Volume 1 - 2009
Are Electronic Certificates Really Secur
This paper describes a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. By application of suggested scenario it is possible to create a rogue certificate, containing original electronic signature. This certificate allows to impersonate any website, including banking and e-commerce sites secured using the HTTPS protocol. Described technique takes advantage of a weakness in the cryptographic hash function, known as an MD5 collision.
SECURITY CHARACTERISTICS OF ENCRYPTING FILE SYSTEM
User access control and encryption are standard mechanisms for protecting data from unauthorized accesses. The operating system grants user accesses according to his specifications from ACLís, while cryptographic files systems provide a layer of protection for data when access control is unavailable. When data leaves the protection of access control, it can be encrypted when that it is only accessible to those who are assigned decryption keys. In this paper, we presented New Technology File System (NTFS) and its part, Encrypting File System (EFS), which is example that combines the mechanisms of access control and encryption
Cyclic spectral analysis algorithms
Дат је увод у теорију обраде и анализе циклостационарних сигнала другог реда, преглед теорије дигиталне цикличне спектралне анализе и описани су принципи и карактеристике рачунарски ефикасних алгоритама за процену цикличног спектра, као и неки аспекти њихове имплементације. Разматрани су алгоритми на бази временског и фреквенцијског усредњавања цикличних периодграма.
SIMULATION OF ARMOURED BATTALION IN SWARMING COMPUTER NETWORK
Swarming is a tactical approach, suitable for both attack and defence, which has more and more been taken into account in modern armiesí combat activities conceptualizing. Adaptation of the existing armoured an mechanized units (AMU) for swarming could be the best investment in technically inferior armiesí modernization. That is the principal motivation for the research in course at Union university School of Computing in Belgrade. Some aspects of the AMU C4I system, and results of its mobile wireless computer network simulation in particular, have been considered in the paper.
ARE WE READY FOR NANOTECHNOLOGY
In the paper the impacts of development of nanotechnology are discussed. The overview outlines scaling effects on actuation, and sensing at nano scale. Then, a possible future development is considered. Some scientific areas that offer useful results for future development of nanorobotics. are pointed out: material science, biotechnology, nanoelectronics, and computer engineering. The problems and possibilities of developing of nanorobotics at our region, as well as globally, are considered also .