نتایج جستجو برای: ssh

تعداد نتایج: 1254  

2006
D. Cromwell

We investigate the spatial and temporal variability of sea surface height (SSH) in the North Atlantic basin using satellite altimeter data from October 1992–January 2004. Our primary aim is to provide a detailed description of such variability, including that associated with propagating signals. We also investigate possible correlations between SSH variability and atmospheric pressure changes a...

2006
D. Cromwell

Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Abstract Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Abstract We investigate the spatial and temporal variability of sea surface height (SSH) in the North Atlantic basin using altimeter data from October 1992–January 2004. Our primary aim is to provide a fuller description of such...

2007
Erik Poll

We present a case study in the formal verification of an open source Java implementation of SSH. We discuss the security flaws we found and fixed by means of formal specification and verification – using the specification language JML and the program verification tool ESC/Java2 – and by more basic manual code inspection. Of more general interest is the methodology we propose to formalise securi...

2006
Vladislav Marinov Jürgen Schönwälder

There have been several attempts in the past to secure the Simple Network Management Protocol (SNMP). Version 3 of the SNMP protocol introduced a User-based Security Model (USM) which comes with its own user and key-management infrastructure. However, many operators are reluctant to introduce a new user and key management infrastructure just to secure SNMP. This paper describes how the Secure S...

Journal: :Atmospheric and Oceanic Science Letters 2022

Previous studies have shown that wind-forced baroclinic Rossby waves can capture a large portion of low-frequency steric sea surface height (SSH) variations in the North Atlantic. In this paper, classical wind-driven wave model derived 1.5-layer ocean is extended to include buoyancy forcing, and new then used assess contribution from buoyancy-forced Atlantic SSH variations. Buoyancy forcing det...

2006
Filip Zagórski

We present very simple kleptographic attacks on SSL/TLS and SSH protocols. They enable a party, which has slightly manipulated the code of a cryptographic library, to steal secrets of the user. According to the scenario of the kleptographic attacks the secrets can be stolen only by a party having a secret key not included in the manipulated code. The attacker needs only to record transmissions....

2010
Sakthi Priya Balaji

This paper proposes a technique to block adult images displayed in websites. The filter is designed so as to perform even in exceptional cases such as, where face detection is not possible or improper face visibility. This is achieved by using an alternative phase to extract the MFC (Most Frequent Color) from the Human Body regions estimated using a biometric of anthropometric distances between...

2006
Teemu Koponen Pasi Eronen Mikko Särelä

Disconnection of an SSH shell or a secure application session due to network outages or travel is a familiar problem to many Internet users today. In this paper, we extend the SSH and TLS protocols to support resilient connections that can span several sequential TCP connections. The extensions allow sessions to survive both changes in IP addresses and long periods of disconnection. Our design ...

2010
Sakthi Priya

This paper proposes a technique to block adult images displayed in websites. The filter is designed so as to perform even in exceptional cases such as, where face detection is not possible or improper face visibility. This is achieved by using an alternative phase to extract the MFC (Most Frequent Color) from the Human Body regions estimated using a biometric of anthropometric distances between...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید