National Library of Energy BETA

Sample records for lets remote authenticated

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability T-704: RSA enVision Lets Remote Users View Files and Remote...

  2. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  3. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  4. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Connected Grid Network Management System Multiple Vulnerabilities V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code U-255: Apache Wicket Input Validation...

  5. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  6. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Arbitrary Code U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

  7. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  8. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass...

  9. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartmentV-138: Red HatLet

  11. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated...

  12. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

  13. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  14. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  15. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  16. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Environmental Management (EM)

    Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users...

  17. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department

  18. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

  19. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Energy Savers [EERE]

    279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code...

  20. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

  1. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  2. User authentication and remote execution across administrative domains

    E-Print Network [OSTI]

    Kaminsky, Michael, 1976-

    2004-01-01

    (cont.) selectively delegates authority to processes running on remote machines that need to access other resources. The delegation mechanism lets users incrementally construct trust policies for remote machines. Measurements ...

  3. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

  4. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    Users Decryption Sessions U-091: cURL Lets Remote Users Decrypt SSLTLS Traffic T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL...

  5. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  6. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  7. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  8. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  9. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  10. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  11. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  12. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  13. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  14. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM:...

  16. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsers Execute

  17. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

  18. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  19. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  20. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  1. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  2. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can bypass the pop-up blocker. A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system....

  3. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  4. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy

  5. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  6. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemote Authenticated Users

  7. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  8. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  9. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Environmental Management (EM)

    were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT ASSESSMENT: Medium DISCUSSION: A...

  10. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemoteofDepartmentGain

  11. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting Attacks |

  12. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|ofSessions | Department ofConduct

  13. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:

  14. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code |

  15. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitraryDepartment

  16. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department of Energy

  17. V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: AppleAttacks6:

  18. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  19. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  20. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  1. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  2. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  3. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    variable for further evaluation. The code will run with the privileges of the target web service. Impact: A remote user can execute arbitrary commands on the target system....

  5. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  6. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  7. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of EnergyAuthentication or

  9. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department of EnergyAuthentication and

  10. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  11. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  12. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target...

  13. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    commands on the target system. The code will run with the privileges of the target web service Impact: A remote user can execute arbitrary code on the target system....

  14. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and...

  15. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  16. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  17. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  18. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Execute Arbitrary Code PLATFORM: McAfee ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  19. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  20. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  1. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  2. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  4. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  5. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  6. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  7. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  8. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Energy Savers [EERE]

    676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote...

  9. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Energy Savers [EERE]

    V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  10. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  11. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  12. T-725: Cisco Unified Service Monitor and Cisco Unified Operations...

    Broader source: Energy.gov (indexed) [DOE]

    Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users...

  13. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  14. Authenticated Multicast Immune to DenialofService Shouhuai Xu

    E-Print Network [OSTI]

    Xu, Shouhuai

    using Merkle signature tree to tolerate packet loss. Although the cost for generating and verifying for each signature. Perrig et al. [13] propose a solution they call TESLA. The main idea is to let to authenticate the bu#11;ered packet. Although some of the shortcomings of TESLA are overcome in their following

  15. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  16. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  17. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  18. Nanotechnology-Based Trusted Remote Sensing James B. Wendt and Miodrag Potkonjak

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Nanotechnology-Based Trusted Remote Sensing James B. Wendt and Miodrag Potkonjak Computer Science nanotechnology PPUF-based architecture for trusted remote sensing. Current public physical unclonable function the authentication process. Our novel nanotechnology- based architecture ensures fast authentication through partial

  19. Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display

    E-Print Network [OSTI]

    Carbunar, Bogdan

    of mobile devices and applications introduces new security and privacy vulnerabilities for the remote services accessed by mobile device users. A trusted and usable authentication archi- tecture for mobile mechanism that authenticates users of touch based mobile devices for accessing the local devices and remote

  20. Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin Kupcu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential

  1. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  2. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT:...

  3. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  4. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The Cisco Video Surveillance Manager (VSM) allows...

  5. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe...

  6. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  7. 1. Hold down the green Display Power button for 3 seconds and release to turn on the projector. Let the projector warm up.

    E-Print Network [OSTI]

    Aalberts, Daniel P.

    1. Hold down the green Display Power button for 3 seconds and release to turn on the projector. Let on device or use appropriate remote. 4. When finished, hold down the green Display Power button for 3

  8. Let's makeleaf people! White Ash tree

    E-Print Network [OSTI]

    Ashline, George

    Let's makeleaf people! White Ash tree Seedling Activity Tree location Let's start by exploring the leaf of the White Ash tree! Can you describe the leaf? Does it have smooth-edges or rough-edges? What of anything? Try this... Let's create leaf people from the shape of the White Ash leaves. The shape

  9. NISTIR 7863 Cardholder Authentication for the

    E-Print Network [OSTI]

    NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk Hildegard.IR.7863 #12;NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk

  10. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  11. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password |

  12. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9:1:

  13. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  14. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  15. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Energy Savers [EERE]

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be...

  16. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012)

    E-Print Network [OSTI]

    Gerber, Edwin

    2012-01-01

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012) Published online in Wiley Online Library using National Centers for Environmental Prediction/National Center for Atmospheric Research (NCEP) concentrations and sea- surface temperatures (SSTs). These integrations enable the relative role of ozone

  17. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  18. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  19. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposals duenationalMeetingFAQs05-2010

  20. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft...

  1. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  2. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegionalScientific andRemote Access Remote

  3. Remote Connections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegionalScientific andRemote AccessRemote

  4. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  5. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013)

    E-Print Network [OSTI]

    Lee, Sukyoung

    2013-01-01

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013) Published online in Wiley Online Library Sciences, Seoul National University, Seoul, South Korea *Correspondence to: C. Yoo, Center for Atmosphere). A number of studies have shown that the MJO plays an important role in modulating the extratropical cir

  6. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  7. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Energy Savers [EERE]

    INFOGRAPHIC: Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the...

  8. CLOC: Authenticated Encryption for Short Input Tetsu Iwata1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

  9. Site Sustainability Plan An Authentic Commitment

    E-Print Network [OSTI]

    #12;#12;Contents Site Sustainability Plan An Authentic Commitment Contents Acronyms and Abbreviations iv Executive Summary v Greenhouse Gas 1 Energy 6 High Performance Sustainable Buildings 9 Fleet 11 Water 13 Pollution Prevention 15 Sustainable Acquisition 19 Electronic Stewardship and Data Centers 20

  10. Massachusetts Institute of Technology Identification and Authentication

    E-Print Network [OSTI]

    Circuits Blaise Gassend, Dwaine Clarke, Daihyun Lim, Marten van Dijk, Srini Devadas To appear and Authentication of Integrated Circuits Blaise Gassend1, Dwaine Clarke1, Daihyun Lim1 Marten van Dijk2, Srinivas. VAN DIJK, S. DEVADAS However, with these techniques, the focus is simply on assigning a unique

  11. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  12. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  13. Lightweight Message Authentication for the Internet of

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Lightweight Message Authentication for the Internet of Things RIKARD HÖGLUND KTH ROYAL INSTITUTE for the Internet of Things Rikard Höglund 2014-11-24 Master's Thesis Examiner and academic adviser Professor Gerald capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario

  14. LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI Jérôme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany-in tari¤s to foster the di¤usion of photovoltaics is recently being rediscussed in several countries

  15. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  16. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    Administrative Access * Telnet Access * SSH Access * Virtual Telnet * Virtual HTTP * Transport Layer Security (TLS) Proxy for Encrypted Voice Inspection SIP Inspection Denial of...

  17. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  18. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Energy Savers [EERE]

    to the VPN headend using a web browser. After the user logs in, the browser displays a portal window and when the user clicks the "Start AnyConnect" link, the process of...

  19. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT: High Discussion EMC Cloud Tiering Appliance (CTA) is prone to a security-bypass vulnerability that may allow...

  20. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Energy Savers [EERE]

    Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless Controller Cisco Wireless Controller Software for...

  1. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  2. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe...

  3. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol...

  4. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    information stored on the file system of the BlackBerry smartphone. The following devices are affected: * BlackBerry Bold 9650 smartphone * BlackBerry Bold 9700 smartphone...

  5. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series...

  6. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing ToolInternational Affairs, Before theFebruary 1,7/109 HistoricalResources |

  7. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing ToolInternational Affairs, Before theFebruary 1,7/109 HistoricalResources

  8. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization

  9. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System

  10. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemoteofDepartment

  11. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting AttacksDepartmentof

  12. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartment ofCode |

  13. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartment ofCode |Spoof

  14. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting Attacks |

  15. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting Attacks

  16. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment

  17. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartment

  18. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartmentAttacks |

  19. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount PasswordFlaw

  20. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccountPotentially Sensitive

  1. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccountPotentially

  2. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of

  3. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department

  4. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities |Unauthorized

  5. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department of

  6. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of Energy 4: Google

  8. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of Energy 4:

  9. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| DepartmentEnergy

  10. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| DepartmentEnergyUsers Deny

  11. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| DepartmentEnergyUsers

  12. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy T-685:

  13. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35: Oracle

  14. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for39: Debian update forUsers

  15. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for39: Debian

  16. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu President

  17. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu PresidentAccess |

  18. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu PresidentAccess

  19. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:Servers | Department of

  20. U-047: Siemens Automation License Manager Bugs Let Remote Users Deny

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:Servers | Department

  1. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:Servers |

  2. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code |Arbitrary

  3. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary

  4. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitraryDepartment of

  5. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple

  6. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultipleCross-Site Scripting

  7. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultipleCross-SiteDepartment

  8. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent

  9. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks |Bypass

  10. U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks |Bypass2:Service

  11. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode | Department

  12. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURL Address

  13. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy

  14. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department of Energy 7:Obtain

  15. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks | Department

  16. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks | DepartmentCode |

  17. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks || Department of

  18. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects |SummitVOCs| Department

  19. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: OracleEnergyArbitrary

  20. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment of

  1. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Code |

  2. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Code

  3. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving

  4. V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof EnergyVulnerabilities7:

  5. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof EnergyVulnerabilities7:Attacks,

  6. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-SavingofCode | Department of Energy 2:

  7. V-144: HP Printers Let Remote Users Access Files on the Printer |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-SavingofCode | Department of Energy

  8. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-SavingofCode | Department

  9. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on the Target

  10. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on the

  11. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on

  12. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on| Department

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:2:

  14. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C

  15. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I CArbitrary Code and Deny

  16. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers Gainof

  17. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar through the YearsUsers

  18. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin

  19. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  20. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  1. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  2. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  3. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method

  4. A Two-factor Authentication Mechanism Using Mobile Phones

    E-Print Network [OSTI]

    -03 Last Modification Date: 2008/08/20 Abstract Mobile devices are becoming more pervasive and more of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second

  5. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  6. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  7. Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor

    E-Print Network [OSTI]

    Ning, Peng

    their battery power. This paper studies how to deal with such DoS attacks when signatures are used for broadcast types of solutions for broadcast authentication in sensor networks, µTESLA [19] and digital signature [5]. µTESLA and its variations achieve broad- cast authentication through delayed disclosure of authenti

  8. Supplement on imaginary quadratic UFDs (a) Let ? ? C be such ...

    E-Print Network [OSTI]

    2012-10-25

    Supplement on imaginary quadratic UFDs. (a) Let ? ? C be such that q:= ???2 is a non-prime integer ? 2. Show that any Z-prime divisor of q is irreducible in ...

