presented as a traitor by the officers who prosecuted my case. I saw them out of court at least 100 days before and during the trial and developed a very good sense of who they were as people. Im fairly certain that they got a good sense of who I am as a person too. I remain convinced that even the advocates that presented the treason arguments did not believe their own words as they spoke them.

Many people think of you as a whistleblower. Why are whistleblowers important? In an ideal world, governments, corporations, and other large institutions would be transparent by default. Unfortunately, the world is not ideal. Many institutions begin a slow creep toward being opaque and we need people who recognize that. I think the term whistleblower has an overwhelmingly negative connotation in government and business, akin to tattle-tale or snitch. This needs to be addressed somehow. Very often policies that supposedly protect such people are actually used to discredit them.

What would you say to somebody who is afraid to speak out against injustice? First, I would point out that life is precious. in Iraq in 2009-10, life felt cheap. It became overwhelming to see the sheer number of people suffering and dying, and the learned indifference to it by everybody around me, including the Iraqis themselves. That really changed my perspective on my life, and made me realize that speaking out about injustices is worth the risk. Second, in your life, you are rarely given the chance to make a difference. Every now and then you do come across a significant choice. Do you really want to find yourself asking whether you could have done more, 10-20 years later? These are the kind of questions I didnt want to haunt me.

Why did you choose this particular artwork to represent you? Its the closest representation of what I might look like if I was allowed to present and express myself the way I see fit. Even after I came out as a trans woman in 2013, I have not been able to express myself as a woman in public. So I worked with Alicia Neal, an artist in California, to sketch a realistic portrait that more accurately represents who I am. Unfortunately, with the current rules at military confinement facilities, it is very unlikely that I will have any photos taken until I am released- which, parole and clemency notwithstanding, might not be for another two decades.

Go here to see the original:
» Amnesty Intl interviews Chelsea Chelsea Manning Support ...

Laura Poitras talks ‘CITIZENFOUR’ and why Edward Snowden is in Moscow

Theres a scene in Laura Poitras documentary, CITIZENFOUR, where 29-year-old American intelligence employeeEdward Snowden is hunkered down in a Hong Kong hotel room with London Guardian journalists Glenn Greenwald andEwen MacAskill when the fire alarm goes off. Snowden, who was surreptitiously meeting with Poitras and the reporters in May2013 to expose the massiveintelligence capability of the U.S. government, freezespractically terrified. Hed just unplugged the rooms phone andwarned his new friends that intelligence agencies can easily use them as microphones, and you can tell that hes not one who believes in coincidences. Maybe they got mad that they couldnt listen in to us via the phone any more, he says, while Greenwald looks at him to see if hes joking.

Snowden isnt joking.

After the Snowden revelations broke, shocking the world with American secrets of comprehensive and invasive global surveillance thatwounded American prestige and diplomacy, Snowdens caution suddenly didnt seem so far-fetched.

Poitras, who narrates CITIZENFOUR, so called because thats how Snowden signed his initialanonymous emails to her, had already directed two acclaimed documentaries about post-9/11 America, My Country, My Country and The Oath. Her films may have irritated some powerfulpeople; she was added to a U.S. government watch list that caused her to be detained frequently when she traveled. By the time she beganworking on a third film about global security issues, she had moved to Germany, mostly to guarantee that her sources identity and information wouldnt be compromised by recurring American travel interrogations. She was already editing footage in Berlin when she received the email that would change everything.

Amazingly, Poitras camera is there at the moment when Snowden explains why he decided to go public, to be a heroic whistleblower on a still-unquantifiable abuse of poweror, depending on your perspective, a traitor who stole and gave awayinvaluable American spy secrets.

CITIZENFOUR, which is already playing in theaters, was recentlynamed to the Oscar shortlist for Best Documentary, and is considered a leading candidate to take home the prize. Poitras, in New York to accept the Best Documentary prizes from the New York Film Critics Circle and the Gotham Awards, spoke to EW about being a witness to history.

