Human Security and Mutual Vulnerability

نویسنده

  • Jorge Nef
چکیده

Jorge Nef responds to one of the most pressing intellectual challenges of the post-Cold War era: the search for an analytical framework that will help us understand this turbulent and chaotic period in human history. His lucid and visionary analysis rests on the concept of mutual vulnerability: that in an increasingly interdependent world, global security is only as strong as the weakest link in the chain.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Vulnerability Study of Health Human Resources in the Iranian Ministry of Health and Medical Education

Background and Objectives: Health human resources is the major asset of the health system. The status of human resources in upstream and regulatory health organizations can exert high impact on the effectiveness of health policies and the performance of health system. This study, hence, was designed to explore the possible area of human resource damage to the employees of the Iranian Ministry o...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks

Recently, Chai et al. proposed a threshold password authentication scheme that t out of n server nodes could efficiently carry out mutual authentication with a user while preserving strong security requirements in the mobile ad hoc networks. In this article, we will show that their scheme suffers from a number of security vulnerabilities by passive attacks.

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007