  9. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce All About Contractors Austin Energy, a municipally owned utility, has a long history of...

  10. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    . Authentication tags allow to separate the secrecy Corresponding author. 1 #12;problem in message transmission

  11. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E. (West Melbourne, FL)

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  12. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  13. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  14. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  15. Signal Authentication in Trusted Satellite Navigation Receivers

    E-Print Network [OSTI]

    Kuhn, Markus

    probation officers to remotely monitor cur- fews and probation conditions; · road tax and insurance fees-based road charging, prisoner tagging, location-based access control are just some secure- positioning information about speed, route and travel times in order to take into account externalities and risk; · road

  16. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  17. Does Future Social Exclusion have an Effect on State Authenticity

    E-Print Network [OSTI]

    Wilson, Craig Frank

    2010-06-30

    Previous research on social exclusion has found that it has many social and personal consequences, such as disrupting self-regulation, and lowering well-being, self-esteem and the need to belong. However, authenticity is ...

  18. Investigating the Effect of Social Exclusion on State Authenticity 

    E-Print Network [OSTI]

    Wilson, Poppy F

    2010-05-30

    This study examines the effect of social exclusion on state authenticity, the extent to which one feels real and true to the self in different situations. In addition to this, the effect of social exclusion on basic need ...

  19. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  20. Authenticated writing assessments of agricultural education graduate students 

    E-Print Network [OSTI]

    Wright, Kimberly Dawn

    2004-11-15

    -1 AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2004 Major Subject: Agricultural Education AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to Texas A...

  1. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  2. Vacuum Vessel Remote Handling

    E-Print Network [OSTI]

    FIRE Vacuum Vessel and Remote Handling Overview B. Nelson, T. Burgess, T. Brown, H-M Fan, G. Jones #12;13 July 2002 Snowmass Review: FIRE Vacuum Vessel and Remote Handling 2 Presentation Outline · Vacuum Vessel - Design requirements - Design concept and features - Analysis to date - Status and summary

  3. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  4. V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartment ofCode

  5. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsersSUSE

  6. REMOTE SENSING OF THE ENVIRONMENT

    E-Print Network [OSTI]

    Gilbes, Fernando

    1 CHAPTER 1: REMOTE SENSING OF THE ENVIRONMENT REFERENCE: Remote Sensing of the Environment John R. Jensen (2007) Second Edition Pearson Prentice Hall What is Remote Sensing? #12;2 Photogrammetry ­ the art of identifying objects and judging their significance (Colwell, 1966). Remote Sensing ­ the measurement

  7. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  8. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  9. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2

  10. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  11. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Broader source: Energy.gov (indexed) [DOE]

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  12. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  13. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  14. Efficient authentication mechanisms for navigation systems a radio-navigation case

    E-Print Network [OSTI]

    Stanford University

    upon the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) algorithm. We analyze and a detailed security analysis of the needed key size, we developed adjusted TESLA, an authentication can use such a small authentication message is due to the insertion of a timestamp into the generation

  15. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  16. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  17. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F. (Pullman, WA); Tetzlaff, Wolfgang (Pullman, WA); Hegland, Joel E. (Pullman, WA); Jones, Scott C. (Pullman, WA)

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  18. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  19. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  20. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  1. On the Authentication of RFID Systems with Bitwise Operations

    E-Print Network [OSTI]

    Poovendran, Radha

    On the Authentication of RFID Systems with Bitwise Operations Basel Alomair Network Security Lab secure authenti- cation via bitwise operations. Following each proposal, a series of papers have been. We divide bitwise operations into two main categories and address the security limitations of each

  2. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  3. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  4. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  5. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  6. KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS

    E-Print Network [OSTI]

    Pâris, Jehan-François

    consists of a Kerberos server and a ticket-granting server (TGS). Once users are authenticated by Kerberos, they receive a TGS ticket. This ticket will allow them to request from the TGS tickets for all the other servers. Kerberos keeps keys for (a) all the system users and (b) the ticket-granting server (TGS

  7. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  8. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  9. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probabili* *ty of the same systems is retained up top___ #G authenticated messages. In a typical state

  10. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probability of the same systems is retained up top___ #G authenticated messages. In a typical state

  11. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  12. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  15. Ninja : Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

    E-Print Network [OSTI]

    Mitchell, Chris

    authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity, Ubiquitous, Trusted Computing. 1 Introduction In the Mobile VCE1 Core 4 research programme on Ubiquitous User ? IP Backbone? Pervasive User Environment WiMAX Bluetooth Fig. 1. A Ubiquitous Computing

  16. Interpreting Remote Sensing NOx Measurements

    E-Print Network [OSTI]

    Denver, University of

    Interpreting Remote Sensing NOx Measurements Robert Slott, Consultant, Donald Stedman and Saj tailpipe emissions (HC, CO, NOx) are changing with time hUse remote sensing hMeasurements in at least 4 of the year at each location hUniform QC/QA and data reporting Paper # 2001-01-3640 #12;Remote Sensing

  17. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 *ImpactScience of SignaturesSoft0Raising MoreLet the

  18. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  19. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  20. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  1. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  2. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  3. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  4. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  5. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  6. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  7. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  8. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  9. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUraniumDepartmentBuffer

  10. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: AppleGain Unauthorized

  11. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the

  12. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code | Department

  13. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *ReindustrializationEnergy Remote AlaskanJ.E.M.

  14. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

    1988-01-01

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  15. Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1

    E-Print Network [OSTI]

    Harbater, David

    Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1 C be a G-Galois branched cover, with branch locus P1, . . ., Pr, where Pj is at x = j. Let P be a base point on the positive imaginary axis. Choose a homotopy basis 1, . . ., r of counterclockwise loops at P, where j winds once around Pj

  16. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  17. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  18. Information Theoretic Bounds on Authentication Systems in Query Reihaneh Safavi-Naini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  19. Information Theoretic Bounds on Authentication Systems in Query Reihaneh SafaviNaini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi­Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  20. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  1. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  2. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  3. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  4. Space and Remote Sensing (ISR-2)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Space and Remote Sensing Developing and applying remote sensing capabilities to problems of global security and related sciences Contacts Group Leader Robert Shirey Email Deputy...

  5. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  6. Let It Snow! (Simplified Chord Progression) Oh, the weather outside is frightful, Starts in Key of G

    E-Print Network [OSTI]

    Fowler, Mark

    Let It Snow! (Simplified Chord Progression) G D7 G Oh, the weather outside is frightful, Starts in Key of G G D7 But the fire is so delightful, Am E7 Am And since we've no place to go, D7 G Let it snow, let it snow, let it snow. G D7 G It doesn't show signs of stopping, G D7 And I brought some corn

  7. Chit-based Remote Storage

    E-Print Network [OSTI]

    Paluska, Justin Mazzola

    We propose a model for reliable remote storage founded on contract law. Consumers submit their bits to storage providers in exchange for a chit. A chit is a cryptographically secure, verifiable contract between a consumer ...

  8. Robotics and remote systems applications

    SciTech Connect (OSTI)

    Rabold, D.E.

    1996-05-01

    This article is a review of numerous remote inspection techniques in use at the Savannah River (and other) facilities. These include: (1) reactor tank inspection robot, (2) californium waste removal robot, (3) fuel rod lubrication robot, (4) cesium source manipulation robot, (5) tank 13 survey and decontamination robots, (6) hot gang valve corridor decontamination and junction box removal robots, (7) lead removal from deionizer vessels robot, (8) HB line cleanup robot, (9) remote operation of a front end loader at WIPP, (10) remote overhead video extendible robot, (11) semi-intelligent mobile observing navigator, (12) remote camera systems in the SRS canyons, (13) cameras and borescope for the DWPF, (14) Hanford waste tank camera system, (15) in-tank precipitation camera system, (16) F-area retention basin pipe crawler, (17) waste tank wall crawler and annulus camera, (18) duct inspection, and (19) deionizer resin sampling.

  9. CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote SensingREFERENCE: Remote Sensing of the Environmentof the Environment John R. Jensen (2007)John R. Jensen yy y the waterthe water with remotewith remote sensing?sensing? #12;2 THE BLUE PLANETTHE BLUE PLANET

  10. CHAPTERCHAPTER 1313CHAPTERCHAPTER 13:13: Remote Sensing ofRemote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    11 CHAPTERCHAPTER 1313CHAPTERCHAPTER 13:13: Remote Sensing ofRemote Sensing of Urban LandscapeUrban Landscape REFERENCE: Remote SensingREFERENCE: Remote Sensing of the Environmentof the Environment John R Hall pp Urban Remote Sensing Users · Zoning regulation · Commerce and economic development · Tax

  11. Remote hybrid power systems

    SciTech Connect (OSTI)

    Barley, C.D.; Winn, C.B. [Colorado State Univ., Fort Collins, CO (United States)

    1997-12-31

    This paper provides an overview of the emerging technology of remote, stand-alone electrical power systems featuring a renewable source (wind or photovoltaics [PV]) as well as a diesel generator, with or without an energy storage device. Other stand-alone power systems are discussed briefly, mainly to emphasize the domain of hybrid systems. The history of hybrid systems is reviewed, beginning with the first wind/diesel system in the late 1970s. Other topics include issues arising from the characteristics of diesel engine/generator sets; simple vs. complex systems; the various energy storage technologies that have been used or proposed; control strategies; modeling; optimization; and some {open_quotes}nuts & bolts{close_quotes} details. The bibliography includes over 130 references which are cited throughout the topical discussions. It is concluded that the technical feasibility of hybrid systems has been demonstrated through many prototype installations, and that areas for further improvements include higher reliability and more economical energy storage devices. 139 refs., 7 figs., 1 tab.