EW: Take me back to January 2013, when the first CITIZENFOUR email arrives. You had been swimming in these watersinvestigating government surveillance, landing on government watch listsand this almost too-good-to-be-true anonymous source seeks you out. There had to be a certain amount of skepticism, that this might be entrapment, in some way.LAURA POITRAS: I had all those concerns. For sure. Partly because Im a filmmaker and a visual journalist, and usually, the way that I work is that Im the one who seeks out people. I dont get anonymous emails and tips. Its not the kind of work that I do, so it was completely out of the blue. And it just raised questions like, Why would I be the person to be contacted? I was very aware of the case of the Anonymous hacker Sabu, who flipped and became an FBI agent and was trying to entrap people in exactly those kind of ways. So I was on the lookout for anything that was a tell, any inappropriate asks. I laid out all my skepticisms, and [Snowden]came back with, You know that Im not going to entrap you because Im never going to ask anything of you.I was completely on the lookout for it, but there were never any asks. It took me a while to sort of wrap my head around it, but it makes sense to me now, in retrospect. I had published a piece about William Binny in The New York Times, where I did talk about being on the watch list, so I think that combinationknowing that I was interested in the topic and that I was also targetedwere the two things that somehow registered when he was thinking about who to contact.

You end up on this journey with journalist Glenn Greenwald to meet Snowdenin Hong Kong and the details are just lovely: Hes going to be playing a Rubiks Cube when you arrive in the hotel lobby, and youre going to have a scripted exchange that will cue you both in that you are who youre supposed to be. Even though its just a character in a movie, Hal Holbrooks Deep Throat in All the Presidents Men is what Im envisioning. Perhaps when youre emailing, youre thinking its some 55 year-old guysomeone more like William Binnysomeone whos been through the wars. But instead, you get a 29-year old kid. In a T-shirt.

Was that an uh-oh moment? Your mind-set was exactly like what mine was. I totally expected I was going to meet somebody older, that he had been through a lot, seen a lot. Probably not as old as Binny, because it was clear that he was also really, really technically computer savvy. But 40s, late 40s or something. I had completely burned into my head an idea of this person that was not the person that I met. I was actually profoundly shocked. So there was definitely a readjustment period.

Do you think he sensed that? At some point after we started the interview, he got up to use the restroom, and Glenn and I turned to each other and went, What the fk? We were shocked. And then he came back and we sort of laughed about it. But it made sense, once we sort of wrapped our heads around itthis is someone who really grew up with the Internet and what he saw he felt was so not right was because of his relationship to the promise of the Internet.

Read the rest here:
Laura Poitras talks ‘CITIZENFOUR’ and why Edward Snowden is in Moscow

Red Hat and Huawei Woo Telcos With Open Source Software

Big telecom companies like AT&T have made it clear to information-technology vendors they want more flexible options for their massive networks to meet demand for new services and lower costs. Theyve vowed to remake their networks using bare-bones computing equipment controlled by open-source software.

Now Red Hat and Huawei are teaming up to give the demanding telcos what they want.

Red Hat and Huawei sellers of computer-server software and telecom equipment, respectively are pushing an emerging open-source technology called Open Stack as an alternative to traditional telecom networking systems. Open Stack is making inroads as a way to manage large numbers of computer servers. The partnership aims to move its underlying concept into the networks that direct Web traffic within computer server-rooms and out to consumers.

Telecom companies are among the worlds biggest spenders on technology hardware, software and services. AT&T, for example, recently said it plans $18 billion in capital spending next year on facilities like its telecom network and computing equipment nearly double Google s capital spending this year. Such flush budgets mean that telcos technology choices have major ramifications for IT vendors.

If Red Hat and Huawei are successful, their alliance could pose a risk to companies such as Cisco and Ericsson, whose equipment is widely used by telecom carriers. Those companies traditional gear is based on proprietary technologies that are often time-consuming to reconfigure and hard to change out in favor of alternative vendors.

AT&T and its peers are among the biggest supporters of Open Stack, which is backed by Red Hat, Rackspace and others. Part of Red Hats goal in partnering with Huawei is to make Open Stack, a young technology that isnt easy to use, more relevant to demanding network situations, including telecommunications.

Open Stack is still too general-purpose a platform for them, said Tim Yeaton, senior vice president of Red Hats infrastructure business.

Cisco and other big telecom vendors also are also moving to offer OpenStack options to telecom firms and other customers. Red Hats partnership with Huawei is similar to one Red Hat announced earlier this year with Cisco.

OpenStack is the latest example of big changes brought on by open-source software, whose computer code can be viewed, modified, and shared freely by users. Open source software appeals to big businesses because its less expensive and easier to customize than proprietary software. Giant companies want more and more open source options, as they believe it can help them develop new services faster, according to industry experts.

______________________________________________________

Originally posted here:
Red Hat and Huawei Woo Telcos With Open Source Software