  12. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  13. Sensing remote nuclear spins

    E-Print Network [OSTI]

    Nan Zhao; Jan Honert; Berhard Schmid; Junichi Isoya; Mathew Markham; Daniel Twitchen; Fedor Jelezko; Ren-Bao Liu; Helmut Fedder; Jörg Wrachtrup

    2012-04-29

    Sensing single nuclear spins is a central challenge in magnetic resonance based imaging techniques. Although different methods and especially diamond defect based sensing and imaging techniques in principle have shown sufficient sensitivity, signals from single nuclear spins are usually too weak to be distinguished from background noise. Here, we present the detection and identification of remote single C-13 nuclear spins embedded in nuclear spin baths surrounding a single electron spins of a nitrogen-vacancy centre in diamond. With dynamical decoupling control of the centre electron spin, the weak magnetic field ~10 nT from a single nuclear spin located ~3 nm from the centre with hyperfine coupling as weak as ~500 Hz is amplified and detected. The quantum nature of the coupling is confirmed and precise position and the vector components of the nuclear field are determined. Given the distance over which nuclear magnetic fields can be detected the technique marks a firm step towards imaging, detecting and controlling nuclear spin species external to the diamond sensor.

  14. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat CloudForms Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities...

  15. An extension of Markov's Inequality Let E be a connected compact ...

    E-Print Network [OSTI]

    An extension of Markov's Inequality. Let E be a connected compact set of logarithmic capacity 1 in the complex. plane. Is it true that for every polynomial P of ...

  16. Quiz 9 solutions, Section ALL (10 pts.) Let E be the solid in the 1st ...

    E-Print Network [OSTI]

    jony2_000

    2014-11-09

    Quiz 9 solutions, Section ALL. (10 pts.) Let E be the solid in the 1st octant between the paraboloid z = 1 + x2 + y2 and the plane z = 10. Set up, but DO NOT.

  17. Quiz 4 solutions, Section ALL (10 pts.) Let z = f(x, y)

    E-Print Network [OSTI]

    Jony

    2014-10-01

    Quiz 4 solutions, Section ALL. (10 pts.) Let z = f(x, y) = x4. + 4y. 2. + 1. (a) Sketch some level curves of f and explicitly say the name curve the level curves form.

  18. THE C*-ALGEBRA OF A VECTOR BUNDLE 1. Introduction Let E ...

    E-Print Network [OSTI]

    2010-07-19

    Jul 19, 2010 ... to the Doplicher-Roberts algebra of ?(E), see [7]. Let us recall that if E is .... that m and ?d/2?! are relatively prime and that Tor(H?(X,Z),Z/m) = 0.

  19. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand LetBypass

  20. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  1. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  2. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  3. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  4. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Herv´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined

  5. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  6. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity 

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  7. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  8. The Role of Psychological Needs for Autonomy, Competence, Relatedness and Money-luxury in State Authenticity 

    E-Print Network [OSTI]

    Renwick, Louisa Catherine

    2009-07-03

    This study aimed to determine the effects of psychological needs on states of authenticity. Self-determination theory proposes three basic psychological needs, for autonomy, competence and relatedness (Deci & Ryan, 1985). ...

  9. The Wildlife Society (TWS) GIS Annual Remote Sensing Meeting

    E-Print Network [OSTI]

    Dwyer, Chris

    1996-01-01

    Secretary/Treasurer, TWS GIS & Remote Sensing Working Group.The Wildlife Society (TWS) GIS Annual Remote Sensing Meetinghosted a special meeting of GIS and remote sensing interests

  10. Position Announcement Postdoctoral Research Associate Lidar Remote Sensing

    E-Print Network [OSTI]

    Salvaggio, Carl

    Position Announcement Postdoctoral Research Associate ­ Lidar Remote Sensing Department Summary: The employee will provide remote sensing expertise and conduct research in lidar remote sensing from advanced terrestrial, airborne, and satellite remote sensing platforms, including UASs (Unmanned

  11. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid...

  12. 10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing

    E-Print Network [OSTI]

    Plaza, Antonio J.

    10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

  13. Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing

    E-Print Network [OSTI]

    California at Berkeley, University of

    Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing ISSN 2072-4292 www: fire detection; geosynchronous; remote sensing; infrared; FUEGO 1. Introduction 1.1. Overview Fire for a geosynchronous OPEN ACCESS #12;Remote Sens. 2013, 5 5174 satellite with modern imaging detectors, software

  14. Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing

    E-Print Network [OSTI]

    Anderson, Charles W.

    Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing ISSN 2072-4292 www of Remotely Sensed Data Paul H. Evangelista 1, *, Thomas J. Stohlgren 2 , Jeffrey T. Morisette 2 and Sunil model (Maxent) for its application and performance in remotely sensing invasive Tamarix sp. Six Landsat

  15. Authenticity as a state; its mediating relationship between mood and wellbeing, and the role of self-consciousness 

    E-Print Network [OSTI]

    Ames, Sophie

    2009-07-03

    State versus trait: the experiment explored the dichotomy in personality theory by investigating whether judgements of authenticity were susceptible to different mood conditions. Life satisfaction and self consciousness ...

  16. INTERVAL METHODS IN REMOTE SENSING

    E-Print Network [OSTI]

    Ward, Karen

    INTERVAL METHODS IN REMOTE SENSING: RELIABLE SUB­DIVISION OF GEOLOGICAL AREAS David D. Coblentz, G of the locations which weren't that thoroughly analyzed. 1 #12; 2 The subdivision of a geological zone TOPOGRAPHIC INFORMATION One reason for subjectivity of the geological subdivision is the fact

  17. Geography 477 Introduction to Remote Sensing

    E-Print Network [OSTI]

    Frank, Thomas D.

    Geography 477 Introduction to Remote Sensing www.sdal.uiuc.edu Dr. Tom Frank 321 Davenport Hall tdfrank@uiuc.edu 333-7248 #12;Remotely-sensed images of light reflected or emitted from the earth of the earth's environments #12;Remote sensing is the science or art of deriving information about an object

  18. Challenges and Opportunities of Remote Sensing in

    E-Print Network [OSTI]

    Gilbes, Fernando

    Challenges and Opportunities of Remote Sensing in Caribbean Coastal Waters Fernando Gilbes-Santaella, Ph.D. Associate Professor Geological and Environmental Remote Sensing Laboratory Department of this presentation Discuss the potential and limitations for remote sensing of ocean color and coral reefs monitoring

  19. 11 Remote Sensing of Submerged Aquatic

    E-Print Network [OSTI]

    Purkis, Sam

    223 11 Remote Sensing of Submerged Aquatic Vegetation and Coral Reefs Sam Purkis and Chris, the remote sensing of SAV, as well as coral reefs, is considerably more challenging than for terrestrial differentia- tion of SAV and coral habitats using optical remote sensing demands specialized strategies, even

  20. Interactive Visualization of Remote Sensing Data

    E-Print Network [OSTI]

    Blanz, Volker

    Interactive Visualization of Remote Sensing Data Interaktive Visualisierung von Fernerkundungsdaten alterungsbeständigem holz- und säurefreiem Papier. #12;Abstract Remote Sensing is an important tool for the analysis and spaceborne Remote Sensing systems produce a rapidly growing number of data sets, and improvements in sensor

  1. Friday, March 17, 2006 LUNAR REMOTE SENSING

    E-Print Network [OSTI]

    Rathbun, Julie A.

    Friday, March 17, 2006 LUNAR REMOTE SENSING 1:30 p.m. Crystal Ballroom B Chairs: M. S. Robinson D variations due to photometry can mimic those attributed to composition in remote sensing data of planetary D. B. Remote Sensing and Geologic Studies of the Southeastern Quadrant of the Moon [#1815] We report

  2. Bylaws of the Center for Remote Sensing

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    DRAFT Bylaws of the Center for Remote Sensing Agricultural and Biological Engineering University for the conduct and operation of the Center for Remote Sensing (CRS) at the University of Florida (UF). The CRS and international recognition in research, teaching, and outreach for cutting-edge technologies in remote sensing

  3. Remote Sensing of the Rob Holman1

    E-Print Network [OSTI]

    Haller, Merrick

    Remote Sensing of the Nearshore Rob Holman1 and Merrick C. Haller2 1 College of Earth, Ocean- ate temporal or spatial density or at reasonable logistical or financial costs. Remote sensing algo- rithms by which the most important geophysical variables can be estimated from remote sensing

  4. Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

    E-Print Network [OSTI]

    Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

  5. The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

    E-Print Network [OSTI]

    The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

  6. Application Interface to Parallel Dense Matrix Libraries: Just let me solve my problem!

    E-Print Network [OSTI]

    Batory, Don

    therefore be a primary concern of library developers. We demonstrate that they are easy to defineApplication Interface to Parallel Dense Matrix Libraries: Just let me solve my problem! H. Carter matrices. This allows us explain why traditional interfaces to dense linear algebra libraries

  7. Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity

    E-Print Network [OSTI]

    Simmons, Craig A.

    Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity Peter F. Davies, Anthony G. Passerini, Craig A. Simmons A ortic valve diseases are debilitating cardiovascular disorders the longevity of replacement valves and to improve tissue engineered substitutes,1 the underlying mech- anisms

  8. Blogging as Social Activity, or, Would You Let 900 Million People Read Your Diary?

    E-Print Network [OSTI]

    Nardi, Bonnie

    Blogging as Social Activity, or, Would You Let 900 Million People Read Your Diary? Bonnie A. Nardi mgumbrec@psych.stanford.edu ABSTRACT "Blogging" is a Web-based form of communication that is rapidly becoming mainstream. In this paper, we report the results of an ethnographic study of blogging, focusing

  9. Let me catch this! Experiencing Interactive 3D Cinema through Collecting Content with a Mobile Phone

    E-Print Network [OSTI]

    Let me catch this! Experiencing Interactive 3D Cinema through Collecting Content with a Mobile explore how to enable interaction with content in the context of 3D cinemas by means of a mobile phone interested in the user ex- perience of the interactive 3D cinema concept, and how dif- ferent interactive

  10. Besanon, 24/10/2013 Carnot-Pasteur ES LETS LISIT SPIM

    E-Print Network [OSTI]

    Jeanjean, Louis

    Besançon, 24/10/2013 Carnot-Pasteur ­ ES ­ LETS ­ LISIT ­ SPIM Rentrée des Écoles Doctorales de Présentation des ED, organisation, fonctionnement... - ED Carnot-Pasteur (amphi FEMTO-ST) - ED Environnements : réunion amphi FEMTO-ST) 17h00 ­ 18h30 2 interventions du cycle de l'Université Ouverte "quand la jeune

  11. BrowseRank: Letting Web Users Vote for Page Importance Yuting Liu*

    E-Print Network [OSTI]

    Ma, Zhi-Ming

    BrowseRank: Letting Web Users Vote for Page Importance Yuting Liu* School of Science Beijing is to exploit the link graph of the web and to build a model based on that graph. For instance, Page added and deleted by web con- tent creators. In this paper, we propose computing page impor- tance

  12. -News Home Help EU offers 'sweetener' to Japan to let France host nuclear project

    E-Print Network [OSTI]

    -News Home Help EU offers 'sweetener' to Japan to let France host nuclear project Wed Nov 10, 9:45 AM ET BRUSSELS (AFP) - The European Union ( - ) has offered Japan a "sweetener" to allow France think we have made reasonable offers," European Commission ( - ) spokesman Fabio Fabbi told reporters

  13. Don't Let Connecticut's Trash Plants Go Private April 19, 2006

    E-Print Network [OSTI]

    Columbia University

    Don't Let Connecticut's Trash Plants Go Private April 19, 2006 JONATHAN BILMES In 1998, the Connecticut General Assembly passed legislation deregulating the electric industry. While the move toward consumers a choice of affordable electricity providers - virtually everyone acknowledges, in Connecticut

  14. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  15. Let's Paint the Town Red for a Few Hours: Composition of Aspect in Idioms

    E-Print Network [OSTI]

    Glasbey, Sheila

    Let's Paint the Town Red for a Few Hours: Composition of Aspect in Idioms Sheila R. Glasbey School of idioms Consider the idiomatic verb phrase `paint the town red' (meaning, according to the Longman Diction readily with temporal for-adverbials to form sentences such as: 1. Mary and her friends painted the town

  16. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

    2006-03-21

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  17. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  18. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  19. 29.01.03.M1.14 Information Resources Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    Behmer, Spencer T.

    29.01.03.M1.14 Information Resources ­ Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.14 Information Resources ­ Password-based Authentication Approved July 18 authentication is a means to control who has access to an information resource system. Controlling the access

  20. Remote, synchronous, hands-on ultrasound education

    E-Print Network [OSTI]

    2015-01-01

    Variability in ultrasound education among emergency medicineHands-On Ultrasound Education Stephen Winn, PhD, 1 PeterAugust 25, 16. Remote Medical Education Conference, Sydney,

  1. Request for Information -- Remote Alaskan Communities Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communities Energy Efficiency Competition As part of President Obama's commitment to fight climate change and assist remote Alaskan Communities, the Energy Department (DOE) is...

  2. A remote image analysis terminal 

    E-Print Network [OSTI]

    Daigle, Lucien Don

    1976-01-01

    A APPENDIX B APPENDIX C APPENDIX D VITA 140 142 157 157 162 163 164 170 179 190 234 Vrzt I, I S'I' III' I: I OIIRI:. 8 The Remote Image Analysis Terminal System Block Diagram The Digital Interface The Analog Interface Digitizer...- flow Chart Loading and Transmission of Position Coordinates Page 59 61 63 65 66 II-22 II-23 Keyboard Block Diagram Generation and Transmission cE a Hex Digit 69 70 II- 24 I I-25 Opcode Table 73 Partial Block Diagram...

  3. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *Reindustrialization ReindustrializationEnergy2015Remote

  4. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *ReindustrializationEnergy Remote Alaskan

  5. Remote Sensing R. E. Mcintosh

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *ReindustrializationEnergy Remote AlaskanJ.E.M. Goldsmith,R. E.

  6. Remote Sens. 2011, 3, 1427-1446; doi:10.3390/rs3071427 Remote Sensing

    E-Print Network [OSTI]

    Keeton, William S.

    carbon dioxide and potentially complex interactions with other anthropogenic stressors [4,5] requireRemote Sens. 2011, 3, 1427-1446; doi:10.3390/rs3071427 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Evaluating the Remote Sensing and Inventory-Based Estimation of Biomass in the Western Carpathians

  7. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  8. Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may or may not

    E-Print Network [OSTI]

    Green, Richard M.

    Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may) transitive. #12;Math 2001 page 2 of 5 2. (20) Let A be the 3-element set {Rock, Paper, Scissors}, and let R) Write down the inverse relation, R-1 , on A. #12;Math 2001 page 3 of 5 3. (30) Let B = {1, 2, 3

  9. On Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovic

    E-Print Network [OSTI]

    Cipolla, Roberto

    . This is due to the fact that a thermal infrared sensor measures the heat energy radiation emitted by the faceOn Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovi´c Riad in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often

  10. Efficient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef- ficient than

  11. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  12. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    E-Print Network [OSTI]

    Nahrstedt, Klara

    malicious attacks. In this paper, we propose a novel signature model ­ Time Valid One-Time Signature (TVTime Valid One-Time Signature for Time-Critical Multicast Data Authentication Qiyan Wang, Himanshu-OTS) ­ to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design

  13. RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot

    E-Print Network [OSTI]

    Rajpoot, Nasir

    RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot Dept. of Computer Science transform. The signature is extracted from the Radon domain and entropy coded after a 1D wavelet transform- derlying Radon transform plays an essential role in provid- ing such non-separable, directional properties

  14. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  15. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  16. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  17. April 11, 2002 Computer Security Foundations Workshop 1 Security Protocol Design via Authentication Tests

    E-Print Network [OSTI]

    Guttman, Joshua

    process, and illustrate its use by creating ATSPECT, an Authentication Test-based Se- cure Protocol a basis for secure electronic commerce. It is not currently in use anywhere, presumably partly it was viewed as a high-risk un- Supported by the National Security Agency through US Army CE- COM contract DAAB

  18. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis1|francois.koeune|olivier.bonaventure|jean-jacques.quisquater}@uclouvain.be Abstract. In wireless roaming a mobile device obtains a service from some foreign network while being. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security

  19. A Lightweight Certificate-based Source Authentication Protocol for Group Communication

    E-Print Network [OSTI]

    Baras, John S.

    of lightweight, symmetric-key certificates called TESLA certificate. The certificates bind the identities and verification frequently can prevent the CPU from other functions and drain the battery quickly. Therefore resources. We propose to achieve authentication using a new class of certificates called TESLA Certificate

  20. Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location

    E-Print Network [OSTI]

    Ottawa, University of

    18 Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure

  1. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  2. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation

    E-Print Network [OSTI]

    Bicego, Manuele

    Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz (Italy) tista@uniss.it Abstract. Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure

  3. Remote-controlled NDA (nondestructive assay) systems for feed and product storage at an automated MOX (mixed oxide) facility

    SciTech Connect (OSTI)

    Menlove, H.O.; Augustson, R.H.; Ohtani, T.; Seya, M.; Takahashi, S.; Abedin-Zadeh, R.; Hassan, B.; Napoli, S.

    1989-01-01

    Nondestructive assay (NDA) systems have been developed for use in an automated mixed oxide (MOX) fabrication facility. Unique features have been developed for the NDA systems to accommodate robotic sample handling and remote operation. In addition, the systems have been designed to obtain International Atomic Energy Agency inspection data without the need for an inspector at the facility at the time of the measurements. The equipment is being designed to operate continuously in an unattended mode with data storage for periods of up to one month. The two systems described in this paper include a canister counter for the assay of MOX powder at the input to the facility and a capsule counter for the assay of complete liquid-metal fast breeder reactor fuel assemblies at the output of the plant. The design, performance characteristics, and authentication of the two systems will be described. The data related to reliability, precision, and stability will be presented. 5 refs., 10 figs., 4 tabs.

  4. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  5. SHE DOES ME GOOD How Logic Doesn't Let You Down

    E-Print Network [OSTI]

    Ayala-Rincón, Mauricio

    SHE DOES ME GOOD How Logic Doesn't Let You Down (cracking the proof code) Jo~ao Marcos Lo) LOGIC DOES ME GOOD MAT-UnB 1 / 8 #12;How many of your proofs are correct? J. Marcos (UFRN) LOGIC DOES ME GOOD MAT-UnB 2 / 8 #12;How many of your proofs are correct? How does proof writing compare to software

  6. Don't let the river run dry: Efficiency and conservation efforts in the Rio Grande Basin 

    E-Print Network [OSTI]

    Supercinski, Danielle

    2010-01-01

    stream_source_info Don't let the river run dry.pdf.txt stream_content_type text/plain stream_size 8105 Content-Encoding ISO-8859-1 stream_name Don't let the river run dry.pdf.txt Content-Type text/plain; charset=ISO-8859...-1 Don?t let the river run dry Effi ciency and conservation efforts in the Rio Grande Basin Story by Danielle Supercinski txH2O | pg. 6 An unknown fact to most is that high water demands by agriculture along with the ever-increasing urban...

  7. Don't let the river run dry: Efficiency and conservation efforts in the Rio Grande Basin 

    E-Print Network [OSTI]

    Supercinski, Danielle

    2011-01-01

    stream_source_info Don't let the river run dry.pdf.txt stream_content_type text/plain stream_size 8105 Content-Encoding ISO-8859-1 stream_name Don't let the river run dry.pdf.txt Content-Type text/plain; charset=ISO-8859...-1 Don?t let the river run dry Effi ciency and conservation efforts in the Rio Grande Basin Story by Danielle Supercinski txH2O | pg. 6 An unknown fact to most is that high water demands by agriculture along with the ever-increasing urban...

  8. Hyperspectral Remote Sensing of Tropical Grass Quality and Quantity

    E-Print Network [OSTI]

    Hyperspectral Remote Sensing of Tropical Grass Quality and Quantity Onisimo Mutanga 7 April 2004, The Netherlands Prof. W. J. Bond University of Cape Town, South Africa #12;Hyperspectral Remote Sensing 1.2 Hyperspectral remote sensing

  9. Snowpack spatial variability: towards understanding its effect on remote sensing

    E-Print Network [OSTI]

    Marshall, Hans-Peter

    Snowpack spatial variability: towards understanding its effect on remote sensing measurements spatial variability: towards understanding its effect on remote sensing mea- surements and snow slope large errors in these basin estimates. Remote sensing measurements offer a promising alternative, due

  10. Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing

    E-Print Network [OSTI]

    Marcus, Philip S.

    Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing Joe Pitman An innovative approach that enables greatly increased return from planetary science remote sensing missions as the primary remote sensing science payload, thereby reducing the cost, resources, complexity, integration

  11. Electromagnetic Radiation REFERENCE: Remote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    ;2 Electromagnetic Energy Interactions Energy recorded by remote sensing systems undergoes fundamental interactions that should be understood to properly interpret the remotely sensed data. For example, if the energy being nanosecond (10-9 s). The electromagnetic wave consists of two fluctuating fields--one electric and the other

  12. REMOTE DATA ACQUISITION USING LABVIEW A Design Project Report

    E-Print Network [OSTI]

    Ruina, Andy L.

    REMOTE DATA ACQUISITION USING LABVIEW A Design Project Report Presented to the Engineering Division Master of Electrical Engineering Program Cornell University Design Project Report Project Title: Remote

  13. Advanced polychromator systems for remote chemical sensing (LDRD...

    Office of Scientific and Technical Information (OSTI)

    polychromator systems for remote chemical sensing (LDRD project 52575). Citation Details In-Document Search Title: Advanced polychromator systems for remote chemical sensing (LDRD...

  14. 2.1.14 a) Let G be a graph all of whose vertex-deleted subgraphs ...

    E-Print Network [OSTI]

    gcavigli

    2015-04-30

    Feb 1, 2014 ... b) Let G be a graph all of whose edge-deleted subgraphs are isomorphic. Is G necessarily edge-transitive? 2.1.15 Using Theorem 2.2 and the ...

  15. Improving Healthcare for Populations: Building Smart and Integrated Remote Health Monitoring Systems

    E-Print Network [OSTI]

    Alshurafa, Nabil

    2015-01-01

    for Populations: Building Smart and Integrated Remote Healthfor Populations: Building Smart and Integrated Remote Health

  16. Remotely operated submersible underwater suction apparatus

    DOE Patents [OSTI]

    Kristan, Louis L. (2111 Brentwood Dr., Idaho Falls, ID 83402)

    1990-01-01

    A completely submersible, remotely operated underwater suction device for collection of irradiated materials in a nuclear pool is disclosed. The device includes a pump means for pumping water through the device, a filter means for capturing irradiated debris, remotely operated releasable connector means, a collection means and a means for remotely maneuvering the collection means. The components of the suction device may be changed and replaced underwater to take advantage of the excellent radiation shielding ability of water to thereby minimize exposure of personnel to radiation.

  17. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  18. Remote/New sites: Many Field

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *ReindustrializationEnergy Remote AlaskanJ.E.M.RemoteRemote/New

  19. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  20. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  1. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS Bugs Let

  2. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  3. Authors Queries Journal: International Journal of Remote Sensing

    E-Print Network [OSTI]

    Texas at San Antonio, University of

    and Environmental Science, New Mexico Tech, Socorro, NM 87801, USA §Laboratory for Remote Sensing and Geoinformatics

  4. On-road remote sensing of vehicle emissions in

    E-Print Network [OSTI]

    Denver, University of

    On-road remote sensing of vehicle emissions in the Auckland Region August 2003 Technical 1877353000 www.arc.govt.nz #12;TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region #12;Page i TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region On-road remote sensing

  5. OVERVIEW OF REMOTE SENSING (David Sandwell, Copyright, 2007)

    E-Print Network [OSTI]

    Sandwell, David T.

    1 OVERVIEW OF REMOTE SENSING (David Sandwell, Copyright, 2007) Definition Remote sensing: · satellite (or aircraft) remote sensing of the Earth (mostly); · information carried by electromagnetic waves detailed discussion of applications of remote sensing. Instead the focus is on the physical principles

  6. Remote sensing, imaging, and signal engineering

    SciTech Connect (OSTI)

    Brase, J.M.

    1993-03-01

    This report discusses the Remote Sensing, Imaging, and Signal Engineering (RISE) trust area which has been very active in working to define new directions. Signal and image processing have always been important support for existing programs at Lawrence Livermore National Laboratory (LLNL), but now these technologies are becoming central to the formation of new programs. Exciting new applications such as high-resolution telescopes, radar remote sensing, and advanced medical imaging are allowing us to participate in the development of new programs.

  7. int. j. remote sensing, 2000, vol. 21, no. 18, 35333538 Close-range remote sensing of aquatic macrophyte vegetation cover

    E-Print Network [OSTI]

    Debinski, Diane M.

    int. j. remote sensing, 2000, vol. 21, no. 18, 3533­3538 Close-range remote sensing of aquatic Applied Remote Sensing (KARS) Program, 2291 Irving Hill Road, University of Kansas, Lawrence, Kansas 66045 location of sampling plots. While aerial photography and satellite remotely sensed imagery have been used

  8. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, Melvin A. (Santa Barbara, CA)

    1992-01-01

    A fiber optically isolated and remotely stabilized data transmission system s described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber.

  9. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  10. REMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    for thorough trainings in industrial We thank our sponsors : Schneider Electric which provided the automationREMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation of resources and competencies about industrial topics for many universities in Rhône-Alpes french Region. Due

  11. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Remote Sensing of Weather Hazards Using

    E-Print Network [OSTI]

    Cruz-Pol, Sandra L.

    -Cost and Minimal Infrastructure Off-the-Grid Weather Radar Network Jorge M. Trabal, Student Member, IEEE, José GIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Remote Sensing of Weather Hazards Using a Low, IEEE, and David J. McLaughlin, Senior Member, IEEE Abstract--Operational weather radars in the U

  12. Remote Food Shopping Robot System in a Supermarket Realization of the shopping task from remote places

    E-Print Network [OSTI]

    Ohya, Akihisa

    Remote Food Shopping Robot System in a Supermarket ­Realization of the shopping task from remote and usage in human daily life. The specific task we set up in this research is to help people buy fresh food range finder, and the communication interface. With this system, the selection of the food item

  13. RemoteEyes: A Remote Low-Cost Position Sensing Infrastructure for Ubiquitous Computing

    E-Print Network [OSTI]

    British Columbia, University of

    RemoteEyes: A Remote Low-Cost Position Sensing Infrastructure for Ubiquitous Computing Changsong infrastructure for ubiquitous computing. To reduce the cost, each tracked object carries an inexpensive active, sensing, network, FPGA, ubiquitous computing INTRODUCTION Context information is required by many

  14. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu PresidentAccessRemote

  15. Writing for the Web--Some Guidelines Recommended reading: Letting Go of the Words: Writing Web Content that Works by Janice

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Writing for the Web--Some Guidelines Recommended reading: Letting Go of the Words: Writing Web Content that Works by Janice (Ginny) Redish Web content

  16. Remote Operations for LHC and CMS

    SciTech Connect (OSTI)

    Gottschalk, E.E.; /Fermilab

    2007-04-01

    Commissioning the Large Hadron Collider (LHC) and its experiments will be a vital part of the worldwide high energy physics program beginning in 2007. A remote operations center has been built at Fermilab to contribute to commissioning and operations of the LHC and the Compact Muon Solenoid (CMS) experiment, and to develop new capabilities for real-time data analysis and monitoring for LHC, CMS, and grid computing. Remote operations will also be essential to a future International Linear Collider with its multiple, internationally distributed control rooms. In this paper we present an overview of Fermilab's LHC@FNAL remote operations center for LHC and CMS, describe what led up to the development of the center, and describe noteworthy features of the center.

  17. Sex Work in Second Life: Scripts, presence, and Bounded Authenticity in a Virtual Environment

    E-Print Network [OSTI]

    Lynch, Michael J.

    2010-01-01

    from the Internet of 1994. Conclusion $V#3;ÀHGJOLQJ#3; WHFKQRORJLHV#3; RI#3; WKH#3; SDVW#3; KDYH#3; RIWHQ#3; EHHQ#3;¿UVW#3; exploited for sexual purposes4, an argument could be made that 4#3;6XFK#3;DV#3;KRZ#3;WKH#3;¿UVW#3;PRYLQJ#3... signal a heightened sense of intimacy and is a premium feature of virtual sex as an erotic service. These ¿QGLQJV#3;SURYLGH#3;IXUWKHU#3;HYLGHQFH#3;IRU#3;%HUQVWHLQ¶V#3;QRWLRQ#3;RI#3;ERXQGHG#3; authenticity, as virtual sex is a...

  18. Ris-R-1336(EN) Fundamentals for Remote Structural

    E-Print Network [OSTI]

    Risø-R-1336(EN) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades - a Preproject Bent F. Sørensen

  19. On-Road Emissions in Asia Measured by Remote Sensing.

    E-Print Network [OSTI]

    Denver, University of

    On-Road Emissions in Asia Measured by Remote Sensing. · Donald H. Stedman, Gary A. Bishop on-road advantage · Large on-road emissions cause poor air quality. · Remote sensing measures on

  20. Graduate Certificate in Remote Sensing Texas A&M University

    E-Print Network [OSTI]

    are applied to wide-ranging fields such as environmental/resource management, marketing, facility management of Ecosystem Science and Management and Geography 651 ­ Remote Sensing for Geographical Analysis · ESSM 655 ­ Remote Sensing for Natural Resources

  1. Gear's algorithm As long as we're talking about matrix methods, let's also look at Gear's very clever

    E-Print Network [OSTI]

    Jacobs, David

    Gear's algorithm As long as we're talking about matrix methods, let's also look at Gear's very. Gear solves this by using linear algebra methods to select the columns in the most stable way elements. Since Gear's paper for details. #12;

  2. Forum: Let there be light Jay Apt and Lester Lave say power blackouts are too frequent, dangerous

    E-Print Network [OSTI]

    Forum: Let there be light Jay Apt and Lester Lave say power blackouts are too frequent, dangerous blamed the pilot -- for inadequate training, not inspecting the aircraft thoroughly, flying in dangerous conditions or not reacting properly to the danger. Rather than have many erring pilots and dead passengers

  3. COMMUNICATIONS OF THE ACM June 2006/Vol. 49, No. 6 15 Let me start by paraphrasing another President's

    E-Print Network [OSTI]

    California at Berkeley, University of

    COMMUNICATIONS OF THE ACM June 2006/Vol. 49, No. 6 15 Let me start by paraphrasing another President's farewell address [1]: My fellow members of ACM: A few days from now, after two years in the ser- vice of ACM, I shall lay down the responsibilities of office as, in traditional and solemn ceremony

  4. Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A =

    E-Print Network [OSTI]

    Bohner, Martin

    Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A = a b b c . Show by f(x, y, z) = (x2 +2y2 )e-(x2+y2) +zez . 147. In order to produce a box we have two materials

  5. int. j. radiat. biol 2001, vol. 77, no. 2, 155 164 DNA strand break yields after post-high LET irradiation

    E-Print Network [OSTI]

    irradiation incubation with endonuclease-III and evidence for hydroxyl radical clustering J. R. MILLIGAN*, J (DSB) yields after post-high LET irradiation incuba- conditions (Nikjoo et al. 1999), the conclusion DNA in aerobic aqueous solution was irradiated with one of ve radiation types: 137 Cs c-rays (LET

  6. Geography 115B Remote Sensing Winter 2014

    E-Print Network [OSTI]

    Bookhagen, Bodo

    5 (W) Image classification + Accuracy assessments Required Reading: Introductory Digital Image assessment 9. Feb 10 (M) Classification II/Change Detection Required Reading: Introductory Digital Image the lecture and labs: Introductory Digital Image Processing: A Remote Sensing Perspective, 3rd Edition by J

  7. Dyke quality assessment by remote sensing

    E-Print Network [OSTI]

    Hack, Robert

    Control 2015 (FC2015 ) Dutch Governmental research andDutch Governmental research and development program Solutions for smart flood control 15 Oct 2009 2Reeuwijk - Hack #12;2 RSDYKRSDYK Quality assessment of dykes1 RSDYK Dyke quality assessment by remote sensing and geological information Robert Hack Flood

  8. Remote optical turbulence sensing: present Andrei Tokovinin

    E-Print Network [OSTI]

    Tokovinin, Andrei A.

    . model Detector Data products Rytov approx. Biases Amplitude U(x,y, ,t) Figure 1: Remote optical the turbulent volume. Bright stars (one, two, or several) are most convenient ROTS sources available at no cost of these solar-system bodies pre-selects the light path (a ROTS can only work when the source is visible

  9. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J.; King, W.C.

    1993-06-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  10. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J. ); King, W.C. . Dept. of Geography and Environmental Engineering)

    1993-01-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  11. Aalborg Universitet Remote and Centralized Monitoring of PV Power Plants

    E-Print Network [OSTI]

    Sera, Dezso

    Aalborg Universitet Remote and Centralized Monitoring of PV Power Plants Kopacz, Csaba; Spataru., & Kerekes, T. (2014). Remote and Centralized Monitoring of PV Power Plants. In Proceedings of the 14th from vbn.aau.dk on: juli 04, 2015 #12;Remote and Centralized Monitoring of PV Power Plants Csaba Kopacz

  12. Effects of Reduced Connectivity in Rural and Remote Communities

    E-Print Network [OSTI]

    Effects of Reduced Connectivity in Rural and Remote Communities Abstract In this paper we describe ignored yet important user population. Keywords Remote and rural communities, connectivity, qualitative understand user needs in rural and remote communities and what impact lack of connectivity has on users

  13. Wireless Tomography, Part I: A Novel Approach to Remote Sensing

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    Wireless Tomography, Part I: A Novel Approach to Remote Sensing R. C. Qiu, M. C. Wicks, L. Li, Z. Browning.12@us.af.mil Abstract--Wireless tomography, a novel approach to remote sensing, is proposed--radio frequency tomography, remote sensing, cognitive radar, cognitive radio. I. INTRODUCTION The ever increasing

  14. GG671b Remote Sensing Planets Gillis-Davis

    E-Print Network [OSTI]

    GG671b Remote Sensing ­ Planets Gillis-Davis Wednesday 1:30-4:20 POST 544 Description: This course will teach end-to-end principles of remote sensing across electromagnetic spectrum with application state-of-the art remote sensing methods and basic concepts of how to use such data to derive information

  15. Using Remote Sensing for Natural Disaster Management Tara Srihari

    E-Print Network [OSTI]

    Using Remote Sensing for Natural Disaster Management Tara Srihari Department of Computing Sciences these losses. Remote sensing images can be used to provide information about the landscape and environment is focused on developing an infrastructure to make the data collected with remote sensing more widely

  16. COMPLEX WAVELET REGULARIZATION FOR SOLVING INVERSE PROBLEMS IN REMOTE SENSING

    E-Print Network [OSTI]

    Weiss, Pierre

    COMPLEX WAVELET REGULARIZATION FOR SOLVING INVERSE PROBLEMS IN REMOTE SENSING Mika¨el Carlavan Sophia-Antipolis - France ABSTRACT Many problems in remote sensing can be modeled as the min- imization processing: sparsity and regular- ity priors. 1. INTRODUCTION Some problems in remote sensing consist

  17. Remote Sensing in Support of Multilateral Environmental Agreements

    E-Print Network [OSTI]

    Columbia University

    Remote Sensing in Support of Multilateral Environmental Agreements Alex de Sherbinin CIESIN, from 172 in 1970 to more than 475 today · the sophistication of remote sensing and geospatial sets · the number of global and regional initiatives attempting to apply remote sensing (RS

  18. Remote Sensing Messungen zur on-road Bestimmung der

    E-Print Network [OSTI]

    Denver, University of

    LUBETRAX Remote Sensing Messungen zur on-road Bestimmung der Abgase von schweren Motorfahrzeugen, Chur, Zürich, Brugg Dr. Peter Maly (Projektleitung) Dr. Stefan Scherer Dr. G.A. Bishop (Remote Sensing;Inhaltsverzeichnis Zusammenfassung 1 1. Einleitung und Zielsetzung 3 1.1 Remote Sensing Messungen (FEAT) 4 1

  19. Multivariate and Supervised Approaches for Mathematical Morphology in Remote Sensing

    E-Print Network [OSTI]

    Lefèvre, Sébastien

    Multivariate and Supervised Approaches for Mathematical Morphology in Remote Sensing S´ebastien Lef`evre Image Sciences, Computer Sciences and Remote Sensing Laboratory (LSIIT) Models, Image and Vision Team MM Supervised MM Applications in Remote Sensing Conclusion Mathematical Morphology is a powerful

  20. Interactive Multiscale Classification of High-Resolution Remote Sensing Images

    E-Print Network [OSTI]

    Gosselin, Philippe-Henri

    1 Interactive Multiscale Classification of High-Resolution Remote Sensing Images Jefersson Alex dos~ao Abstract The use of remote sensing images (RSIs) as a source of information in agribusiness applications in space occupation. However, the identification and recognition of crop regions in remote sensing images

  1. Thursday, March 15, 2007 POSTER SESSION II: LUNAR REMOTE SENSING

    E-Print Network [OSTI]

    Rathbun, Julie A.

    Thursday, March 15, 2007 POSTER SESSION II: LUNAR REMOTE SENSING 6:30 p.m. Fitness Center Mc-Cittert) Planetary Remote Sensing Neutron Count Rate Maps [#2408] This paper evaluates Jansson Van-Cittert's (JVC) image restoration transform for possible application to neutron maps for planetary remote sensing

  2. VISUAL ASSISTANCE TOOLS FOR INTERACTIVE VISUALIZATION OF REMOTE SENSING DATA

    E-Print Network [OSTI]

    Blanz, Volker

    VISUAL ASSISTANCE TOOLS FOR INTERACTIVE VISUALIZATION OF REMOTE SENSING DATA Martin Lambers to interactive visualization of remote sensing data. Index Terms-- Visualization 1. INTRODUCTION Interactive visualization of remote sensing data gives the user much control over the visualization result. In the ideal

  3. Multiple Instrument Distributed Aperture Sensor (MIDAS) For Remote Sensing

    E-Print Network [OSTI]

    Fienup, James R.

    Multiple Instrument Distributed Aperture Sensor (MIDAS) For Remote Sensing Joe Pitman,a , Alan that enables greatly increased return from earth and planetary science remote sensing missions is described are integrated into MIDAS as the primary remote sensing science payload, thereby reducing the cost, resources

  4. A Modular Control System for Remote Subsea Eric Stephen Smith

    E-Print Network [OSTI]

    Wood, Stephen L.

    A Modular Control System for Remote Subsea Equipment by Eric Stephen Smith Bachelor of Science the undersigned committee hereby approve the attached thesis A Modular Control System for Remote Subsea Equipment and Environmental Systems #12;iv Abstract Title: A Modular Control System for Remote Subsea Equipment Author: Eric

  5. ADVANCED CONCEPTS ON REMOTE SENSING OF PRECIPITATION AT

    E-Print Network [OSTI]

    Foufoula-Georgiou, Efi

    ADVANCED CONCEPTS ON REMOTE SENSING OF PRECIPITATION AT MULTIPLE SCALES by SorooSh SorooShian, amirTs Workshop on remoTe sensing of precipiTATion AT mulTiple scAles what: 50 participants from precipitation of remote sensing of precipitation whEn: 15­17 March 2010 whErE: University of California, Irvine Overview

  6. Chromosomal changes in cultured human epithelial cells transformed by low- and high-LET radiation

    SciTech Connect (OSTI)

    Yang, Tracy Chui-hsu; Craise, L.M; Prioleau, J.C.; Stampfer, M.R.; Rhim, J.S.

    1990-11-01

    For a better assessment of radiation risk in space, an understanding of the responses of human cells, especially the epithelial cells, to low- and high-LET radiation is essential. In our laboratory, we have successfully developed techniques to study the neoplastic transformation of two human epithelial cell systems by ionizing radiation. These cell systems are human mammary epithelial cells (H184B5) and human epidermal keratinocytes (HEK). Both cell lines are immortal, anchorage dependent for growth, and nontumorigenic in athymic nude nice. Neoplastic transformation was achieved by irradiation cells successively. Our results showed that radiogenic cell transformation is a multistep process and that a single exposure of ionizing radiation can cause only one step of transformation. It requires, therefore, multihits to make human epithelial cells fully tumorigenic. Using a simple karyotyping method, we did chromosome analysis with cells cloned at various stages of transformation. We found no consistent large terminal deletion of chromosomes in radiation-induced transformants. Some changes of total number of chromosomes, however, were observed in the transformed cells. These transformants provide an unique opportunity for further genetic studies at a molecular level. 15 refs., 9 figs., 2 tabs.

  7. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  8. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

    1991-08-13

    A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

  9. Small geothermal electric systems for remote powering

    SciTech Connect (OSTI)

    Entingh, Daniel J.; Easwaran, Eyob.; McLarty, Lynn

    1994-08-08

    This report describes conditions and costs at which quite small (100 to 1,000 kilowatt) geothermal systems could be used for off-grid powering at remote locations. This is a first step in a larger process of determining locations and conditions at which markets for such systems could be developed. The results suggest that small geothermal systems offer substantial economic and environmental advantages for powering off-grid towns and villages. Geothermal power is most likely to be economic if the system size is 300 kW or greater, down to reservoir temperatures of 100{degree}C. For system sizes smaller than 300 kW, the economics can be favorable if the reservoir temperature is about 120{degree}C or above. Important markets include sites remote from grids in many developing and developed countries. Estimates of geothermal resources in many developing countries are shown.

  10. Portsmouth X300 remote assay monitor system

    SciTech Connect (OSTI)

    Smith, D.E.

    1996-07-01

    Personnel in the Instrumentation and Controls Division at Oak Ridge National Laboratory (ORNL) in association with the United States Enrichment Corporation (USEC) have recently developed a system for monitoring and tracking the assay of enriched uranium from the production facilities at the Portsmouth Gaseous Diffusion Plant (PORTS). This work was sponsored by the USEC and has involved the expansion and improvement of an existing system that was developed by ORNL. The system provides control room operators with real-time information on the withdrawal operations of uranium hexafluoride at the withdrawal stations at PORTS. An additional system was developed to display the real-time information from each of the three withdrawal stations at a remotely located building. This report describes the remote assay monitor and display system that has been developed and installed at PORTS Building X300.

  11. Rate allocation in a remote control structure 

    E-Print Network [OSTI]

    Meadow, Charles Joe

    1984-01-01

    are linearly dependent upon the measurement estimates. Therefore, they can be considered as stationary and gaussian. To optimally encode a signal an arbitrary time delay is required which will produce a non-causal control solution. This is a non.... Jones (Head of Department) May 1984 ABSTRACT Rate Allocation in a Remote Control Structure (May 1984) Charles Joe Meadow, Jr. , B. S. , Texas A&M University Chairman of Advisory Committee: Dr. Thomas R. Fischer A Linear-Quadratic-Gaussian (LQG...

  12. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.31×0.31×0.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  13. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, David W. (San Diego, CA); Hager, E. Randolph (La Jolla, CA)

    1986-01-01

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  14. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Link: www.internationaltransportforum.orgjtrcDiscussionPapersDP201119.pdf Transport Toolkit Region(s): Europe Transport in rural and remote regions receives...

  15. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Geothermal Exploration Using Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal...

  16. Method of determining forest production from remotely sensed forest parameters

    DOE Patents [OSTI]

    Corey, J.C.; Mackey, H.E. Jr.

    1987-08-31

    A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

  17. Geobotanical Remote Sensing Applied To Targeting New Geothermal...

    Open Energy Info (EERE)

    "http:en.openei.orgwindex.php?titleGeobotanicalRemoteSensingAppliedToTargetingNewGeothermalResourceLocationsInTheUsBasinAndRangeWithAFocusOnDixieMeadows,...

  18. Remote Detection of Quaternary Borate Deposits with ASTER Satellite...

    Open Energy Info (EERE)

    Exploration Tool Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Remote Detection of Quaternary Borate Deposits with ASTER Satellite Imagery...

  19. Community Energy Planning A Resource Guide for Remote Communities...

    Open Energy Info (EERE)

    Communities in Canada Jump to: navigation, search Name Community Energy Planning A Resource Guide for Remote Communities in Canada AgencyCompany Organization Natural Resources...

  20. GIS and remote sensing team recognized by industry leaders

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transmission-GIS-and-Remote-Sensing-Team-recognized-by-industry-leaders-at-Esri-Conference Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News...

  1. Structural investigations at the Coso geothermal area using remote...

    Open Energy Info (EERE)

    investigations at the Coso geothermal area using remote sensing information, Inyo County, California Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  2. Alternative Carriers For Remote Renewable Energy Sources Using...

    Open Energy Info (EERE)

    Alternative Carriers For Remote Renewable Energy Sources Using Existing Cng Infrastructure Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article:...

  3. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guest Lecturer Discusses Hurricane Hunting - By Remote Control On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and...

  4. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  5. An advanced unmanned vehicle for remote applications

    SciTech Connect (OSTI)

    Pletta, J.B.; Sackos, J.

    1998-03-01

    An autonomous mobile robotic capability is critical to developing remote work applications for hazardous environments. A few potential applications include humanitarian demining and ordnance neutralization, extraterrestrial science exploration, and hazardous waste cleanup. The ability of the remote platform to sense and maneuver within its environment is a basic technology requirement which is currently lacking. This enabling technology will open the door for force multiplication and cost effective solutions to remote operations. The ultimate goal of this work is to develop a mobile robotic platform that can identify and avoid local obstacles as it traverses from its current location to a specified destination. This goal directed autonomous navigation scheme uses the Global Positioning System (GPS) to identify the robot`s current coordinates in space and neural network processing of LADAR range images for local obstacle detection and avoidance. The initial year funding provided by this LDRD project has developed a small exterior mobile robotic development platform and a fieldable version of Sandia`s Scannerless Range Imager (SRI) system. The robotic testbed platform is based on the Surveillance And Reconnaissance ground Equipment (SARGE) robotic vehicle design recently developed for the US DoD. Contingent upon follow-on funding, future enhancements will develop neural network processing of the range map data to traverse unstructured exterior terrain while avoiding obstacles. The SRI will provide real-time range images to a neural network for autonomous guidance. Neural network processing of the range map data will allow real-time operation on a Pentium based embedded processor board.

  6. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, D.W.; Hager, E.R.

    1984-02-22

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  7. Near-surface remote sensing of canopy architecture and land-atmosphere interactions in an oak savanna ecosystem

    E-Print Network [OSTI]

    Ryu, Youngryel

    2010-01-01

    MODIS satellite data. Remote Sensing of Environment, 106,a joint flux tower, remote sensing and modelling analysis.of the algorithm. Remote Sensing of Environment, 110,

  8. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, Martin J. (Pittsburgh, PA); Fiscus, Gregory M. (McMurray, PA); Sammel, Alfred G. (Pittsburgh, PA)

    1998-01-01

    A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

  9. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, S.B.; Milanovich, F.P.

    1995-11-14

    A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

  10. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, Steve B. (Livermore, CA); Milanovich, Fred P. (Lafayette, CA)

    1995-01-01

    A miniature dual syringe-type pump assembly which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor.

  11. PV Charging System for Remote Area Operations

    SciTech Connect (OSTI)

    Ilsemann, Frederick; Thompson, Roger

    2008-07-31

    The objective of this project is to provide the public with a study of new as well existing technology to recharge batteries used in the field. A new product(s) will also be built based upon the information ascertained. American Electric Vehicles, Inc. (AEV) developed systems and methods suitable for charging state-of-the-art lithium-ion batteries in remote locations under both ideal and cloudy weather conditions. Conceptual designs are described for existing and next generation technology, particularly as regards solar cells, peak power trackers and batteries. Prototype system tests are reported.

  12. Implantable, remotely-programmable insulin infusion system

    SciTech Connect (OSTI)

    Carlson, G.A.; Bair, R.E.; Gaona, J.I. Jr.; Love, J.T.; Urenda, R.S.

    1981-10-01

    An implantable, remotely-programmable insulin infusion system is described which has a mass of 280 grams and an implanted lifetime exceeding two years. The system uses a rotary solenoid-driven peristaltic pump controlled by low power CMOS timing circuitry which provides bimodal insulin delivery. Fifteen low rates from 0.39 to 5.9 units/hour and 15 high doses from 0.84 to 12.5 units are available using U100 insulin. The system has been tested in the laboratory, evaluated in diabetic dogs, and implanted in one diabetic human.

  13. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

    1998-10-06

    A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

  14. REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS

    SciTech Connect (OSTI)

    NELSON RL

    2008-07-18

    The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

  15. Aerosol Remote Sealing System - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TA I N P A T T E R N A NA LY S IDOEAerosol Remote

  16. REMOTE ACCESS SERVICES | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvesting inServices »AboutEnergyPublicREMOTE ACCESS

  17. Remote Sens. 2011, 3, 343-361; doi:10.3390/rs3020343 Remote Sensing

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    .mdpi.com/journal/remotesensing Article The HelioClim Project: Surface Solar Irradiance Data for Climate Applications Philippe Blanc; solar irradiance; solar exposure; climate; Africa; Europe; Atlantic Ocean; remote sensing; long Abstract: Meteosat satellite images are processed to yield values of the incoming surface solar irradiance

  18. Remote Sensing 2010, 2, 1797-1825; doi:10.3390/rs2071797 Remote Sensing

    E-Print Network [OSTI]

    Singer, Michael

    / Published: 19 July 2010 Abstract: Hydraulic gold mining in the Sierra Nevada, California (1853 below dams where floods can remobilize them. This study uses topographic and planimetric data from; hydraulic mining sediment; floodplain morphology OPEN ACCESS #12;Remote Sensing 2010, 2 1798 1. Introduction

  19. Remote control for anode-cathode adjustment

    DOE Patents [OSTI]

    Roose, Lars D. (Albuquerque, NM)

    1991-01-01

    An apparatus for remotely adjusting the anode-cathode gap in a pulse power machine has an electric motor located within a hollow cathode inside the vacuum chamber of the pulse power machine. Input information for controlling the motor for adjusting the anode-cathode gap is fed into the apparatus using optical waveguides. The motor, controlled by the input information, drives a worm gear that moves a cathode tip. When the motor drives in one rotational direction, the cathode is moved toward the anode and the size of the anode-cathode gap is diminished. When the motor drives in the other direction, the cathode is moved away from the anode and the size of the anode-cathode gap is increased. The motor is powered by batteries housed in the hollow cathode. The batteries may be rechargeable, and they may be recharged by a photovoltaic cell in combination with an optical waveguide that receives recharging energy from outside the hollow cathode. Alternatively, the anode-cathode gap can be remotely adjusted by a manually-turned handle connected to mechanical linkage which is connected to a jack assembly. The jack assembly converts rotational motion of the handle and mechanical linkage to linear motion of the cathode moving toward or away from the anode.

  20. System and method for controlling remote devices

    DOE Patents [OSTI]

    Carrender, Curtis Lee (Richland, WA); Gilbert, Ronald W. (Benton City, WA); Scott, Jeff W. (Pasco, WA); Clark, David A. (Kennewick, WA)

    2006-02-07

    A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.

  1. int. j. remote sensing, 1999, vol. 20, no. 17, 3281 3291 A remote sensing and GIS-based model of habitats and biodiversity in

    E-Print Network [OSTI]

    Debinski, Diane M.

    int. j. remote sensing, 1999, vol. 20, no. 17, 3281± 3291 A remote sensing and GIS-based model, University of Kansas, Lawrence, KS 66047, USA and §Kansas Applied Remote Sensing (KARS) Program, 2291 Irving 31 May 1998) Abstract. We used remotely sensed data and geographical information systems (GIS

  2. The Application of Remote Sensing inThe Application of Remote Sensing in Support of Ecosystem ManagementSupport of Ecosystem Management

    E-Print Network [OSTI]

    Columbia University

    The Application of Remote Sensing inThe Application of Remote Sensing in Support of Ecosystem of remote sensing in support of multilateral environmental agreements. There is much that the conservation community has to gain by looking seriously at the contributions that remote sensing can make

  3. Neural network uncertainty assessment using Bayesian statistics with application to remote sensing

    E-Print Network [OSTI]

    Aires, Filipe

    Neural network uncertainty assessment using Bayesian statistics with application to remote sensing for many inversion problems in remote sensing; however, uncertainty estimates are rarely provided Meteorology and Atmospheric Dynamics: General or miscellaneous; KEYWORDS: remote sensing, uncertainty, neural

  4. Remote Sensing and Field Mapping: Requisite Bed Fellows for Assessing River Systems

    E-Print Network [OSTI]

    Beagle, Julie

    2009-01-01

    al. 1991. What Does Remote Sensing Do For Ecology? Ecology,B. 2006. Introduction to remote sensing. Edition 4. Guilford2004. The role of remote sensing technology in the EU water

  5. Hyperspectral Remote Sensing of Coastal Environments Miguel VelezReyes, Director

    E-Print Network [OSTI]

    Gilbes, Fernando

    Hyperspectral Remote Sensing of Coastal Environments Miguel VelezReyes, Director Laboratory for Applied Remote Sensing and Image Processing Center for Subsurface Sensing and Imaging Systems as defined by distinct physical, geochemical, and biological characteristics. Hyperspectral remote

  6. Remote Sensing and GIS Integration: Towards a Prioritized Research Agenda (93-4)

    E-Print Network [OSTI]

    Estes, John E.; Star, Jeffrey L.

    1993-01-01

    Analysis using Integrated GIS and Remotely Sensed Data: SomeIntegration of Remote Sensing and GIS. Data and Data Access,use of remote sensing and GIS? 5.0 References Davis, F.W. ,

  7. Evaluation of Compression of Remote Network Monitoring Data Streams

    E-Print Network [OSTI]

    Ioannidis, Sotiris

    network sensors but the need to track remote networks continues to grow. Where-ever there are remote applications require packet payload inspection. Such applications include pattern matching for IDS purposes and peer-top-peer traffic classification over port 80. Our goal is to reduce the amount of bandwidth

  8. Dyke quality assessment by remote sensing Robert Hack

    E-Print Network [OSTI]

    Hack, Robert

    FC2015 RSDYK Dyke quality assessment by remote sensing Robert Hack 14-Apr-09 1FC2015-RSDYK - Hack Robert Hack #12;Pilot project: RSDYK2008 Trial to establish whether remote sensing in combination-Apr-09 2FC2015-RSDYK - Hack #12;Test sites in Reeuwijk ­ Zuid Holland (map: Routenet-Routeplan, http

  9. Australian Root Zone Soil Moisture: Assimilation of Remote Sensing Observations

    E-Print Network [OSTI]

    Walker, Jeff

    parameters and atmospheric forcing (Houser et al., 2002). Advances in passive microwave remote sensing have. Ursinob , R.B. Graysona and P.R. Houserc a Department of Civil and Environmental Engineering, University. The C-band passive microwave remote sensing data from the Scanning Multi-frequency Microwave Radiometer

  10. Remote sensing in BOREAS: Lessons learned J.A. Gamona

    E-Print Network [OSTI]

    Nassar, Ray

    , heat, water, momentum, and carbon dioxide. The main goals of the Boreal Ecosys- tem Atmosphere StudyRemote sensing in BOREAS: Lessons learned J.A. Gamona , K.F. Huemmrichb,*, D.R. Peddlec , J. Chend, Greenbelt, MD, USA m Hydrology and Remote Sensing Laboratory, USDA-Agricultural Research Service, Beltsville

  11. Applications and Research Using Remote Sensing for Rangeland Management

    E-Print Network [OSTI]

    Hunt Jr., E. Raymond

    - ability of clean water, sequester excess carbon dioxide, main- tain plant and animal diversityApplications and Research Using Remote Sensing for Rangeland Management E. Raymond Hunt, Jr., James remote sensing. Noxious weed infestations can be determined by careful selection of the spatial

  12. Remote GPP estimation in maize Proceedings of 10th

    E-Print Network [OSTI]

    Gitelson, Anatoly

    , as well as on the release of carbon dioxide (CO2) due to the decomposition of organic matter. FieldRemote GPP estimation in maize Proceedings of 10th Int. Conference on Precision Agriculture, July 18-21, 2010, Denver, Colorado, USA www.icpaonline.org 1 REMOTE ESTIMATION OF GROSS PRIMARY PRODUCTION

  13. Remote estimation of carbon dioxide uptake by a Mediterranean forest

    E-Print Network [OSTI]

    Garbulsky, Martín

    Remote estimation of carbon dioxide uptake by a Mediterranean forest M A R T I´ N F. G A R B U L Science and Environment, University of Tuscia, 01100 Viterbo, Italy Abstract The estimation of the carbon of the ecology of global change. Current remote sensing methodologies for estimating gross primary productivity

  14. Real-time Remote Sensing of Snowmobiles Emissions at

    E-Print Network [OSTI]

    Denver, University of

    Real-time Remote Sensing of Snowmobiles Emissions at Yellowstone National Park: An Oxygenated Fuel 68509 #12;Real-time Remote Sensing of Snowmobile Emissions at Yellowstone National Park 2 Executive emissions from snowmobiles. Ratios of CO, HC and toluene to CO2 were measured and used to calculate %CO, %HC

  15. Remote-Controlled Home Automation Systems with Different Network Technologies

    E-Print Network [OSTI]

    Davies, John N.

    Remote-Controlled Home Automation Systems with Different Network Technologies Armando Roy Delgado into the potential for remote controlled operation of home automation systems. It considers problems, 2002) which certainly requires a careful study before developing any suitable Home Automation System

  16. Research Initiative 12: Integration of Remote Sensing and Geographic Information

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    1 Research Initiative 12: Integration of Remote Sensing and Geographic Information Systems Closing the results of NCGIA Initiative 12 on: "The Integration of Remote Sensing and Geographic Information Systems to the broader application of Geographic Information Systems (GIS) and Geographic Information Analysis (GIA

  17. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Correspondence

    E-Print Network [OSTI]

    Long, David G.

    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Correspondence Correction to "Estimation of the OSCAT Spatial Response Function Using Island Targets" Joshua P. Bradley and David G. Long, Fellow, IEEE, "Estimation of the OSCAT spatial response function using island targets," IEEE Trans. Geosci. Remote Sens

  18. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2 supervisory control and data acquisition (SCADA) system for civil infrastructure systems. To evaluate pipelines. The objectives of this article are to improve upon the existing SCADA by integrating the remote

  19. Ris-R-1340(EN) Fundamentals for Remote Structural

    E-Print Network [OSTI]

    Risø-R-1340(EN) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades for Remote Structural Health Monitoring of Wind Turbine Blades - a Preproject Annex A - Cost of embedded sensors for damage detection in large wind turbine blades - structural health monitoring - (in

  20. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Chou, Pai H.

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2, and to validate its effectiveness with long-term field deployment results. Keywords: structural health monitoring, SCADA system, remote monitoring system 1. INTRODUCTION Structural health monitoring (SHM) is the use